Patents Examined by Syed A Zaidi
  • Patent number: 11481505
    Abstract: A cloud computing platform, a method of operating a cloud computing platform, and a private business entity network are provided herein. In one embodiment, the cloud computing platform includes: (1) a consolidated data reservoir configured to store saved data collected by a business entity, (2) an application layer having an infrastructure for developing and running applications, including at least one customer application of a customer of the business entity, and (3) a service layer configured to control access of the customer application to the saved data and allow the customer application to execute proprietary algorithms of the business entity.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: October 25, 2022
    Assignee: Halliburton Energy Services, Inc.
    Inventor: Nathan P. Leach
  • Patent number: 11475158
    Abstract: Disclosed is a method of building a customized deep learning (DL) stack classifier to detect organization sensitive data in images, referred to as image-borne organization sensitive documents, and protecting against loss of the image-borne organization sensitive documents, including distributing a trained feature map extractor stack with stored parameters to an organization, under the organization's control, configured to allow the organization to extract from image-borne organization sensitive documents, feature maps that are used to generate updated DL stacks, without the organization forwarding images of organization-sensitive training examples, and to save non invertible feature maps derived from the images, and ground truth labels for the image.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: October 18, 2022
    Assignee: Netskope, Inc.
    Inventors: Yi Zhang, Dong Guo, Yihua Liao, Siying Yang, Krishna Narayanaswamy
  • Patent number: 11470084
    Abstract: A method and system for performing query analysis are described. The method and system include receiving a query for a data source at a wrapper. The wrapper includes a dispatcher and a service. The dispatcher receives the query and is data agnostic. The method and system also include providing the query from the dispatcher to the data source and to the service as well as analyzing the query using the service.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: October 11, 2022
    Assignee: Cyral Inc.
    Inventors: Manav Ratan Mital, Srinivas Nageswarrao Vadlamani, Pramod Chandraiah
  • Patent number: 11463404
    Abstract: Embodiments disclosed herein provide systems and methods for quarantining communications at a network edge by routing traffic through a specialized network edge system. In a particular embodiment a method provides, identifying criteria indicating whether certain network traffic should be handled by the specialized network edge system. The method further provides receiving first information about first network traffic received at a first network edge system for a communication network. In response to determining, based on the first information, that the first network traffic satisfies the criteria, the method provides routing the first network traffic through the specialized network edge system.
    Type: Grant
    Filed: April 12, 2017
    Date of Patent: October 4, 2022
    Assignee: Avaya Inc.
    Inventors: Joel M. Ezell, Manish Chatterjee, Biswajyoti Pal
  • Patent number: 11456879
    Abstract: Provided is a method for secure processing of an authorization verification request from a unit requesting authorization verification, the authorization verification request being included in a transaction of a block chain, wherein a registration entity performs a check on a block chain data structure and on the transaction protected by the block chain and, in the event of a successful check, forwards the authorization verification request to a certification entity. The authorization verification request is included in a transaction and the registration entity performs a check on a block chain data structure and on the transaction. The transaction and the authorization verification request are protected by the block chain. In particular, the authorization verification request can no longer be altered retrospectively and information that has been transmitted to the registration entity within the context of the authorization verification request is stored in the block chain and protected against manipulation.
    Type: Grant
    Filed: July 4, 2017
    Date of Patent: September 27, 2022
    Inventor: Rainer Falk
  • Patent number: 11455385
    Abstract: Authentication tokens, systems, and methods are described. An illustrative method is disclosed to include receiving an electronic file including a digital image, receiving biometric information that is associated with a person, modifying the electronic file with the biometric information such that one or more pixels in the digital image are replaced with the biometric information, and storing the modified electronic file as a digital authentication token to be used in connection with authorized publications of original digital work.
    Type: Grant
    Filed: December 20, 2021
    Date of Patent: September 27, 2022
    Assignees: Nant Holdings IP, LLC, ImmunityBio, Inc.
    Inventors: Luna Witchey, John Zachary Sanborn, Patrick Soon-Shiong, Nicholas James Witchey
  • Patent number: 11442789
    Abstract: A method and a system for securely applying proprietary software functions of software sources to proprietary data of a population of users are disclosed. The proprietary data of a user is not exposed to software sources, and the proprietary software of a software source is not accessible to users. A collaboration software module, placed in at least one cloud, is configured to establish, and continually update, a data structure holding task permissions from grantors to grantees, a grantor being a software source or a user, and a grantee is also a software source or a user. The collaboration software module of a cloud applies software function of a software source, communicatively coupled to the cloud, to proprietary data of an originating user, communicatively coupled to the same cloud, to produce a requisite result which is only accessible to the originating user or any grantees of the originating user (the grantor).
