Patents Examined by Thaddeus J Plecha
-
Patent number: 12160328Abstract: Systems and methods for providing multi-perimeter firewalls via a virtual global network are disclosed. In one embodiment the network system may comprise an egress ingress point in communication with a first access point server, a second access point server in communication with the first access point server, an endpoint device in communication with the second access point server, a first firewall in communication with the first access point server, and a second firewall in communication with the second access point server. The first and second firewalls may prevent traffic from passing through their respective access point servers. The first and second may be in communication with each other and exchange threat information.Type: GrantFiled: March 4, 2022Date of Patent: December 3, 2024Assignee: UMBRA Technologies Ltd.Inventors: Joseph E. Rubenstein, Carlos Eduardo Oré
-
Patent number: 12158963Abstract: Aspects of the disclosure relate to using machine-learning models to determine graduated levels of access to secured data for remote devices. In some embodiments, a computing platform may establish a connection with a mobile device. Subsequently, based on establishing the connection, the platform may identify initial device information, device features, and user information. The platform may input the identified information into an authentication model to compute a baseline authentication score and then may identify an initial level of access to secured resources for the mobile device. Thereafter, the platform may receive from the mobile device, AR/VR device information captured by the mobile device. The platform may input the AR/VR device information into the authentication model to compute an augmented authentication score. Based on the augmented score, the platform may identify an augmented level of access to secured resources for the mobile device.Type: GrantFiled: October 5, 2023Date of Patent: December 3, 2024Assignee: Bank of America CorporationInventors: George Anthony Albero, Maharaj Mukherjee, Deborah Mayers, Jinna Kim
-
Patent number: 12158936Abstract: A control system for a technical installation, in particular a process or manufacturing installation, includes at least one component upon which a certificate service is computer implemented, wherein the certificate service is configured to check a certificate store that is assigned to the component or a further component to determine whether two or more certificates, which only differ from one another in terms of their validity period, are stored in the certificate store, and in the event of the check identifying two or more certificates of this type, to initiate revocation and removal from the certificate store of the certificate or certificates with the validity period that ends the earliest, such that only the certificate with the validity period that ends the latest remains stored in the certificate store.Type: GrantFiled: October 27, 2022Date of Patent: December 3, 2024Assignee: SIEMENS AKTIENGESELLSCHAFTInventor: Anna Palmin
-
Patent number: 12153654Abstract: Aspects of the disclosure relate to multicomputer processing and dissemination of data files. A computing platform having at least one processor, a memory, and a communication interface may search one or more social media platforms for unauthorized dissemination of a data file. The computing platform may correlate a unique identifying feature(s) of the disseminated data file to that of a copy of the data file previously distributed to a linked user account. The computing platform may transmit, via the communication interface, to an administrative computing device, an unauthorized dissemination report which, when processed by the administrative computing device causes a notification to be displayed on the administrative computing device. The notification may identify the linked user account associated with the unauthorized dissemination, the name, content, or general nature of the data file, and/or the social media platform(s) on which the data file was discovered.Type: GrantFiled: July 24, 2023Date of Patent: November 26, 2024Assignee: Bank of America CorporationInventors: Elizabeth R. Liuzzo, Jennifer Walsh, Christopher J. Stott
-
Patent number: 12149540Abstract: Various embodiments provide systems and methods for providing security in a ZTNA system.Type: GrantFiled: October 3, 2022Date of Patent: November 19, 2024Assignee: Fortinet, Inc.Inventor: Robert A. May
-
Patent number: 12143382Abstract: Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment are disclosed. A computing sub-system may receive an electronic processing request and a first signed data packet having a first payload that was hashed and encrypted using a first private key. The first payload may comprise first processing output and a first timestamp. The sub-system may verify the first signed data packet by decrypting it using a first public key. The sub-system may execute computing operations to satisfy the electronic processing request, producing second processing output. The sub-system may configure a data packet with a second payload comprising at least the second processing output and a second timestamp. The sub-system may encrypt the second payload using a second private key producing a second signed data packet. The sub-system may transmit to a second sub-system the second signed data packet.Type: GrantFiled: March 8, 2022Date of Patent: November 12, 2024Assignee: Gemini IP, LLCInventors: Andrew Laucius, Eric Winer, Ismail Cem Paya
-
Patent number: 12143484Abstract: The present application relates to networking technologies, communication cube technologies, and, more particularly, to methods, apparatus, techniques, and means for communication security, encryption, and privacy in network communications.Type: GrantFiled: June 30, 2023Date of Patent: November 12, 2024Assignee: Crius Technology Group, Inc.Inventors: Glenn John Robertson, William O. Jones
-
Patent number: 12126727Abstract: Systems, methods, and computer-readable storage media for ensuring electronic communications have not been intercepted and manipulated. An exemplary device generates a public/private pair of keys, and transmits the public key to another device with information about the data to be shared. The second device encrypts associated data, while also executing a hash function on at least a portion of the data. The first device receives the encrypted data, decrypts it, and verifies its accuracy using a third party. The third party also executes the hash function on the data received from the first device, and transmits the output of that hash function to the first device. Both the first device and second devices and display the hash values, allowing users to visually determine if the data has been manipulated during the transaction.Type: GrantFiled: July 7, 2023Date of Patent: October 22, 2024Assignee: Capital One Services, LLCInventors: Austin Walters, Mark Watson, Vincent Pham, Reza Farivar, Fardin Abdi Taghi Abad, Jeremy Goodsitt
