Patents Examined by Teshome Hailu
  • Patent number: 12047506
    Abstract: A device that includes a secure element or a secure environment receives a token for authenticating a user that has an account with a service provider. The device generates, based on the token, a set of keys that include at least a private key and a public key. The device performs a key authentication procedure to compare the set of keys and a configured set of keys and selects a public key, of the set of keys or the configured set of keys, based on a result of the key authentication procedure. The device causes a device identifier of the device and the public key to be provided to another device that uses the device identifier and the public key to perform an authentication procedure to authenticate the user. The device receives, from the other device, an indication of whether the device is connected to a network.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: July 23, 2024
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Warren Hojilla Uy, Manuel Enrique Caceres, Bruno Mendez
  • Patent number: 12045353
    Abstract: A microphone controller includes a processor programmed to receive voice input from one or more microphones to be utilized in a voice recognition session initiated by the microphone controller. Further the microphone controller includes a key store including one or more keys configured to encrypt the received voice input to an encrypted voice data.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: July 23, 2024
    Assignee: Denso Corporation
    Inventors: Ameer Kashani, Gopalakrishnan Iyer
  • Patent number: 12047407
    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
    Type: Grant
    Filed: August 1, 2023
    Date of Patent: July 23, 2024
    Assignee: Splunk Inc.
    Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
  • Patent number: 12032680
    Abstract: The technology disclosed herein enables an auxiliary device to run a service that can access and analyze data of a Trusted Execution Environment (TEE). The auxiliary device may establish an auxiliary TEE in the auxiliary device and establish a trusted communication link between the auxiliary TEE and the TEE (i.e., primary TEE). The primary TEE may execute a target program using the primary devices of a host device (e.g., CPU) and the auxiliary TEE may execute a security program using the auxiliary device (e.g., DPU). In one example, the primary and auxiliary TEEs may be established for a cloud consumer and the auxiliary TEE may execute a security service that can monitor data of the primary TEE even though the data is inaccessible to all other software executing external to the primary TEE (e.g., inaccessible to host operating system and hypervisor).
    Type: Grant
    Filed: March 31, 2022
    Date of Patent: July 9, 2024
    Assignee: Mellanox Technologies, Ltd.
    Inventors: Ahmad Atamli, Rami Ailabouni, Ahmad Saleh, Ariel Levanon, Thanh Nguyen, Mark Overby
  • Patent number: 12028377
    Abstract: Methods, systems, and devices supporting active fingerprinting for transport layer security (TLS) servers are described. In some systems, a client device may transmit a same set of client hello messages to each TLS server. The client device may receive a set of server hello messages in response to the standard set of client hello messages based on the contents of each client hello message. For example, a server hello message may indicate a selected cipher suite, TLS protocol version, and set of extensions in response to the specific information included in a client hello message. The client device may generate a hash value (e.g., a fuzzy hash) based on the set of server hello messages received from a TLS server. By comparing the hash values generated for different TLS servers, the client device may determine whether the TLS configurations for the different TLS servers are the same or different.
    Type: Grant
    Filed: July 28, 2022
    Date of Patent: July 2, 2024
    Assignee: Salesforce, Inc.
    Inventors: John Brooke Althouse, Andrew Smart, Randy Nunnally, Jr., Michael Brady, Caleb Yu
  • Patent number: 12028462
    Abstract: A method of generating a trusted chain code (“TCC”) message, comprising: receiving a smart contract whose execution causes a transfer of value in response to at least one of an occurrence of an event or a fulfillment of a condition, wherein the smart contract is digitally signed by a first entity private key and a second entity private key; generating a chain code comprising a hash of a chain code of the smart contract, the chain code corresponding to at least one of an occurrence of an event or a fulfillment of a condition of the smart contract; and posting the TCC message to a distributed ledger, wherein an execution of a portion of the chain code in response to at least one of the occurrence of the event or the fulfillment of the condition is validated against corresponding chain code in the chain code manifest.
    Type: Grant
    Filed: June 5, 2023
    Date of Patent: July 2, 2024
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
  • Patent number: 12028317
    Abstract: Systems and methods for receiving information on network firewall policy configurations are disclosed. Based on the received firewall configuration information, a configuration of a firewall and/or subnet of network devices is automatically provisioned and/or configured to control network traffic to and from the subnet.
