Patents Examined by Suman Debnath
-
Patent number: 12008095Abstract: Provided are methods and systems for controlling access to a property via one or more electronic locks.Type: GrantFiled: November 14, 2018Date of Patent: June 11, 2024Assignee: STRATIS IOT, INC.Inventors: Felicite Moorman, Ryan Buchert
-
Patent number: 12003648Abstract: Real-time data transfer from a device is secured by: receiving data items from a data source, buffering and continually sending same to a data collector; generating by a root of trust a cryptographically verifiable integrity claim based on current hardware and software configuration of the apparatus; forming second data by combining at least the cryptographically verifiable integrity claim and an amount of the data items; forming a hash from at least the second data; obtaining a stamp; causing the root of trust circuitry to form a first signature from at least the hash; forming third data by combining at least the second data, the hash and the first signature; and providing the data collector with a secured transmission comprising the third data.Type: GrantFiled: August 11, 2021Date of Patent: June 4, 2024Assignee: Nokia Technologies OyInventor: Ian Justin Oliver
-
Patent number: 11989048Abstract: Certain exemplary embodiments relate to techniques for detecting unlicensed music on a digital jukebox device. A monitoring module, system, subsystem or the like determines whether audio is being provided to the digital jukebox device from an external source for reproduction via a speaker system connected to the jukebox device in place of jukebox media available directly to the jukebox device. When audio is being provided from the external source: at least a portion of the audio being provided to the digital jukebox device from the external source for reproduction via the jukebox device is captured; it is detected whether the captured portion corresponds to audio content that should be licensed; and a log of possible license violations is updated as appropriate. A notification concerning the log of possible violations is generated when a number of possible violations meets or exceeds a predetermined threshold in a predetermined time period.Type: GrantFiled: September 22, 2021Date of Patent: May 21, 2024Assignee: TOUCHTUNES MUSIC COMPANY, LLCInventors: Francois Beaumier, Michael Tooker
-
Patent number: 11973793Abstract: Disclosed herein are methods, systems, and processes to distribute and disperse search loads to optimize security event processing in cybersecurity computing environments. A search request that includes a domain specific language (DSL) query directed to a centralized search cluster by an event processing application is intercepted. The event processing application is inhibited from issuing the search request to the centralized search cluster if a structured or semi-structured document matches the DSL query.Type: GrantFiled: January 19, 2023Date of Patent: April 30, 2024Assignee: Rapid7, Inc.Inventors: Austin Lee, Gerardo Perez
-
Patent number: 11972695Abstract: A system has an evaluation server that includes at least one database storing a plurality of cybersecurity awareness evaluations, the database connected to the server, a plurality of clients connected to the server and configured to run at least one of the cybersecurity awareness evaluations for play by users on user devices, the users performing actions in the evaluation including offensive actions and defensive actions, and an evaluation dashboard including an interface configured to display scoring results of the cybersecurity awareness evaluations as determined by the server, the scoring results including a plurality of offensive component scores for at least one of the users, a plurality of defensive component scores for at least one of the users, at least one composite offensive score for at least one of the users and at least one composite defensive score for at least one of the users, the composite offensive score being determined based on a plurality of the component offensive scores and the compositType: GrantFiled: February 21, 2022Date of Patent: April 30, 2024Assignee: CIRCADENCE CORPORATIONInventors: Phillip Atencio, Cassandra Brubaker, George A. Wright, Brandon Dorris, Peter Grundy, Charles A. Hardin
-
Patent number: 11968228Abstract: A file copy is executed in a virtual runtime environment that tracks behavior using RNN taking runtime behavior of at least a first time into account with current runtime behavior at a second time. This is responsive to not finding a known signature for suspicious activity during virus scanning. A behavior sequence is identified on-the-fly during file copy execution that is indicative of malware, prior to completing the execution, the behavior sequence involving at least two actions taken at different times during file copy execution. Responsive to the identification, the execution is terminated and the virtual runtime environment is returned to the pool of available virtual runtime environments.Type: GrantFiled: December 9, 2020Date of Patent: April 23, 2024Assignee: Fortinet, Inc.Inventors: Jun Cai, Kamran Razi
-
Patent number: 11960596Abstract: A network interface device comprises a first area of trust comprising a first part of the network interface device, the first part comprising one or more first kernels. A second area of trust comprising a second part of the network interface device different to said first part is provided, the second part comprising one or more second kernels. A communication link is provided between the first area of trust and the second area of trust. At least one of the first and second areas of trust is provided with isolation circuitry configured to control which data which is passed to the other of the first and second areas via the communication link.Type: GrantFiled: March 11, 2021Date of Patent: April 16, 2024Assignee: XILINX, INC.Inventors: Steven Leslie Pope, Derek Edward Roberts, Dmitri Kitariev, Neil Duncan Turton, David James Riddoch, Ripduman Sohan
