Patents Examined by Syed A Roni
-
Patent number: 12141709Abstract: Systems and methods provide an application programming interface to offer action suggestions to third-party applications using context data associated with the third-party. An example method includes receiving content information and context information from a source mobile application, the content information representing information to be displayed on a mobile device as part of a source mobile application administered by a third party, the context information being information specific to the third party and unavailable to a screen scraper. The method also includes predicting an action based on the content information and the context information, the action representing a deep link for a target mobile application. The method further includes providing the action to the source mobile application with a title and a thumbnail, the source mobile application using the title and thumbnail to display a selectable control that, when selected, causes the mobile device to initiate the action.Type: GrantFiled: June 29, 2023Date of Patent: November 12, 2024Assignee: GOOGLE LLCInventors: Ibrahim Badr, Mauricio Zuluaga, Aneto Okonkwo, Gökhan Bakir
-
Patent number: 12118413Abstract: A system includes a cluster of nodes, memory, and a processor, where the cluster includes an application programming interface (API) server and one or more components. The processor is configured to initialize an interface to the API server, where the interface is operable to send status information from the one or more components within the cluster via a single output stream. The API server is configured to modify the single output stream of the API server to output status information associated with a first component of the one or more components within the cluster. The status information is aggregated and it is determined whether the cluster is at a failure point. In response to determining that the cluster is at a failure point, an execution signal is set to false, where the execution signal is accessible to an automation tool in communication with the cluster.Type: GrantFiled: July 10, 2023Date of Patent: October 15, 2024Assignee: Red Hat, Inc.Inventor: Naga Ravi Chaitanya Elluri
-
Patent number: 12113912Abstract: An electronic device is provided. The electronic device includes a communication device for transmitting or receiving a signal, a memory, and a processor connected to the communication device and the memory. The memory may store instructions for controlling the communication device so as to cause the processor to generate a key pair including a public key and a private key, receive authentication information from an authentication server by using the communication device, generate signature data by electronically signing the authentication information on the basis of the private key, generate transaction data including the signature data, transmit the transaction data to a blockchain network, and transmit transaction identification information corresponding to the transaction data to the authentication server.Type: GrantFiled: January 18, 2022Date of Patent: October 8, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Wooseok Jang, Youna Lee, Moonsung Na, Euiheon Jeong, Seongmin Je, Beomsoo Cho
-
Patent number: 12105801Abstract: A method and system for intrusion detection to detect malicious insider threat activities within a network user profiles. The method includes determining a behavior pattern for each user profile based on activity events, wherein the determination of the behavior pattern is executed by a Recurrent Neural Network. The method includes determining normal activity events and abnormal activity events for each user profile based on the behavior patterns, wherein the determination of the normal activity events and the abnormal activity events is executed by a Feed-Forward Neural Network. The method includes evaluating whether a recorded activity event is a normal activity event or an abnormal activity event based on the behavior pattern and the determined normal activity events and abnormal events for that user profile. The method includes detecting malicious activity for the user profile, if the recorded activity event is evaluated as an abnormal activity event.Type: GrantFiled: March 30, 2020Date of Patent: October 1, 2024Assignee: BULL SASInventors: Mathieu Garchery, Michael Granitzer
-
Patent number: 12095813Abstract: The described technology is generally directed towards homoglyph attack detection. A homoglyph attack detection service can create images of customer's protected domain names. A convolutional neural network can generate feature vectors based on the images. The feature vectors can be stored in a similarity search data store. Newly observed domain names can be compared to the customer's protected domain names, by also generating feature vectors for the newly observed domain names and conducting approximate nearest neighbor searches. Search results can be further evaluated by comparing protected domain names to newly observed domain names using a siamese neural network which applies a similarity threshold. Newly observed domain names that meet or exceed the similarity threshold can be flagged for further action.Type: GrantFiled: July 20, 2021Date of Patent: September 17, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Antoine Diffloth, Natalie Gilbert, Sundaresan Manoharan
-
Patent number: 12093437Abstract: Method for automatically protecting an object, a person, or an item of visual information from a risk of unwanted viewing by a third party, an unauthorized person and/or an image-recording device. The method includes the steps of: automatically detecting, by analyzing images from at least one Light Detection and Ranging (LIDAR) or from a camera arranged so as to cover a predefined surveillance area, the presence of a third party or of an unauthorized person and/or of the device in this area or nearby, the predefined surveillance area corresponding at least to an area from which the person or the device is capable of viewing the object, the person or the information, and in the event of positive detection, triggering a predefined action.Type: GrantFiled: June 10, 2021Date of Patent: September 17, 2024Inventor: Bruno Sangle-Ferriere
-