    Type: Grant
    Filed: September 29, 2023
    Date of Patent: July 2, 2024
    Assignee: Level 3 Communications, LLC
    Inventors: Jin-Gen Wang, Travis D. Ewert
  • Patent number: 12021834
    Abstract: In an example aspect, a method includes receiving a plurality of login attempts from a network address over a length of time, querying log data to determine, for the network address, an average number of login failures of the plurality of login attempts over the length of time, calculating a failure rate metric based on the average number of login failures, determining that, the failure rate metric exceeds a reference number of login failures for the length of time, the reference number of login failures based on a historical average number of login failures for the length of time, and based in part on the determining, adding the network address to a system deny list.
    Type: Grant
    Filed: June 9, 2023
    Date of Patent: June 25, 2024
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Bryan D. Hall, Richard Joseph Schroeder, Nicola A. Maiorana
  • Patent number: 12015631
    Abstract: The present disclosure generally relates to systems, methods, and computer-readable media for identifying instances of vulnerabilities on a computing network and generating a graph representing pathways that an attacking entity may take with respect to accessing one or more sensitive assets. For example, one or more systems disclosed herein collect network information and vulnerability information to generate a graph including nodes and edges representing at least a portion of the computing network associated with different vulnerabilities. The systems described herein may use graph theory to generate or otherwise identify pathways that an attacker is likely to use in accessing the sensitive asset(s). The systems additionally may further evaluate the pathways and associated likelihoods/risks to intelligently select one or more action items associated with a reduction of risk to the networking system.
    Type: Grant
    Filed: March 30, 2021
    Date of Patent: June 18, 2024
    Assignee: DEEPSURFACE SECURITY, INC.
    Inventor: Timothy Daniel Morgan
  • Patent number: 12003526
    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to extract, from a website vulnerability scanner log, a uniform resource locator (URL) and a vulnerability score and vulnerability classification associated with the URL. The at least one processor is further configured to generate an application vulnerability graph comprising connected nodes that are associated with a field of the URL. The nodes are labeled to indicate the associated field of the URL and color coded based on the vulnerability score. The nodes are also associated with the vulnerability classification. The at least one processor is further configured to enable or disable security protection against a user-selected vulnerability classification of a user-selected node by generating web application firewall security rules and/or web application firewall relaxation rules.
    Type: Grant
    Filed: May 16, 2022
    Date of Patent: June 4, 2024
    Assignee: Citrix Systems, Inc.
    Inventors: Kasirao Velugu, Priya Bagaria, Thirumoorthi Thangamani, Ganesh Kathiresan
  • Patent number: 11997095
    Abstract: Methods and systems for managing permission controls are disclosed. A method can comprise receiving a request to perform one or more restricted activities. The request can include at least an identifier of a first user associated with the request and an identification of the one or more restricted activities. The identifier of the first user associated with the request and/or the identification of the one or more restricted activities can be presented to a second user, such as an administrator. A response to the request can be provided by the second user and transmitted comprising information relating to one or more of a grant, denial, or modification of the performance of the one or more restricted activities. The transmitted response can be configured to be processed by the source to effect grant, denial, or modification of the performance of the one or more restricted activities.
    Type: Grant
    Filed: May 11, 2015
    Date of Patent: May 28, 2024
    Assignee: COMCAST CABLE COMMUNICATIONS, LLC
    Inventors: Robb D'Egidio, Steven Leardi, Peter Simon, Marcus Loechner, Zhe Zhang
  • Patent number: 11997212
    Abstract: Methods, systems, and devices for payload validation for a memory system are described. A payload receiver may be a device that includes an array of memory cells configured to store data, and a payload transmitter may be a host of a payload receiver (e.g., a host device) or another device that is in communication with the payload receiver. A payload receiver may be configured to receive an information payload and a signature associated with the information payload. The received signature may be based on the information payload and an identifier of the payload receiver previously provided to the payload transmitter. The payload receiver may generate a signature based on the information payload and the identifier of the payload receiver (e.g., as stored or cached at the payload receiver), and authenticate the information payload based on the received signature and the generated signature.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: May 28, 2024
    Assignee: Micron Technology, Inc.
    Inventor: Zhan Liu
  • Patent number: 11991204
    Abstract: A method for implementing a migration action for a vulnerability includes receiving an indication that a target resource includes a vulnerability where the target resource is being hosted in a cloud environment and associated with a user of the cloud environment. The method also includes receiving a plurality of rules configured to mitigate vulnerabilities for cloud environment resources. The method further includes determining whether the plurality of rules include one or more rules corresponding to the vulnerability of the target resource. When the plurality of rules comprises the one or more rules corresponding to the vulnerability of the target resource, the method includes applying a reversible mitigation action associated with a respective rule of the one or more rules corresponding to the vulnerability of the target resource.
