Patents Examined by Teshome Hailu
-
Patent number: 12047506Abstract: A device that includes a secure element or a secure environment receives a token for authenticating a user that has an account with a service provider. The device generates, based on the token, a set of keys that include at least a private key and a public key. The device performs a key authentication procedure to compare the set of keys and a configured set of keys and selects a public key, of the set of keys or the configured set of keys, based on a result of the key authentication procedure. The device causes a device identifier of the device and the public key to be provided to another device that uses the device identifier and the public key to perform an authentication procedure to authenticate the user. The device receives, from the other device, an indication of whether the device is connected to a network.Type: GrantFiled: June 30, 2021Date of Patent: July 23, 2024Assignee: Verizon Patent and Licensing Inc.Inventors: Warren Hojilla Uy, Manuel Enrique Caceres, Bruno Mendez
-
Patent number: 12045353Abstract: A microphone controller includes a processor programmed to receive voice input from one or more microphones to be utilized in a voice recognition session initiated by the microphone controller. Further the microphone controller includes a key store including one or more keys configured to encrypt the received voice input to an encrypted voice data.Type: GrantFiled: May 29, 2019Date of Patent: July 23, 2024Assignee: Denso CorporationInventors: Ameer Kashani, Gopalakrishnan Iyer
-
Patent number: 12047407Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.Type: GrantFiled: August 1, 2023Date of Patent: July 23, 2024Assignee: Splunk Inc.Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
-
Patent number: 12032680Abstract: The technology disclosed herein enables an auxiliary device to run a service that can access and analyze data of a Trusted Execution Environment (TEE). The auxiliary device may establish an auxiliary TEE in the auxiliary device and establish a trusted communication link between the auxiliary TEE and the TEE (i.e., primary TEE). The primary TEE may execute a target program using the primary devices of a host device (e.g., CPU) and the auxiliary TEE may execute a security program using the auxiliary device (e.g., DPU). In one example, the primary and auxiliary TEEs may be established for a cloud consumer and the auxiliary TEE may execute a security service that can monitor data of the primary TEE even though the data is inaccessible to all other software executing external to the primary TEE (e.g., inaccessible to host operating system and hypervisor).Type: GrantFiled: March 31, 2022Date of Patent: July 9, 2024Assignee: Mellanox Technologies, Ltd.Inventors: Ahmad Atamli, Rami Ailabouni, Ahmad Saleh, Ariel Levanon, Thanh Nguyen, Mark Overby
-
Patent number: 12028377Abstract: Methods, systems, and devices supporting active fingerprinting for transport layer security (TLS) servers are described. In some systems, a client device may transmit a same set of client hello messages to each TLS server. The client device may receive a set of server hello messages in response to the standard set of client hello messages based on the contents of each client hello message. For example, a server hello message may indicate a selected cipher suite, TLS protocol version, and set of extensions in response to the specific information included in a client hello message. The client device may generate a hash value (e.g., a fuzzy hash) based on the set of server hello messages received from a TLS server. By comparing the hash values generated for different TLS servers, the client device may determine whether the TLS configurations for the different TLS servers are the same or different.Type: GrantFiled: July 28, 2022Date of Patent: July 2, 2024Assignee: Salesforce, Inc.Inventors: John Brooke Althouse, Andrew Smart, Randy Nunnally, Jr., Michael Brady, Caleb Yu
-
Patent number: 12028462Abstract: A method of generating a trusted chain code (“TCC”) message, comprising: receiving a smart contract whose execution causes a transfer of value in response to at least one of an occurrence of an event or a fulfillment of a condition, wherein the smart contract is digitally signed by a first entity private key and a second entity private key; generating a chain code comprising a hash of a chain code of the smart contract, the chain code corresponding to at least one of an occurrence of an event or a fulfillment of a condition of the smart contract; and posting the TCC message to a distributed ledger, wherein an execution of a portion of the chain code in response to at least one of the occurrence of the event or the fulfillment of the condition is validated against corresponding chain code in the chain code manifest.Type: GrantFiled: June 5, 2023Date of Patent: July 2, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
-
Patent number: 12028317Abstract: Systems and methods for receiving information on network firewall policy configurations are disclosed. Based on the received firewall configuration information, a configuration of a firewall and/or subnet of network devices is automatically provisioned and/or configured to control network traffic to and from the subnet.Type: GrantFiled: September 29, 2023Date of Patent: July 2, 2024Assignee: Level 3 Communications, LLCInventors: Jin-Gen Wang, Travis D. Ewert
-
