Patents Examined by Techane Gergiso
  • Patent number: 11502999
    Abstract: A cyber security system for providing security to a railway, the system comprising: a data monitoring and processing hub; a network comprising a plurality of data collection agents synchronized to a same network clock and configured to monitor railway infrastructure devices and onboard devices of rolling stock having a train communication network (TCN), and forward monitored data to the hub for processing by the hub to detect anomalies in railway operation that are indicative of a cyber-attack; at least one anonymizer configured to scrub information items from data that the hub receives from a data collection agent of the plurality of data collection agents which may be used to identify the cyber security system or the railway for which the system provides security.
    Type: Grant
    Filed: December 22, 2019
    Date of Patent: November 15, 2022
    Assignee: CYLUS CYBER SECURITY LTD.
    Inventors: Gal Shmueli, Michael Shifman, Amir Levintai
  • Patent number: 11494719
    Abstract: The present disclosure describes systems and method for performing a vulnerabilities assessment of an organization. A campaign controller executes one or more simulated phishing campaigns directed to a plurality of users of an organization, using a plurality of models determined by the campaign controller based at least on identification of the organization. The campaign controller stores to a database the results of execution of the one or more simulated phishing campaigns and based on the results, the campaign controller determines one or more vulnerabilities to phishing for the organization. In one embodiment, the campaign controller determines a percentage of the plurality of users of the organization that are phish-prone. In some embodiments, the users of the organization that are phish-prone interacted with a link of a simulated phishing communication.
    Type: Grant
    Filed: May 6, 2020
    Date of Patent: November 8, 2022
    Assignee: KnowBe4, Inc.
    Inventors: Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
  • Patent number: 11468155
    Abstract: This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).
    Type: Grant
    Filed: March 22, 2021
    Date of Patent: October 11, 2022
    Assignee: Apple Inc.
    Inventors: Anthony Fadell, Andrew Hodge, Stephan Schell, Ruben Caballero, Jesse Lee Dorogusker, Stephen Zadesky, Emery Sanford
  • Patent number: 11469894
    Abstract: A computing device may include a memory and a processor configured to cooperate with the memory to store an authentication token having first and second authentication credentials associated therewith. The first and second authentication credentials may be different from one another. The processor may further cooperate with a server to access a session based upon the authentication token.
    Type: Grant
    Filed: January 10, 2020
    Date of Patent: October 11, 2022
    Assignee: CITRIX SYSTEMS, INC.
    Inventors: Georgy Momchilov, Hubert Divoux, Roberto Valdes
  • Patent number: 11463880
    Abstract: A security analysis method for a control plane and a system therefor are disclosed. The method includes generating a test case for a security property unsuitable for a control plane operation, transmitting the generated test case to target equipment and receiving a response of the control plane for the test case from the target equipment, and diagnosing security for the security property of the target equipment by analyzing the received response. The generating includes generating the test case for the security property by modulating a value of a specific field in a control plane protocol header into a value unsuitable for an operation on standards.
    Type: Grant
    Filed: December 16, 2019
    Date of Patent: October 4, 2022
    Assignee: Korea Advanced Institute of Science and Technology
    Inventors: Yongdae Kim, Hongil Kim, Jiho Lee, Eunkyu Lee
  • Patent number: 11451535
    Abstract: To provision a client application on a client device, a user may be provided with a QR code, a one-time password, or a manual entry page for starting a credential provisioning process via a credential provisioning service provided by a credential provisioning server in a secure network. The client application may include information on trusted servers operating in the secure network. The credential provisioning server may operate to perform a sequence of actions to verify user credentials and determine, based on rules applicable to the user, the client device, or a combination thereof, whether the client application is to be provisioned on a client device. If so, the credential provisioning server may operate to generate a key pair, obtain a signed certificate, encrypt them, and send them to the client device such that the client application can use them to establish a mutual secure connection with a trusted server.
    Type: Grant
    Filed: June 12, 2019
    Date of Patent: September 20, 2022
    Assignee: HYPORI LLC
    Inventors: Brian J. Vetter, Mohammad Salman Dhedhi
  • Patent number: 11451528
    Abstract: Representations of authentication objects are provided for selection via an interface. An authentication object may be generated to include information obtained from one or more sensors of a device. A selected authentication object may contain information sufficient for authentication with a corresponding system. The interface may provide multiple representations of authentication objects that are usable with different service providers. The interface, executed by a first device, may be configured to authenticate a second device.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: September 20, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Jesper Mikael Johansson, Gregory Branchek Roth
  • Patent number: 11451376
    Abstract: There is presented a method, a computing device and a computing system for establishing secure communication between computing devices. A method for a first computing device to establish trusted communication with a second computing device comprises the first computing device sending a request to create a secure channel to the second computing device, the request comprising a first cryptographic element and a device identifier. The first computing device receives a channel identifier from the second computing device in response to the request, and a notification over a secure channel using the device identifier, the notification comprising a channel identifier and a second cryptographic element.