-
Patent number: 11956214Abstract: Systems and methods for enforcing media access control (MAC) learning limits (MLLs) on multi-homed access ports comprise configuring MLL violation actions to be performed by a virtual extensible local area network (VxLAN) tunnel endpoint (VTEP). The VTEP is multi-homed to VTEPs and comprises an Ethernet segment (ES) access port. A BGP EVPN or similar protocol may be used to communicate MLL information across VTEPs participating in the multi-homed ES to keep MACs and MLL violation actions consistent. The violation actions may comprise initiating a shutdown message to shut down an ES. Once an MLL violation associated with a MAC that has been received at the VTEP is detected, the VTEP may enforce the MLL by performing one or more of the configured MLL violation actions and propagate the same to other VTEPs.Type: GrantFiled: July 6, 2020Date of Patent: April 9, 2024Assignee: DELL PRODUCTS L.P.Inventors: Saye Balasubramaniam Subramanian, Damodharan Sreenivasagaperumal, Kishore Yetikuri
-
Patent number: 11921845Abstract: The present invention is provided with a threat analysis processing unit that, on the basis of an analysis result from the vulnerability analysis unit, analyzes a threat to the system and outputs a threat analysis result; a countermeasure planning unit that, on the basis of the threat analysis result and vulnerability information, plans the countermeasure plan which reduces the impact of the vulnerability; a security test planning unit that plans the security test on the basis of the countermeasure plan; an evaluation calculation unit that performs an evaluation on the basis of the security test, and outputs an evaluation result; and a result processing unit that processes the evaluation result and generates a security countermeasure.Type: GrantFiled: February 27, 2020Date of Patent: March 5, 2024Assignee: HITACHI, LTD.Inventors: Takashi Kawauchi, Chinatsu Yamauchi, Yiwen Chen, Eriko Ando
-
Patent number: 11899801Abstract: A proximity based authentication system and method is described. The system includes a gateway, a cloud component, and a mobile device. The gateway is associated with a particular location and is communicatively coupled to a cloud component. The gateway includes a gateway short-range wireless radio capable of establishing a short-range wireless communication channel. The mobile device is also communicatively coupled the cloud component and includes a mobile device short-range wireless radio that communicates with the gateway using the short-range wireless communication channel when the mobile device is in proximity of the gateway. The mobile device receives a gateway key over the short-range wireless communication channel. The mobile device then communicates the gateway key to a cloud component database. The cloud component authenticates the particular location of the mobile device when the cloud component receives the gateway key from the mobile device.Type: GrantFiled: January 6, 2023Date of Patent: February 13, 2024Assignee: NEXRF CORP.Inventor: Michael Anthony Kerr
-
Patent number: 11886585Abstract: A computing system including a processor and a memory, which includes a first memory region operating as a kernel space and a second memory region operating as a user space. Maintained within the kernel space, a first logic unit receives a notification identifying a newly created thread and extracts at least meta-information associated with the newly created thread. Maintained within the user space, a second logic unit receives at least the meta-information associated with the newly created thread and conducts analytics on at least the meta-information to attempt to classify the newly created thread. An alert is generated by the second logic unit upon classifying the newly created thread as a cyberattack associated with a malicious position independent code execution based at least on results of the analytics associated with the meta-information associated with the newly created thread.Type: GrantFiled: September 27, 2019Date of Patent: January 30, 2024Assignee: Musarubra US LLCInventor: Stephen Davis
-
Patent number: 11868481Abstract: This invention discloses a method for discovering vulnerabilities of operating system access control based on model checking. In this method, security attribute and security specifications of operating system access control module are analyzed to construct the access control model. To discover vulnerabilities in the model, security analysis is performed for access control functionality with theorem proving techniques, and consistency of abstract machine specification and correctness and completeness of the components are verified with model checking tools. This method provides theoretical and technical support for studies in the field of operating system security.Type: GrantFiled: July 27, 2021Date of Patent: January 9, 2024Assignee: ZHEJIANG UNIVERSITYInventors: Rui Chang, Zhuoruo Zhang, Shaoping Pan, Kui Ren
-
Patent number: 11853461Abstract: A system for determining a calculation utilizing differential privacy including an interface and a processor. The interface is configured to receive a request to determine result data of a calculation using multitenanted data. The multitenanted data comprises tenant data associated with a plurality of tenants. The processor is configured to: determine the result data by performing the calculation on the multitenanted data; determine whether a deterministic modification is needed to ensure privacy based at least in part on whether a number of participants in the result data is less than a threshold; and in response to determining that the deterministic modification is needed to ensure privacy: determine the deterministic modification; numerically modify the result data using the deterministic modification to determine modified result data; and provide the modified result data.Type: GrantFiled: March 5, 2021Date of Patent: December 26, 2023Assignee: Workday, Inc.Inventors: Denis Gulsen, Ankit Aggarwal