    Type: Grant
    Filed: September 9, 2021
    Date of Patent: September 13, 2022
    Assignee: AFFINIO INC.
    Inventor: Stephen James Frederic Hankinson
  • Patent number: 11436323
    Abstract: During operation, the system obtains a training dataset during a training mode, wherein the training dataset includes counts of actions performed by users while operating applications in the computer system. Next, the system uses the training dataset to produce corresponding per-action datasets. The system then cleanses the training dataset based on counts of actions in the per-action datasets to produce a cleansed training dataset, and uses the cleansed training dataset to produce corresponding per-user datasets. Next, the system trains per-user models based on the per-user datasets to detect anomalous actions of users. The system then obtains a surveillance dataset during a surveillance mode, wherein the surveillance dataset includes counts of actions performed by users while operating applications in the computer system. Next, the system uses the trained per-user models to detect anomalous actions in the surveillance dataset. Finally, when an anomalous action is detected, the system triggers an alert.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: September 6, 2022
    Assignee: Oracle International Corporation
    Inventors: Aleksey M. Urmanov, Alan Paul Wood
  • Patent number: 11436599
    Abstract: Implementations of the present specification provide a blockchain-based identity verification method and related hardware. The method includes: An agent client generates an identity verification request based on identity verification input information of a business platform, the identity verification input information indicating an identity verification parameter for identity verification and an identity verification platform that executes the identity verification. The agent client sends the identity verification request to the identity verification platform. The identity verification platform performs identity verification on the identity verification parameter to obtain a result of the identity verification. The identity verification platform submits a transaction including a verifiable credential of a result of the identity verification to a blockchain.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: September 6, 2022
    Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Yawen Wei, Peng Qiu, Yin Dong, Yang Liu, Xiaobo Zhang, Pei Xu, Zhiwei Wang
  • Patent number: 11429744
    Abstract: An information management device includes a memory and a processor configured to receive an access request to information related to individual, the access request including designation of a first data table including first information related to the individual and a second data table including second information related to the individual, perform, in accordance with whether the first data table and the second data table include a same key, determination of whether the individual is identified based on a combination of the first information and the second information to be included in a response to the access request, and perform a stop of output of the response when it is determined that the individual is identified based on the combination.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: August 30, 2022
    Assignee: FUJITSU LIMITED
    Inventor: Kazuhiro Taniguchi
  • Patent number: 11431740
    Abstract: Embodiments include a computing device with a memory and a processor configured to perform operations including computing a cybersecurity and privacy (CS&P) framework profile (or risk factor) for a cybersecurity program implemented by an enterprise, computing a CS&P maturity level (or maturity factor) for the cybersecurity program, determining an integrated result for the cybersecurity program based at least in part on a combination of the CS&P framework profile and the maturity factor.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: August 30, 2022
    Assignee: Criterion Systems, Inc.
    Inventors: Robert Carl Heckman, Daniel Keith Chandler
  • Patent number: 11431747
    Abstract: A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence. In some implementations, some or all messages (email, text messages, VoIP calls) in a campaign after the first simulated phishing email, text message, or call may be used to direct the user to open the first simulated phishing email or text message, or to open the latest simulated phishing email or text message. In some implementations, simulated phishing emails, text messages, or phone calls of a campaign may be intended to lure the user to perform a different requested action, such as selecting a hyperlink in an email or text message, or returning a voice call.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: August 30, 2022
    Assignee: KnowBe4, Inc.
    Inventors: Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
  • Patent number: 11425157
    Abstract: A method, apparatus, and system provide the ability to act on cyber risks and reduce cyber attacks. System characteristics and system information for a cyber system are gathered. The system characteristics and system information are pre-processed to identify vulnerabilities that are relevant to the cyber system. A system model of a cyber environment is generated for the cyber system. One or more features are converted from cyber threat reports to one or more semantically relevant queries over the system model. The system model is reasoned over to generate one or more answers relevant to the one or more semantically relevant queries. Attack models are executed over the system model to generate actionable intelligence and reduce cyber attacks.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: August 23, 2022
    Assignee: CALIFORNIA INSTITUTE OF TECHNOLOGY
    Inventors: Kymie Tan, Jeremy L. Pecharich, Arun A. Viswanathan, Marc I. Pomerantz, Deniz E. Celik, Bryan Johnson, Brian Wright
  • Patent number: 11425560
    Abstract: A communication system for a working machine includes a communication device disposed on the working machine, and a mobile terminal to be connected to the communication device. The communication device transmits a service universal unique identifier (UUID) to the mobile terminal. The mobile terminal transmits unique information to the communication device. The communication device issues connection request to the mobile terminal after receiving the unique information. The mobile terminal requests transmission of authentication information after issuing the connection request, the authentication information being used for paring. The communication device transmits the authentication information to the mobile terminal in response to the request. And, the mobile terminal judges whether the paring is established based on the authentication information, and executes a program based on the service universal unique identifier (UUID) when the paring is established.