    Type: Grant
    Filed: April 16, 2020
    Date of Patent: September 20, 2022
    Assignee: Mastercard International Incorporated
    Inventors: John Allen, Ashley Waldron, Dawid Nowak
  • Patent number: 11451579
    Abstract: A method for protecting electronics systems of a vehicle from cyberattacks includes intercepting messages transmitted on a first communications bus between a plurality of Electronic Control Units (ECUs) of a vehicle. The ECUs are communicatively coupled to the first communications bus. At least one recipient ECU that is a recipient of the intercepted messages is determined. The intercepted messages and information indicating the determined at least one recipient ECU are stored in a log. The method further includes detecting a computer attack of the vehicle based on satisfaction of at least one condition of a rule by the stored messages and information in the log and blocking the computer attack of the vehicle by performing an action associated with the rule. The rule may depend on whether one or more intercepted messages are malicious messages and a recipient ECU of the malicious messages.
    Type: Grant
    Filed: April 8, 2021
    Date of Patent: September 20, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Pavel V. Dyakin, Alexander V. Shadrin, Dmitry A. Kulagin
  • Patent number: 11451519
    Abstract: An anonymous credential authentication system receives an anonymous credential signature value indicating that setting proposition information using a credential is satisfied from a user device that has been issued the credential combined with multiple pieces of attribute information constituting personal information, generates signer authentication information that confirms a signer of the anonymous credential signature value using an opening key, and outputs the signer authentication information.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: September 20, 2022
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jung Yeon Hwang, Seung-Hyun Kim, Sung-Hoon Lee, Soo Hyung Kim, Sangrae Cho, Seok Hyun Kim, Young Seob Cho, Youngsam Kim, Jong-Hyouk Noh, Kwantae Cho, Jin-Man Cho
  • Patent number: 11438169
    Abstract: Described herein is a system and remote server that may enable a user device to gain access to a secure physical area or physical resource. The remote server may generate, store, and send a first access token to a user device in response to a request to access the physical area or physical resource. The remote server can receive an authentication request from a universal access control device at the location of the physical area or physical resource. The authentication request can contain a second access token and location information of the user device. The remote server can verify the second access token by comparing it to the stored first access token and location information about the access control device. Upon authentication and verification, the user device may gain entry to the secure area.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: September 6, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Kaushik Mani, Balarajan Balasubramaniam, Carl Haverl, Prakash Krishnamurthy, Ahmet Musabeyoglu, Peeyush Champalal Nahar, Dushyant Rao Chegoori, Hoshgeldy Tachmuradov, Ziyi Zhang
  • Patent number: 11431706
    Abstract: A communication control system includes a first communication control device and a second signal processing device. The first communication control device is connected to a client terminal device and a network communication grid. The second communication control device is connected to a server terminal device and the network communication grid.
    Type: Grant
    Filed: August 28, 2018
    Date of Patent: August 30, 2022
    Assignees: Kabushiki Kaisha Toshiba, Toshiba Infrastructure Systems & Solutions Corporation
    Inventors: Yuuki Tomoeda, Kei Sugibuchi, Hiroki Fukuoka
  • Patent number: 11425138
    Abstract: This disclosure provides an apparatus, method, and non-transitory computer readable medium for operating networking for members and supporting a controlled-access establishment. The apparatus includes a memory and a processor couple to the memory. The memory stores a plurality of member profiles corresponding to a plurality of member devices including a first member profile corresponding to a first member device, where each member profile contains information about a member related to the member a member device.
    Type: Grant
    Filed: February 11, 2020
    Date of Patent: August 23, 2022
    Assignee: TNB Growth Corporation
    Inventors: J. Stuart Fitts, Phillip J. Romano
  • Patent number: 11423140
    Abstract: There are provided methods and systems for providing security on endpoints which are used on environment where temporary user access is needed without any session persistence. When a file is requested to be executed on any endpoint, the execution source would be checked for user information. If the file execution is requested by guest and/or pre-configured user accounts or any of the parent process is launched by guest and/or pre-configured user accounts, it is launched inside the secure container to isolate the all resource usage of that application from the rest of the system and user applications. This achieves the isolated data and application execution between temporary session/user files and persistent or system users session files. It enables a secure computing environment on an endpoint for shared and temporary user access enabled endpoints.