-
Patent number: 12118550Abstract: The present invention comprises a computer-implemented method for zero-trust authentication and session management utilizing the Bitcoin Lightning Network. A user requests access to the resource of a service provider and the user provides authentication material to securely access the service provider. The service provider initiates a Hold Invoice via a cryptographic function to generate a pre-image hash instructing the user to authorize release a specified amount of Bitcoin. Bitcoin is then moved into the Hold Invoice where it remains during an authentication attempt. A successful attempt issues an access token to log into an authenticated session. The Hold Invoice remains in place until the session ends, then the Hold Invoice is canceled and Bitcoin is released to the user. An unsuccessful attempt or a violations of terms of use, reveals the pre-image, denies the user access, and Bitcoin is transferred to the service provider as a settled payment transaction.Type: GrantFiled: January 18, 2024Date of Patent: October 15, 2024Assignee: AUTHLN LLCInventors: James Michael Siers, Maxwell Dignan
-
System and method for validating users in a virtual ecosystem based on stacking of digital resources
Patent number: 12107863Abstract: Embodiments of the present invention provide a system for validating users in a virtual ecosystem based on stacking of digital resources. The system is configured for identifying initiation of a resource interaction between a first user and a second user in a digital ecosystem, receiving a verification request from at least one of the first user and the second user, prompting the first user and the second user to provide digital resources, receiving first number of stacked digital resources from the first user and second number of stacked digital resources from the second user, calculating a first score for the first user based on the first number of stacked digital resources, calculating a second score for the second user based on the second number of stacked digital resources, and processing the resource interaction based on inputs received from the first user and the second user in the digital ecosystem.Type: GrantFiled: November 1, 2022Date of Patent: October 1, 2024Assignee: BANK OF AMERICA CORPORATIONInventor: Saurabh Gupta -
Patent number: 12093379Abstract: Aspects of the disclosure relate to preventing unauthorized screen capture activity. A computing platform may detect, via an infrared sensor associated with a computing device, an infrared signal from a second device attempting an unauthorized image capture of contents being displayed by a display device of the computing device. Subsequently, the computing platform may determine, via the computing platform, the contents being displayed by the display device. Then, the computing platform may retrieve a record of the contents being displayed by the display device. Then, the computing platform may determine a risk level associated with the infrared signal. Subsequently, the computing platform may perform, via the computing platform and based on the risk level, a remediation task to prevent the unauthorized image capture.Type: GrantFiled: May 16, 2023Date of Patent: September 17, 2024Assignee: Bank of America CorporationInventors: Michael Beveridge, Elizabeth R. Liuzzo, Daniel Horne, Marci Landy
-
Patent number: 12088628Abstract: In one embodiment, an access policy enforcement service receives a user authentication request from an end-user device. The access policy enforcement service identifies a telemetry collection intent from the user authentication request. The access policy enforcement service determines a monitoring policy based on the telemetry collection intent identified from the user authentication request. The access policy enforcement service configures, according to the monitoring policy, one or more telemetry collection agents to collect telemetry for traffic associated with the end-user device.Type: GrantFiled: October 8, 2021Date of Patent: September 10, 2024Assignee: Cisco Technology, Inc.Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Rahul Rammanohar, Kondaveeti Lakshmi Ganesh, David John Zacks
-
Patent number: 12081660Abstract: The present disclosure provides for a system ensuring the integrity of received data. The system includes a processor, a trusted platform module, and a memory storing instructions. Upon a request from the processor, the trusted platform module generates an asymmetric key pair including a private key and a public key. The trusted platform module provides the public key and an encrypted private key to the processor. The processor generates a checksum of received content data and sends the checksum to the trusted platform module. The processor also loads the encrypted private key into the trusted platform module. The trusted platform module decrypts the encrypted private key, encrypts the checksum with the private key, and provides the encrypted checksum to the processor. The processor sends the content data together with the encrypted checksum to an external device. The external device may decrypt the encrypted checksum with the public key.Type: GrantFiled: May 26, 2023Date of Patent: September 3, 2024Assignee: Red Hat, Inc.Inventors: Francisco Javier Martinez Canillas, Alberto Carlos Ruiz Ruiz
-
Patent number: 12079355Abstract: Apparatus and method for executing hidden computational functions in a distributed data processing environment. In some embodiments, a trust boundary includes a target device such as a storage device, and a source device such as a client device in a computer network. A storage device processor executes a hidden command function (HCF) routine to accumulate HCF output data in a local cache responsive to an HCF command received from the client device over a data interface. The processor further establishes a smaller retention boundary within the trust boundary that includes the storage device and excludes the client device. The HCF output data are stored locally in a non-volatile memory (NVM) of the storage device while not transferring any portion of the HCF output data outside the retention boundary, including to the client device. The HCF routine can update a block-chain ledger or take some other form to provide data security.Type: GrantFiled: June 22, 2022Date of Patent: September 3, 2024Assignee: Seagate Technology, LLCInventors: Marc Timothy Jones, David Jerome Allen, Steven Williams, Jason Matthew Feist
