Patents Examined by Teshome Hailu
  • Patent number: 11397823
    Abstract: A system comprising one or more computers implements a hardware feature access service. The hardware feature access service stores private keys that correspond to digital certificates embedded in chipsets of devices enrolled in the hardware feature access service. The hardware feature access service is configured to issue access or access revocation messages to the chipsets to “lock” or “unlock” associated hardware components. The hardware feature access service also implements a service interface that allows clients to request changes to enabled feature sets for devices enrolled in the hardware feature access service. In response to such requests, the hardware feature service automatically and wirelessly enables or disables feature sets by locking or unlocking relevant hardware components of a device relevant to enabling or disabling the requested feature sets.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: July 26, 2022
    Assignee: Amazon Technologies, Inc.
    Inventor: Marco Argenti
  • Patent number: 11368489
    Abstract: An apparatus for security management based on event correlation in a distributed multi-layered cloud environment is disclosed, wherein the distributed multi-layered cloud environment comprises at least one first layer cloud service provider, and at least one second layer cloud service provider as a tenant of the first layer cloud service provider, and the apparatus is installed at least on one cloud service provider of the first layer cloud service provider and the second layer cloud service provider, the apparatus comprising: a central processing module configured to: provide correlation as a Service (CORRaaS) to a plurality of tenants as virtualized security appliances or virtualized security functions for the plurality of tenants's lices, generate a second interface for allowing the plurality of tenants to configure the correlation as a Service (CORRaaS), and correlate and process security events from security functions in the plurality of tenants' slices to form processed security event data, and to detec
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: June 21, 2022
    Assignee: Nokia Technologies Oy
    Inventors: Iris Adam, Jing Ping, Stephane Mahieu
  • Patent number: 11368473
    Abstract: The automated estimation that an interface service has been misconfigured. Sensitive interface services are first identified based on common characteristics, and those characteristics are associated with sensitivity based on behavior across multiple clusters. Thereafter, the threat assessment estimates that a particular interface service is misconfigured if the particular interface service has these same common characteristics, is accessible from outside the cluster, and does not require authentication. Cluster administrators can therefore be more fully and timely advised when a misconfiguration of an interface service subjects their cluster to undue security risks.
    Type: Grant
    Filed: September 21, 2020
    Date of Patent: June 21, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Josef Weizman, Ram Haim Pliskin, Dotan Patrich
  • Patent number: 11363057
    Abstract: At least some embodiments are directed to a computer-based cyber-attack frequency tracking system that determines types and frequencies of cyber-attacks. In at least some embodiments, the method of a cyber-attack frequency tracking system may operate a processor in an enterprise computing environment for automatically conducting a process that comprises receiving, a plurality of data values that represent a plurality of cyber-attacks. Determining cyber-attack types, and then determining the frequency of attempts and contacts with assets. After that determining likelihood values. Aggregating these determinations to produce a quantifiable value of a likelihood values of each of the plurality of cyber-attack types.
    Type: Grant
    Filed: April 17, 2020
    Date of Patent: June 14, 2022
    Assignee: American Express Travel Related Services Company, Inc.
    Inventors: Douglas S. Talbot, Phillip Collett, Tony Durivaux
  • Patent number: 11363061
    Abstract: In one aspect, a method for preventing attacks on a web application server by monitoring and validating the API calls executed by the dynamic language code of web application is provided. The method includes the step of scanning the computer system for web applications and the location of dynamic language code or script files used by the web applications. The method includes the step of parsing all script files to identify API calls, the location of API calls, and arguments used in the API calls and storing them as rules.
    Type: Grant
    Filed: July 13, 2020
    Date of Patent: June 14, 2022
    Inventor: Jayant Shukla
  • Patent number: 11356435
    Abstract: Systems and methods are provided for sharing authentication information. The systems and methods include retrieving, with a messaging application, a list of applications that are installed on a user device; searching the list of applications to identify a given application within the list of applications that is configured to share authentication information with the messaging application; and in response to identifying the given application within the list of applications, generating for display within a graphical user interface of the messaging application an option to authorize the messaging application to share authentication information with the given application.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: June 7, 2022
    Assignee: Snap Inc.