Patent number: 12021834Abstract: In an example aspect, a method includes receiving a plurality of login attempts from a network address over a length of time, querying log data to determine, for the network address, an average number of login failures of the plurality of login attempts over the length of time, calculating a failure rate metric based on the average number of login failures, determining that, the failure rate metric exceeds a reference number of login failures for the length of time, the reference number of login failures based on a historical average number of login failures for the length of time, and based in part on the determining, adding the network address to a system deny list.Type: GrantFiled: June 9, 2023Date of Patent: June 25, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Bryan D. Hall, Richard Joseph Schroeder, Nicola A. Maiorana
-
Patent number: 12015631Abstract: The present disclosure generally relates to systems, methods, and computer-readable media for identifying instances of vulnerabilities on a computing network and generating a graph representing pathways that an attacking entity may take with respect to accessing one or more sensitive assets. For example, one or more systems disclosed herein collect network information and vulnerability information to generate a graph including nodes and edges representing at least a portion of the computing network associated with different vulnerabilities. The systems described herein may use graph theory to generate or otherwise identify pathways that an attacker is likely to use in accessing the sensitive asset(s). The systems additionally may further evaluate the pathways and associated likelihoods/risks to intelligently select one or more action items associated with a reduction of risk to the networking system.Type: GrantFiled: March 30, 2021Date of Patent: June 18, 2024Assignee: DEEPSURFACE SECURITY, INC.Inventor: Timothy Daniel Morgan
-
Patent number: 12003526Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to extract, from a website vulnerability scanner log, a uniform resource locator (URL) and a vulnerability score and vulnerability classification associated with the URL. The at least one processor is further configured to generate an application vulnerability graph comprising connected nodes that are associated with a field of the URL. The nodes are labeled to indicate the associated field of the URL and color coded based on the vulnerability score. The nodes are also associated with the vulnerability classification. The at least one processor is further configured to enable or disable security protection against a user-selected vulnerability classification of a user-selected node by generating web application firewall security rules and/or web application firewall relaxation rules.Type: GrantFiled: May 16, 2022Date of Patent: June 4, 2024Assignee: Citrix Systems, Inc.Inventors: Kasirao Velugu, Priya Bagaria, Thirumoorthi Thangamani, Ganesh Kathiresan
-
Patent number: 11997095Abstract: Methods and systems for managing permission controls are disclosed. A method can comprise receiving a request to perform one or more restricted activities. The request can include at least an identifier of a first user associated with the request and an identification of the one or more restricted activities. The identifier of the first user associated with the request and/or the identification of the one or more restricted activities can be presented to a second user, such as an administrator. A response to the request can be provided by the second user and transmitted comprising information relating to one or more of a grant, denial, or modification of the performance of the one or more restricted activities. The transmitted response can be configured to be processed by the source to effect grant, denial, or modification of the performance of the one or more restricted activities.Type: GrantFiled: May 11, 2015Date of Patent: May 28, 2024Assignee: COMCAST CABLE COMMUNICATIONS, LLCInventors: Robb D'Egidio, Steven Leardi, Peter Simon, Marcus Loechner, Zhe Zhang
-
Patent number: 11997212Abstract: Methods, systems, and devices for payload validation for a memory system are described. A payload receiver may be a device that includes an array of memory cells configured to store data, and a payload transmitter may be a host of a payload receiver (e.g., a host device) or another device that is in communication with the payload receiver. A payload receiver may be configured to receive an information payload and a signature associated with the information payload. The received signature may be based on the information payload and an identifier of the payload receiver previously provided to the payload transmitter. The payload receiver may generate a signature based on the information payload and the identifier of the payload receiver (e.g., as stored or cached at the payload receiver), and authenticate the information payload based on the received signature and the generated signature.Type: GrantFiled: June 26, 2019Date of Patent: May 28, 2024Assignee: Micron Technology, Inc.Inventor: Zhan Liu
-
Patent number: 11991204Abstract: A method for implementing a migration action for a vulnerability includes receiving an indication that a target resource includes a vulnerability where the target resource is being hosted in a cloud environment and associated with a user of the cloud environment. The method also includes receiving a plurality of rules configured to mitigate vulnerabilities for cloud environment resources. The method further includes determining whether the plurality of rules include one or more rules corresponding to the vulnerability of the target resource. When the plurality of rules comprises the one or more rules corresponding to the vulnerability of the target resource, the method includes applying a reversible mitigation action associated with a respective rule of the one or more rules corresponding to the vulnerability of the target resource.Type: GrantFiled: January 23, 2023Date of Patent: May 21, 2024Assignee: Google LLCInventor: Claudio Criscione