    Type: Grant
    Filed: December 19, 2018
    Date of Patent: August 23, 2022
    Assignee: KUBOTA CORPORATION
    Inventors: Ryosuke Kinugawa, Keisuke Egashira, Keisuke Miura
  • Patent number: 11409903
    Abstract: Method, system and product for performing private and non-private tasks in Augmented Reality (AR) systems. A privacy policy of a user using an AR device is obtained. A frame sensor is utilized to obtain frames for processing. An overlay display for the frame is generated. The overlay display is generated based on an execution of a non-private task on a non-trusted device and based on an execution of a private task on a trusted device. The private task and the non-private task are determined based on the privacy policy. The overlay display is displayed by an AR device.
    Type: Grant
    Filed: October 10, 2019
    Date of Patent: August 9, 2022
    Assignee: SHMUEL UR INNOVATION LTD
    Inventors: Ziv Glazberg, Shmuel Ur
  • Patent number: 11409911
    Abstract: A data-masking tool encoded on one or more computing readable storage media that includes a code that uses a combination of fields that uniquely identifies data in a record and utilizing it as a reference to mask original data with substitute values, by either aggregating several into one, mapping one-to-one or expanding one into a set.
    Type: Grant
    Filed: June 6, 2019
    Date of Patent: August 9, 2022
    Inventors: Mushkatblat Virginia Yevgeniya, Yuriy Lobzakov
  • Patent number: 11379617
    Abstract: Systems and methods are described for receiving a byte stream from a data provider. Data elements of a data record included in the byte stream may be identified and transferred to buffer memory. A key-value map may be generated to map the identified data elements to their respective memory locations in the buffer memory. Based on a data directive associated with the data provider and using the key-value map, filtering of the data elements may be performed, and the filtered data elements may be provided to a data recipient.
    Type: Grant
    Filed: October 22, 2021
    Date of Patent: July 5, 2022
    Assignee: Akoya LLC
    Inventors: Asanka Dissanayake, Greyson Hill
  • Patent number: 11381582
    Abstract: Systems and methods for enhancing resiliency of a power system (e.g., an energy cyber-physical system (ECPS)) against cyber-attacks are provided. An internet of things (IoT)-based digital twin (DT) for cyber-physical networked microgrids (NMGs) can be implemented to be a centric oversight for the NMG system. A cloud system can host the controllers (cyber things) and the sensors (physical things) of the power system into the cloud IoT core in terms of the IoT shadow. The DT can cover the digital replica for the physical layer, the cyber layer(s), and their hybrid interactions.
    Type: Grant
    Filed: June 7, 2021
    Date of Patent: July 5, 2022
    Assignee: THE FLORIDA INTERNATIONAL UNIVERSITY BOARD OF TRUSTEES
    Inventors: Osama Mohammed, Ahmed A. Saad
  • Patent number: 11373000
    Abstract: Systems and methods are described for receiving at an intermediary entity a token from a data provider that enables access to a user's data at a data provider, where the token is received without an intermediary entity receiving user credentials. A request is received from a data recipient to receive data from the data provider, where the token is required to access the data. Data may be received from the data provider using the token, and the received data may be filtered based on a data directive associated with the data provider, to identify which data the data recipient is permitted to access. The identified data may be provided to the data recipient.
    Type: Grant
    Filed: October 22, 2021
    Date of Patent: June 28, 2022
    Assignee: Akoya LLC
    Inventors: Denis Babani, Asanka Dissanayake, Jeffrey Kukesh, Anil Mahalaha, Stuart Rubinstein
  • Patent number: 11372980
    Abstract: A method includes, by a computer associated with a security reporter, updating a component vulnerability entry blockchain to represent a state of a component vulnerability entry of a software component vulnerability database. The method includes, by the computer, providing the updated component vulnerability entry blockchain to a management authority so that the management authority updates a master blockchain for the software component vulnerability database. The updated master blockchain includes a plurality of component vulnerability entry blockchains, which represent corresponding states of component vulnerability entries of the software component vulnerability database, including the updated component vulnerability entry.
    Type: Grant
    Filed: June 14, 2019
    Date of Patent: June 28, 2022
    Assignee: NETIQ CORPORATION
    Inventors: Michael F. Angelo, Lloyd L. Burch, Baha Masoud