    Inventors: Charles Burson DePue, Patrick Mandia
  • Patent number: 11336642
    Abstract: A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is adapted to be unreadable and unmodifiable by the chip or a chip reader. The chip also includes a comparator for providing an indicator of whether given input matches the second authentication code. The chip also includes an authentication circuit that is operable to read the first authentication code from the first memory region, present the first authentication code to the comparator, and in response to receiving an indicator from the comparator indicating that the first and second authentication codes match, unlock at least one of (i) a communication interface of the chip to allow data to be transmitted therethrough to a chip reader and (ii) a third memory region of the chip to allow data to be read therefrom.
    Type: Grant
    Filed: April 9, 2020
    Date of Patent: May 17, 2022
    Assignee: CARDEX SYSTEMS INC.
    Inventors: Dennis Bernard Van Kerrebroeck, Craig Michael Horn, Bernard Marie-Andre Van Kerrebroeck
  • Patent number: 11329956
    Abstract: Systems, computer program products, and methods are described herein for scalable encryption framework using virtualization and adaptive sampling. The present invention is configured to receive metadata associated with one or more intrusion types from an intrusion data lake; initiate an adaptive instance sampling engine on the metadata associated with the one or more intrusion types to generate a sampled intrusion data lake; initiate one or more simulations of atomic intrusion on a firewall; generate one or more prioritized combination of the one or more sampled intrusion types; initiate one or more simulations of cumulative intrusion on the firewall using the one or more prioritized combination of the one or more sampled intrusion types; determine an atomic performance metric and a cumulative performance metric of the firewall; and generate a robustness report for the firewall.
    Type: Grant
    Filed: July 28, 2020
    Date of Patent: May 10, 2022
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Madhusudhanan Krishnamoorthy, Raghavendran Sukumaran, Vinothkumar Babu
  • Patent number: 11323472
    Abstract: Systems, methods, and software described herein provide security actions based on related security threat communications. In one example, a method of operating an advisement system includes identifying a security threat within the computing environment, wherein the computing environment comprises a plurality of computing assets. The method further provides obtaining descriptor information for the security threat, and retrieving related communication interactions based on the descriptor information. The method also includes generating a response to the security threat based on the related communication interactions.
    Type: Grant
    Filed: September 25, 2020
    Date of Patent: May 3, 2022
    Assignee: Splunk Inc.
    Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
  • Patent number: 11303429
    Abstract: In one example an apparatus comprises a computer readable memory, an XMSS operations logic to manage XMSS functions, a chain function controller to manage chain function algorithms, a secure hash algorithm-2 (SHA2) accelerator, a secure hash algorithm-3 (SHA3) accelerator, and a register bank shared between the SHA2 accelerator and the SHA3 accelerator. Other examples may be described.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: April 12, 2022
    Assignee: INTEL CORPORATION
    Inventors: Santosh Ghosh, Vikram Suresh, Sanu Mathew, Manoj Sastry, Andrew H. Reinders, Raghavan Kumar, Rafael Misoczki
  • Patent number: 11297105
    Abstract: A system and method for dynamically determining a trust level of an end-to-end link of a computer database, including: in a preparation stage: capturing a first set of messages of an end-to-end link; compressing a skeleton of each message of the first set of messages to generate a construct of each message of the first set of messages, the skeleton includes the message without a value field; creating a characteristic histogram of the constructs of the first set of messages; and during an operation stage: capturing a second set of messages of the end-to-end link; compressing a skeleton of each message of the second set of messages to generate a construct of each of the second set of messages; creating a work histogram of the constructs of the second set of messages; and determining a trust level of the end-to-end link by comparing the work histogram with the characteristic histogram.
    Type: Grant
    Filed: July 22, 2020
    Date of Patent: April 5, 2022
    Assignee: International Business Machines Corporation
    Inventor: Oded Sofer
  • Patent number: 11290489
    Abstract: A computing system performs adaptive clustering of machines (e.g., computing devices) and/or machine users in an organization for attack surface reduction (ASR) responsively to event feedback including system-based exclusion events and user-based requests for exclusion. The cluster adaptation may be applied to conventional vector-quantization clustering algorithms, for example K-Means, expectation-maximization (EM) clustering, or affinity clustering, to provide adaptable clusters of machines or users. The adaptation enables aggregation or disaggregation of endpoints into clusters to minimize negative business impacts on the organization while maximizing security in view of changes in the organization that occur dynamically such as varying roles for users, new applications and updates being released, and the like.