Patent number: 12093731Abstract: Systems and corresponding methods employ an object-oriented (OO) memory (OOM) to effect inter-hardware-client (IHC) communication among a plurality of hardware clients included in same. A system comprises a centralized OOM and the plurality of hardware clients communicate, directly, to the centralized OOM device via OO message transactions. The centralized OOM device effects IHC communication among the plurality of hardware clients based on the OO message transactions. Another system comprises a plurality of OO memories (OOMs) capable of inter-object-oriented-memory-device communication. A hardware client communicates, directly, to a respective OOM device via OO message transactions. The inter-object-oriented-memory-device communication effects IHC communication among the plurality of hardware clients based on the OO message transactions.Type: GrantFiled: March 8, 2023Date of Patent: September 17, 2024Assignee: Marvell Asia Pte, Ltd.Inventor: Nathan Chrisman
-
Patent number: 12081682Abstract: A method for determining a main chain of a blockchain, a device, and a storage medium. The method comprises: determining, on the basis of a detection result that it is detected that a blockchain has at least two fork chains, weights of blocks in the fork chains (110); determining, on the basis of the weights of the blocks comprised in the fork chains, the weights of the fork chains (120); and determining a main chain from the fork chains on the basis of the weights of the fork chains, and rolling back the fork chains except for the main chain (130).Type: GrantFiled: January 18, 2019Date of Patent: September 3, 2024Assignee: BAIDU ONLINE NETWORK TECHNOLOGY (BEIJING) CO., LTD.Inventor: Wei Xiao
-
Patent number: 12069075Abstract: A security monitoring system that detects abnormalities in moving body and analyzes a response method includes: a reception unit that receives a security log from the moving body; an attack determination unit that analyzes the security log to determine whether or not there was a cyber attack; a dynamic response permission confirmation unit that confirms whether communication with a software distribution management server (i.e., an over the air (OTA) center or simply a management server) is permitted; an information requesting unit that requests the OTA center for predetermined information when communication with the OTA center is permitted; and an execution instruction unit that instructs the OTA center to execute software update of the moving body based on the received predetermined information.Type: GrantFiled: July 27, 2021Date of Patent: August 20, 2024Assignee: DENSO CORPORATIONInventor: Taiji Abe
-
Patent number: 12058172Abstract: Systems and methods for defending against emoji domain web address phishing are disclosed. A system may provide computer system security in various instances in which a web address includes an emoji character, which can be rendered as a graphical icon on a user system, and which may cause user confusion leading to a possible computer security breach. The system receives a web address as an input to a web browser. The system processes the received web address to remove any emoji characters present in the received web address. The system compares the processed web address to the received web address and determines whether the processed web address matches the received web address. Various actions are performed to prevent successful phishing attempts against users based on whether the processed web address matches the received web address.Type: GrantFiled: June 14, 2021Date of Patent: August 6, 2024Assignee: PAYPAL, INC.Inventor: George Chen Kaidi
-
Patent number: 12050942Abstract: Methods and systems for providing visual dashboards for cloud-based products. One system includes an electronic processor configured to receive a request for a visual dashboard. The electronic processor is also configured to execute a first application programming interface (API) call to a first API-based product to access a first configuration file associated with the first API-based product. The electronic processor is also configured to receive a first API response from the first API-based product. The electronic processor is also configured to generate and output, based on the first configuration file, the visual dashboard, the visual dashboard providing information associated with the first API-based product.Type: GrantFiled: June 3, 2022Date of Patent: July 30, 2024Assignee: MASTERCARD TECHNOLOGIES CANADA ULCInventors: Justine Celeste Fox, Marc Grimson, Christopher Waddell, Chelsea Urquhart, Leena Ruhela
-
Patent number: 12041069Abstract: A method for detecting and classifying a domain generation algorithm (DGA) generation domain according to an embodiment of the present disclosure includes entering a domain address expressed as a vector of sequence numbers in a TextCNN, and replacing the vector with a one-hot vector corresponding to sequence number vector elements to express image representation.Type: GrantFiled: August 4, 2021Date of Patent: July 16, 2024Assignee: HOSEO UNIVERSITY ACADEMIC COOPERATION FOUNDATIONInventors: Tae Jin Lee, Chan Woong Hwang, Hyo Sik Kim
-
Patent number: 12041157Abstract: Privacy-preserving homomorphic inferencing utilizes batch processing on encrypted data records. Each data record has a private data portion of interest against which the inferencing is carried out. Batch processing is enabled with respect to a set of encrypted data records by techniques that ensure that each encrypted data record has its associated private data portion in a unique location relative to the other data records. The set of encrypted data records are then summed to generate a single encrypted data record against which the inferencing is done. In a first embodiment, the private data portions of interest are selectively and uniquely positioned at runtime (when the inferencing is being applied). In a second embodiment, the private data portions of interest are initially positioned with the data-at-rest, preferably in an off-line process; thereafter, at runtime individual encrypted data records are processed as necessary to adjust the private data portions to unique positions prior to batching.Type: GrantFiled: May 10, 2021Date of Patent: July 16, 2024Assignee: International Business Machines CorporationInventors: Kanthi Sarpatwar, Roman Vaculin, Ehud Aharoni, James Thomas Rayfield, Omri Soceanu