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: August 23, 2022
    Inventors: Melih Abdulhayoglu, Ilker Simsir
  • Patent number: 11418350
    Abstract: A management system and a method for secure signing of certificates, which have a certificate signing subsystem set up in a device of a controlled management site, unless authorized externally, internal data of the subsystem cannot be accessed arbitrarily, and each unit applying for a certificate needs confirmation of identity to increase the security of certificate application and signing. In addition, the certificate signing subsystem is a device with arithmetic capability, which operates fast and can increase the efficiency of certificate signing. Because units or companies applying for certificates do not need to set up a certificate signing system by themselves, provided that they are connected to the certificate signing subsystem of the present invention, certificates can be applied for and obtained, thereby saving business operating costs.
    Type: Grant
    Filed: December 3, 2020
    Date of Patent: August 16, 2022
    Assignee: ECO-LUXURY TECHNOLOGY CO., LTD.
    Inventors: Yu-Cheng Lai, Chia-Yen Lu
  • Patent number: 11405377
    Abstract: Methods, systems, and devices for secure endpoint authentication credential control are described. An endpoint agent may receive an indication from an operating system of an endpoint device that the operating has received authentication credentials from a user. The endpoint agent may be housed in the endpoint device, and may detect a change between the received set of authentication credentials and a previous version of authentication credentials. Based on this detection, the endpoint agent may transmit the received authentication credentials to a central server. The central server may transmit the authentication credentials to an information technology (IT) resource which requires user authentication prior to granting access to a user.
    Type: Grant
    Filed: October 14, 2020
    Date of Patent: August 2, 2022
    Assignee: JumpCloud, Inc.
    Inventors: Rajat Bhargava, Peter Gengler, Jacob Beck, Greg Keller, Tae Kim
  • Patent number: 11394534
    Abstract: An electronic device according to an embodiment may include a processor, a wireless communication module, and a security module. The security module may store and manage a shared key and an authentication key. The processor may be configured to receive a request for transmission of the authentication key to a first external electronic device and transmit, to the security module, information and command for generation of the shared key. The security module may generate the shared key based on the information for generation of the shared key, and the security module may transmit, to the first external electronic device, the generated shared key and information associated with the generated shared key. Various other embodiments are possible.
    Type: Grant
    Filed: March 14, 2019
    Date of Patent: July 19, 2022
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Yi Yang, Jonghwan Kim, Moonseok Kang, Bokun Choi
  • Patent number: 11379568
    Abstract: The invention relates to a system and method for preventing a protected computing device from executing unauthorized processor commands. A data entry database of the system stores encoded data entered by a human user as data entry events. A command verification module of the system implements an authentication algorithm for determining whether a processor command to be executed by the computing device originates from a trusted source. The command verification module determines the trustworthiness of a processor command as a function of parameters of the processor command, which include an association of the command with one or more of the data entry events. Determination can also be made based on other processor command parameters, such as the type of processor command and/or contextual parameters of the processor command.
    Type: Grant
    Filed: September 4, 2020
    Date of Patent: July 5, 2022
    Inventor: Dan Ram
  • Patent number: 11367314
    Abstract: A security check system using face ID sensing for secure access to an electronic platform includes a light source, a camera disposed adjacent the light source and configured to form an image of the object while a light beam provided by the light source is incident on the object, a computer memory configured to store face ID data of an authorized person, and a processing module configured to analyze the image to extract facial signatures and to determine whether there exists an indication of a retro-reflection, compare the facial signatures to the face ID data to determine whether a match exists, in response to determining that the match exists and the indication of the retro-reflection exists, grant access to the electronic platform, and in response to determining that the match does not exist or the indication of the retro-reflection does not exist, deny access to the electronic platform.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: June 21, 2022
    Assignee: Shenzhen Goodix Technology Co., Ltd.
    Inventors: Yi He, Bo Pi
  • Patent number: 11363041
    Abstract: A method selectively installs a particular signature on a particular gateway based on the type of signature and the type of computer asset that is protected by that particular gateway. A system and/or analyst receives multiple signatures, where different signatures from the multiple signatures are specific for different types of computer assets. The system and/or analyst identifies and extracts a particular signature, from the multiple signatures, that will protect, if implemented on the appropriate gateway, a particular computer asset. The system and/or analyst identifies the appropriate gateway that protects the particular computer asset, and installs only the extracted particular signature from the multiple signatures on that appropriate gateway.
    Type: Grant
    Filed: May 15, 2020
    Date of Patent: June 14, 2022
    Assignee: International Business Machines Corporation
    Inventors: Adam Paquin, Peyton Duncan, Kevin Shen, Johathan Bees, Srinivas Babu Tummalapenta