-
Patent number: 12074973Abstract: A system performs digital notarization using a biometric identification service. A signature requesting service receives a request to validate a digital item with a signature for a person. The signature requesting service provides a payload that identifies the digital item and/or the person to an identity service. The identity service obtains one or more digital representations of biometrics for the person, determines an identity for the person, and returns a data structure including the payload and one or more identity attestations regarding the determined identity. The identity service encrypts at least a portion of the data structure using a private encryption key. A public encryption key for the identity service can then be used to decrypt the portion to verify that the data structure was generated by the identity service after determining the identity. In this way, validation can be verified to the full trust level of the identification service.Type: GrantFiled: July 6, 2023Date of Patent: August 27, 2024Assignee: SECURE IDENTITY, LLCInventor: Rob Wisniewski
-
Patent number: 12074969Abstract: A transmitter device for a secure communication based on quantum cryptography, the transmitter device comprises a transmitter optical communication module for transmitting light pulses from the transmitter device to a receiver device, and the transmitter optical communication module enables exchange of a quantum key between the transmitter device and the receiver device. The transmitter device comprises transmitter data communication module for exchanging data between the transmitter device and the receiver device, the data is encrypted by the quantum key thereby ensuring a secure communication between the transmitter device and the receiver device. The transmitter device further contains a status display on a front side of the transmitter device for displaying status of the secure communication between the transmitter device and the receiver device.Type: GrantFiled: January 8, 2021Date of Patent: August 27, 2024Assignee: COGNIZANT TECHNOLOGY SOLUTIONS INDIA PVT. LTD.Inventors: Sandeep Deb, Aan Singh Chauhan, Indranil Mitra
-
Patent number: 12061589Abstract: The present disclosure relates to a search for illegal (illegitimate) content In particular, the present disclosure provides the search in an efficient manner by excluding pieces of presumed illegitimate content from the candidates of illegitimate content for comparing with legitimate content. The illegitimate content comprises content posted by an unauthorized user without a legitimate ownership of the content. An illegitimate content sensing device according to the present disclosure comprises a presumed illegitimate content deletion part for, on the basis of a profile of candidate illegitimate content, identifying pieces of the candidate illegitimate content having a profile which is within a degree of identicalness to a profile of previously identified illegitimate content as presumed illegitimate content.Type: GrantFiled: February 22, 2019Date of Patent: August 13, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Hiroko Muto, Takahito Kawanishi, Osamu Yoshioka, Ryo Kitahara
-
Patent number: 12058252Abstract: The present application discloses a key security management system and a key security management method, a computer-readable storage medium, and a computer program. The key security management system includes a security host and a hardware security device. The security host is configured to receive a first operation request, verify the first operation request, and generate a second operation request based on the first operation request when the verification is passed, wherein the first operation request and the second operation request both include an identification.Type: GrantFiled: December 30, 2019Date of Patent: August 6, 2024Assignee: Shanghai NanoJClean Technology Co., Ltd.Inventors: Jianliang Gu, Bangya Ma
-
Patent number: 12045344Abstract: Aspects of the disclosure relate to preventing unauthorized screen capture activity. A computing platform may detect, via an infrared sensor associated with a computing device, an infrared signal from a second device attempting an unauthorized image capture of contents being displayed by a display device of the computing device. Subsequently, the computing platform may determine, via the computing platform, the contents being displayed by the display device. Then, the computing platform may retrieve a record of the contents being displayed by the display device. Then, the computing platform may determine a risk level associated with the infrared signal. Subsequently, the computing platform may perform, via the computing platform and based on the risk level, a remediation task to prevent the unauthorized image capture.Type: GrantFiled: May 16, 2023Date of Patent: July 23, 2024Assignee: Bank of America CorporationInventors: Michael Beveridge, Elizabeth R. Liuzzo, Daniel Horne, Marci Landy
-
Patent number: 12032703Abstract: According to an aspect, a method is provided that includes: receiving a first report from at least a first vulnerability evaluation tool; pre-processing the first report by at least tokenizing the first report and generating a first vector for a first text portion of the first report; providing, to a machine learning model, the first vector as an input; classifying, by the machine learning model, the first vector based on a plurality of vulnerability vectors generated from a database of vulnerability policies required for an evaluation of the application; and outputting, by the machine learning model, a first indication of a first match between the first vector and a first vulnerability vector of the plurality of vulnerability vectors, the first indication representing a presence in the application of a first vulnerability mapped to the first vulnerability vector of the plurality of vulnerability vectors generated from the database of vulnerability policies.Type: GrantFiled: July 6, 2021Date of Patent: July 9, 2024Assignee: SAP SEInventor: Ronald Del Rosario