    Type: Grant
    Filed: January 23, 2023
    Date of Patent: May 21, 2024
    Assignee: Google LLC
    Inventor: Claudio Criscione
  • Patent number: 11991276
    Abstract: A secure element device that is configured to be cryptographically bound to a host device includes a secure element host key slot configured to store host key information that allows only the host device to control the secure element, a secure memory storing binding information, and limited functionality allowing the binding information to be read from the secure memory by the host device during a binding process. The binding information is cryptographically correlated with the host key information. The host key information is generated by the host device using the binding information read from the secure element and a secret key. The secure element device further includes general functionality only accessible to the host device using the host key information that is generated by the host device. The secure memory includes prevention measures impeding unauthorized entities from obtaining information from the secure memory.
    Type: Grant
    Filed: September 7, 2022
    Date of Patent: May 21, 2024
    Assignee: STMICROELECTRONICS, INC.
    Inventor: Giuseppe Pilozzi
  • Patent number: 11979497
    Abstract: Identity systems, methods, and media for auditing and notifying users concerning verifiable claims are provided.
    Type: Grant
    Filed: September 3, 2021
    Date of Patent: May 7, 2024
    Assignee: Google LLC
    Inventors: David Stein, John Wittrock
  • Patent number: 11979415
    Abstract: A device receives information identifying a specific host threat to a network, where the information includes a list of network addresses associated with the specific host threat. The device identifies network elements, of the network, associated with the specific host threat to the network, and determines a network control system associated with the identified network elements. The device determines a policy enforcement group of network elements, of the identified network elements, that maps to the list of network addresses associated with the specific host threat, where the network control system is associated with the policy enforcement group of network elements. The device determines a threat policy action to enforce for the specific host threat, and causes, via the network control system, the threat policy action to be enforced by the policy enforcement group of network elements.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: May 7, 2024
    Assignee: Juniper Networks, Inc.
    Inventors: Srinivas Nimmagadda, Jeffrey S. Marshall, Sunil G. Rawoorkar, Srinivasan Veeraraghavan, Prakash T. Seshadri
  • Patent number: 11979424
    Abstract: Techniques for providing contextual forensic data based on user activities. A first method includes identifying a user action in user activity data, wherein the user action is a discrete event initiated by a user, wherein the user action is performed with respect to a portion of a system; and correlating the identified user action with at least one system change, wherein the at least one system change is related to the portion of the system, wherein the at least one system change occurred after the user action. A second method includes taking a first snapshot before a user action occurs, wherein the user action is a discrete event initiated by a user, wherein the first snapshot is taken of at least a portion of a system; and taking a second snapshot after the user action occurs, wherein the second snapshot is taken of the at least a portion of the system.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: May 7, 2024
    Assignee: Twistlock, Ltd.
    Inventors: Liron Levin, Michael Kletselman, Ami Bizamcher, Dima Stopel, John Morello
  • Patent number: 11973791
    Abstract: A risk knowledge graph is created from information on risk events involving network entities of a private computer network. Each of the risk events is represented as a node in the risk knowledge graph. The nodes are connected by edges that represent the risk events. The nodes are grouped into communities of related nodes. A response action is performed against a community to mitigate a cybersecurity risk posed by the community.
    Type: Grant
    Filed: October 4, 2021
    Date of Patent: April 30, 2024
    Assignee: Trend Micro Incorporated
    Inventors: Zhijie Li, ZhengBao Zhang, Lili Diao
  • Patent number: 11971971
    Abstract: The present invention is a system for and method of enabling an initiating party to capture, store, and retrieve an image of at least one acknowledging party performing an acknowledgement requested by the initiating party where the acknowledging party(s) may be remotely located from the initiating party.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: April 30, 2024
    Assignee: LAD Verification Services, LLC
    Inventor: David C. Ruma
  • Patent number: 11968241
    Abstract: Methods, systems, and computer-readable media for auto-tuning permissions using a learning mode are disclosed. A plurality of access requests to a plurality of services and resources by an application are determined during execution of the application in a learning mode in a pre-production environment. The plurality of services and resources are hosted in a multi-tenant provider network. A subset of the services and resources that were used by the application during the learning mode are determined. An access control policy is generated that permits access to the subset of the services and resources used by the application during the learning mode. The access control policy is attached to a role associated with the application to permit access to the subset of the services and resources in a production environment.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: April 23, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Jacob A. Kjelstrup, Bharath Mukkati Prakash, Brigid Ann Johnson, Ujjwal Rajkumar Pugalia