-
Patent number: 12021996Abstract: The present invention is directed to a system and method that normalized the intricacies of each crypto asset blockchain in order to provide a data model where transactions are represented as sets of debit and credit operations applied to accounts. The Universal Blockchain Data Model (UBDM) of the present invention translates various blockchain concepts into double entry bookkeeping concepts by creating two types of accounts: 1) user accounts and 2) virtual accounts such as issuance accounts and fee accounts.Type: GrantFiled: August 13, 2021Date of Patent: June 25, 2024Assignee: Coin Metrics Inc.Inventors: Antoine J. M. Le Calvez, Lucas A. Nuzzi
-
Patent number: 12019957Abstract: Examples herein describe systems and methods for hanger placement for computer-aided design (“CAD”). A plugin can provide a hanger placement option on a graphical user interface (“GUI”) of the CAD program. When the option is selected, the plugin can choose hanger locations on a run of ductwork or piping based on hanger parameters and collision detection. This can include testing hanger locations by building an array between the selected item and the ceiling of a plan in the GUI, and testing for collisions with other objects at each point in the array. If a collision is detected, a new hanger location is tested. The new hanger location can be selected based on the hanger parameters, such as by incrementing the interval between hangers while staying within a maximum interval.Type: GrantFiled: April 4, 2022Date of Patent: June 25, 2024Assignee: EVOLVE MEP, LLCInventors: David Ronson, Xiao Chun Yao
-
Patent number: 12014223Abstract: A content sharing method includes displaying, by an electronic device, an interface of a first application, where a text and a picture are displayed in the interface, performing, by a user, an operation on the picture in the interface such that the electronic device displays the picture in a suspended first window, dragging, by the user, the picture in the first window to a second application, and sharing, by the user, the picture with another user using the second application.Type: GrantFiled: May 28, 2020Date of Patent: June 18, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Yingfeng Hu
-
Patent number: 12008366Abstract: Early indications of application programming interface (API) usage are identified by correlation to particular issues with the API including singular and mutual consistency, completeness, accuracy, and staleness. Analysis of API input and output along with data type and formatting information facilitates identification of the API issues. Establishing a correlation between API usage and issues supports early detection of potential usage reduction on a case-by-case level. Corrective action to resolve identified issues may be performed in a timely manner to maintain usage levels.Type: GrantFiled: June 3, 2022Date of Patent: June 11, 2024Assignee: International Business Machines CorporationInventors: Ravi Chandra Chamarthy, Prateek Goyal, Manish Anand Bhide, Madhavi Katari
-
Patent number: 11997209Abstract: Devices, systems, and methods are provided for rotating cryptography secrets in data hashing. A method may include generating, based on a hashing technique, first obfuscated data using first data and a first version of a secret, and generating first metadata associated with the first obfuscated data, the first metadata indicative of the first version of the secret. The method may include determining a second version of the secret based on the first metadata. The method may include generating, based on the hashing technique, second obfuscated data using the first obfuscated data and the second version of the secret, and generating second metadata associated with the second obfuscated data, the second metadata indicative of the second version of the secret.Type: GrantFiled: March 22, 2021Date of Patent: May 28, 2024Assignee: Amazon Technologies, Inc.Inventors: Rahul Chopra, Maurice Lin, Pramod Raghavendran, Keerat Singh Sharma
-
Patent number: 11991277Abstract: Aspects include a cryptographic hardware security module having a secure embedded heat pipe and methods for assembling the same. The cryptographic hardware security module can include a printed circuit board having one or more components. The cryptographic hardware security module can further include an encapsulation structure having a top can and a bottom can. The top can is fixed to a first surface of the printed circuit board and the bottom can is fixed to second surface of the printed circuit board opposite the first surface. A heat pipe is positioned between the top can and the component. The heat pipe includes two or more 180-degree bends. A portion of the heat pipe extends beyond a secure region of the encapsulation structure.Type: GrantFiled: August 17, 2021Date of Patent: May 21, 2024Assignee: International Business Machines CorporationInventors: Arthur J. Higby, David Clifford Long, Edward N. Cohen, John R. Dangler, Matthew Doyle, Philipp K. Buchling Rego, William Santiago-Fernandez, Levi Campbell, James Busby
-
Patent number: 11983275Abstract: An apparatus comprises a processing device configured to determine, utilizing a firmware-based agent running in firmware, a boot flag status during a boot process of the processing device. The processing device is also configured to execute, responsive to the boot flag status being a first value, a system update handler of the firmware-based agent configured for provisioning of a secured runtime operating system on the processing device, wherein the provisioning comprises digitally signing an image of the secured runtime operating system utilizing a hardware-based root of trust key. The processing device is further configured to execute, responsive to the boot flag status being a second value, a secured operating system boot handler of the firmware-based agent configured for validating and loading secured runtime operating system, wherein the validation comprises performing attestation of a signature of the image of the secured runtime operating system utilizing the hardware-based root of trust key.Type: GrantFiled: January 18, 2022Date of Patent: May 14, 2024Assignee: Dell Products L.P.Inventors: John Henry Terpstra, Jeroen Diederik Cornelis Antonius Mackenbach