-
Patent number: 11991276Abstract: A secure element device that is configured to be cryptographically bound to a host device includes a secure element host key slot configured to store host key information that allows only the host device to control the secure element, a secure memory storing binding information, and limited functionality allowing the binding information to be read from the secure memory by the host device during a binding process. The binding information is cryptographically correlated with the host key information. The host key information is generated by the host device using the binding information read from the secure element and a secret key. The secure element device further includes general functionality only accessible to the host device using the host key information that is generated by the host device. The secure memory includes prevention measures impeding unauthorized entities from obtaining information from the secure memory.Type: GrantFiled: September 7, 2022Date of Patent: May 21, 2024Assignee: STMICROELECTRONICS, INC.Inventor: Giuseppe Pilozzi
-
Patent number: 11979497Abstract: Identity systems, methods, and media for auditing and notifying users concerning verifiable claims are provided.Type: GrantFiled: September 3, 2021Date of Patent: May 7, 2024Assignee: Google LLCInventors: David Stein, John Wittrock
-
Patent number: 11979415Abstract: A device receives information identifying a specific host threat to a network, where the information includes a list of network addresses associated with the specific host threat. The device identifies network elements, of the network, associated with the specific host threat to the network, and determines a network control system associated with the identified network elements. The device determines a policy enforcement group of network elements, of the identified network elements, that maps to the list of network addresses associated with the specific host threat, where the network control system is associated with the policy enforcement group of network elements. The device determines a threat policy action to enforce for the specific host threat, and causes, via the network control system, the threat policy action to be enforced by the policy enforcement group of network elements.Type: GrantFiled: December 11, 2020Date of Patent: May 7, 2024Assignee: Juniper Networks, Inc.Inventors: Srinivas Nimmagadda, Jeffrey S. Marshall, Sunil G. Rawoorkar, Srinivasan Veeraraghavan, Prakash T. Seshadri
-
Patent number: 11979424Abstract: Techniques for providing contextual forensic data based on user activities. A first method includes identifying a user action in user activity data, wherein the user action is a discrete event initiated by a user, wherein the user action is performed with respect to a portion of a system; and correlating the identified user action with at least one system change, wherein the at least one system change is related to the portion of the system, wherein the at least one system change occurred after the user action. A second method includes taking a first snapshot before a user action occurs, wherein the user action is a discrete event initiated by a user, wherein the first snapshot is taken of at least a portion of a system; and taking a second snapshot after the user action occurs, wherein the second snapshot is taken of the at least a portion of the system.Type: GrantFiled: May 29, 2019Date of Patent: May 7, 2024Assignee: Twistlock, Ltd.Inventors: Liron Levin, Michael Kletselman, Ami Bizamcher, Dima Stopel, John Morello
-
Patent number: 11973791Abstract: A risk knowledge graph is created from information on risk events involving network entities of a private computer network. Each of the risk events is represented as a node in the risk knowledge graph. The nodes are connected by edges that represent the risk events. The nodes are grouped into communities of related nodes. A response action is performed against a community to mitigate a cybersecurity risk posed by the community.Type: GrantFiled: October 4, 2021Date of Patent: April 30, 2024Assignee: Trend Micro IncorporatedInventors: Zhijie Li, ZhengBao Zhang, Lili Diao
-
Patent number: 11971971Abstract: The present invention is a system for and method of enabling an initiating party to capture, store, and retrieve an image of at least one acknowledging party performing an acknowledgement requested by the initiating party where the acknowledging party(s) may be remotely located from the initiating party.Type: GrantFiled: September 8, 2021Date of Patent: April 30, 2024Assignee: LAD Verification Services, LLCInventor: David C. Ruma
-
Patent number: 11968241Abstract: Methods, systems, and computer-readable media for auto-tuning permissions using a learning mode are disclosed. A plurality of access requests to a plurality of services and resources by an application are determined during execution of the application in a learning mode in a pre-production environment. The plurality of services and resources are hosted in a multi-tenant provider network. A subset of the services and resources that were used by the application during the learning mode are determined. An access control policy is generated that permits access to the subset of the services and resources used by the application during the learning mode. The access control policy is attached to a role associated with the application to permit access to the subset of the services and resources in a production environment.Type: GrantFiled: June 26, 2019Date of Patent: April 23, 2024Assignee: Amazon Technologies, Inc.Inventors: Jacob A. Kjelstrup, Bharath Mukkati Prakash, Brigid Ann Johnson, Ujjwal Rajkumar Pugalia