-
Patent number: 11847214Abstract: In some embodiments, a behavior classifier comprises a set of neural networks trained to determine whether a monitored software entity is malicious according to a sequence of computing events caused by the execution of the respective entity. When the behavior classifier indicates that the entity is malicious, some embodiments execute a memory classifier comprising another set of neural networks trained to determine whether the monitored entity is malicious according to a memory snapshot of the monitored entity. Applying the classifiers in sequence may substantially reduce the false positive detection rate, while reducing computational costs.Type: GrantFiled: April 21, 2020Date of Patent: December 19, 2023Assignee: Bitdefender IPR Management Ltd.Inventors: Daniel Dichiu, Andreea Dincu, Robert M Botarleanu, Sorina N. Zamfir, Elena A Bosinceanu, Razvan Prejbeanu
-
Patent number: 11831686Abstract: The technology disclosed relates to a transparent inline secure forwarder for policy enforcement on IoT devices. In particular, the technology disclosed provides a system. The system comprises a plurality of special-purpose devices on a network segment of a network. The system further comprises a default gateway of the network segment configured to receive outbound network traffic from special-purpose devices in the plurality of special-purpose devices. The system further comprises an inline secure forwarder configured to share an Internet Protocol (IP) address with the default gateway in a transparent mode to intercept the outbound network traffic prior to the default gateway receiving the outbound network traffic, and route the intercepted outbound network traffic to a policy enforcement point for policy enforcement.Type: GrantFiled: August 12, 2022Date of Patent: November 28, 2023Assignee: Netskope, Inc.Inventors: David Tze-Si Wu, Siying Yang, Krishna Narayanaswamy
-
Patent number: 11822666Abstract: Approaches for detecting and rectifying the malware in the computing systems are described. In an example, a request by a process or is intercepted by the malware detection module. Relevant information and characteristics pertaining to the request are extracted and on the based on the extraction, operational attributes are generated. These extracted operational attributes are analyzed and compared with the baseline attributes and if there are any anomalies present, the susceptible code or process originating from the intercepted request is ascertained as malicious.Type: GrantFiled: December 20, 2019Date of Patent: November 21, 2023Inventor: Varun Seth
-
Patent number: 11805096Abstract: A system that communicates information is described. This system includes: a network interface, a proxy device coupled to the network interface, and an interface node coupled to the proxy device and configured to couple to a channel. Note that the network interface is configured to transmit outbound messages from the system to a location and to receive inbound messages to the system from the location, and the channel is configured to convey the outbound messages and the inbound messages. Moreover, the proxy device is configured to inspect a given message inbound or outbound based on a pre-determined profile of the location and pre-defined communication rules. Then, the proxy device is configured to restrict the given message based on a result of the inspection, where the restriction occurs after the system begins a communication session with the location and is performed for the duration of the communication session.Type: GrantFiled: January 20, 2020Date of Patent: October 31, 2023Assignee: INTUIT, INC.Inventors: Rodney A. Robinson, Joann Ferguson, Thomas J. Holodnik, Thomas E. Dockman, Spencer W. Fong, Michael P. Owen
-
Patent number: 11768940Abstract: This controller system includes: a program acquisition unit that acquires, by turning on the controller system, a control program from a server in which the control program is stored; a main storage device that stores the control program acquired by the program acquisition unit while electric power is supplied to the controller system; and a program execution unit that executes the control program stored in the main storage device.Type: GrantFiled: March 4, 2020Date of Patent: September 26, 2023Assignee: OMRON CorporationInventors: Yutaka Tahara, Yuta Nagata
-
Patent number: 11706024Abstract: In a storage system that includes a plurality of storage devices configured into one or more write groups, quorum-aware secret sharing may include: encrypting a device key for each storage device using a master secret; generating a plurality of shares from the master secret such that a minimum number of storage devices required from each write group for a quorum to boot the storage system is not less than a minimum number of shares required to reconstruct the master secret; and storing the encrypted device key and a separate share of the plurality of shares in each storage device.Type: GrantFiled: August 13, 2021Date of Patent: July 18, 2023Assignee: PURE STORAGE, INC.Inventors: Andrew Bernat, Ethan Miller
-
Patent number: 11647054Abstract: A system for and a method of regulating the data interconnections between applications running on an infrastructure are provided. The system/method records access permission data into metadata embedded in the source code of each such application that regulates the data that can be received or transmitted by that application. In addition to regulating the receipt or transmission of data, the metadata can serve to provide instruction to firewalls and other regulating systems in order to configure those systems to allow the applications to receive and transmit data for which permissions have been recorded.Type: GrantFiled: June 2, 2021Date of Patent: May 9, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Ronald W. Ritchey, Ta-Wei Chen, Khanh Tran, David Laurance, Cedric Ken Wimberley, Parthasarathi Chakraborty, Aradhna Chetal, Donald B. Roberts