    Type: Grant
    Filed: March 7, 2019
    Date of Patent: March 29, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yalan Xing, Joseph Carl Nelson Blackbird, Francis Allan Tan Seng, Prachi Rathee, Peter Thayer
  • Patent number: 11265299
    Abstract: A method is implemented by a network device operating as a content node for securely distributing a content object over an information centric networking (ICN) network. The method implements a unique obscured retrieval sequence. The method includes receiving an interest for a chunk of the content object from a client device, where the chunk is identified with an obscured chunk identifier, translating the obscured chunk identifier into a general chunk identifier for the content object, and sending the chunk of the content object to the client device.
    Type: Grant
    Filed: May 23, 2016
    Date of Patent: March 1, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: David Ian Allan
  • Patent number: 11258859
    Abstract: A method for pairing a first network device with a second network device is provided. The method may include receiving a first signal corresponding to a first pairing sequence received at the first network device, receiving a second signal corresponding to a second pairing sequence received at the second network device, comparing the first pairing sequence with the second pairing sequence, and pairing the first network device and the second network device when the second pairing sequence correlates to the first pairing sequence.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: February 22, 2022
    Assignee: Disruptive Technologies Research AS
    Inventor: Sigve Tjora
  • Patent number: 11244073
    Abstract: Provided is a method for anonymising data stocks, including the steps of determining a combination of generalization stages for quasi-identifiers of a data stock at a central node; transmitting the combination of generalization stages to a plurality of sub-nodes; and a parallel performing of an anonymisation of the data stock on the basis of the combination of generalization stages by the sub-nodes.
    Type: Grant
    Filed: November 28, 2016
    Date of Patent: February 8, 2022
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Andreas Hapfelmeier, Mike Imig, Michael Mock
  • Patent number: 11228433
    Abstract: Using various embodiments, methods and systems for securing user data are described. In one embodiment, a system includes a server side application accessing a service key from a conventional key vault and an escrowed key which can then be used to compute a key to the key using which information can be encrypted. Other embodiments include using a timer service to further safeguard secure user information.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: January 18, 2022
    Inventor: Baskaran Dharmarajan
  • Patent number: 11171940
    Abstract: In some examples, a robot middleware system including a first robot middleware node, a second robot middleware node, and one or more secure encrypted type-enforced context message between the first robot middleware node and the second robot middleware node.
    Type: Grant
    Filed: March 30, 2018
    Date of Patent: November 9, 2021
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Gregory Burns
  • Patent number: 11153286
    Abstract: An example method performed by one or more processing devices includes: generating encrypted content at a sender device using one or more first keys that are available from a key provider; and outputting the encrypted content to a recipient device over one or more channels; where the key provider enables access, following authorization, by the recipient device to one or more second keys for decrypting the encrypted content; and where an entity that enables the channel is unaffiliated with the key provider.
    Type: Grant
    Filed: April 23, 2020
    Date of Patent: October 19, 2021
    Assignee: BLUERISC, INC.
    Inventor: Csaba Andras Moritz
  • Patent number: 11144659
    Abstract: Approaches presented herein enable evaluating a multimedia item to be posted to a website (e.g., social networking site, forum, blog, etc.) to determine whether a censoring action needs to be performed on the multimedia item prior to posting the multimedia item. Specifically, in response to a request to post a multimedia item to a website, the multimedia item is analyzed to determine a context of the multimedia item. The context may be derived from specific elements depicted in the multimedia item. Also, an entity (e.g., a person, logo, trademark, brand) may be identified. The preferences related to the entity are retrieved. The context is compared against the preferences of the entity to determine whether a variance exists. When a variance is determined, a censoring action related to the multimedia item may be performed prior to posting the multimedia item.
    Type: Grant
    Filed: February 7, 2020
    Date of Patent: October 12, 2021
    Assignee: Wayfair LLC
    Inventors: Robert H. Grant, Trudy L. Hewitt
  • Patent number: 11138338
    Abstract: A technique includes accessing data representing a plurality of values; and determining a pseudonym value for a given value of the plurality of values. Determining the pseudonym includes encrypting the given value to provide a first encrypted value; encrypting an attribute that is associated with the given value to provide a second encrypted value; and generating the pseudonym value based on the first encrypted value and the second encrypted value.
    Type: Grant
    Filed: March 20, 2018
    Date of Patent: October 5, 2021
    Assignee: Micro Focus LLC
    Inventors: Timothy Roake, Luther Martin