Patents Examined by Theodore C Parsons
-
Patent number: 11435907Abstract: One example method includes accessing stored data, associating a unique identifier with the data, creating a hash by hashing a combination that comprises the unique identifier and the data, transmitting the hash to a notary service, receiving, from the notary service, a digital signature that corresponds to the hash, appending the digital signature to the data, and storing, as an object, a combination that comprises the digital signature, the data, and the unique identifier.Type: GrantFiled: June 27, 2019Date of Patent: September 6, 2022Assignee: EMC IP Holding Company LLCInventors: Yossef Saad, Radia J. Perlman, Charles William Kaufman
-
Patent number: 11436348Abstract: The present technology relates to an information processing device, an information processing method, and a program that allow authority to be delegated without bothering the user. Provided are an acquisition unit that acquires information for receiving delegation of an authority that is predetermined, a change unit that changes a level of the authority when a predetermined condition is satisfied, and a processing unit that performs a process using the authority that is predetermined. The acquisition unit acquires first information, an inquiry is made to a server using the first information to acquire second information from the server, and the authority that is predetermined is delegated by acquiring the second information. The present technology can be applied to, for example, an agent device to which the authority to access predetermined information is delegated from a user.Type: GrantFiled: February 21, 2018Date of Patent: September 6, 2022Assignee: Sony CorporationInventors: Naoyuki Sato, Kuniaki Torii, Fujio Arai, Yusuke Kudo
-
Patent number: 11438380Abstract: To commission an industrial automation control system, IACS, a computing device generates commands to automatically set or verify a security configuration of the IACS. The commands are generated by the computing device based on a machine-readable security baseline, and, optionally, based on a machine-readable configuration file of the IACS.Type: GrantFiled: September 14, 2018Date of Patent: September 6, 2022Assignee: ABB SCHWEIZ AGInventors: Thomas Locher, Thanikesavan Sivanthi
-
Patent number: 11423144Abstract: A computer implemented method to mitigate a security attack against a target virtual machine (VM) in a virtualized computing environment, the target VM having a target VM configuration including configuration parameters, and the security attack exhibiting a particular attack characteristic, is disclosed.Type: GrantFiled: July 31, 2017Date of Patent: August 23, 2022Assignee: British Telecommunications Public Limited CompanyInventors: Fadi El-Moussa, Ian Herwono
-
Patent number: 11418327Abstract: A key management service creates a key upon user request. The key management service receives a request for a first cryptographic operation. The key management service performs the first cryptographic operation. The key management service returns results of the first cryptographic operation to a dependent service. The key management service receives a notification of key rotation. The key management service receives a request for a second cryptographic operation. The key management service performs the second cryptographic operation. The key management service returns results of the second cryptographic operation to the dependent service. The key management service returns updated key metadata to the dependent service.Type: GrantFiled: November 14, 2019Date of Patent: August 16, 2022Assignee: International Business Machines CorporationInventors: Mark Duane Seaborn, Karunakar Bojjireddy, Erlander Lo
-
Patent number: 11418346Abstract: A system and method for recognition of biometric information for a shared vehicle in which data exposure is prevented which may otherwise occur when using a biometric recognition function in a shared vehicle or autonomous driving vehicle in a shared environment. The system and method may be associated with an AI device, a drone, an UAV, a robot, an AR device, a VR device, and a 5G service.Type: GrantFiled: August 30, 2019Date of Patent: August 16, 2022Assignee: LG Electronics Inc.Inventor: Soo-Hwan Oh
-
Patent number: 11416624Abstract: Technologies disclosed herein provide cryptographic computing with cryptographically encoded pointers in multi-tenant environments. An example method comprises executing, by a trusted runtime, first instructions to generate a first address key for a private memory region in the memory and generate a first cryptographically encoded pointer to the private memory region in the memory. Generating the first cryptographically encoded pointer includes storing first context information associated with the private memory region in first bits of the first cryptographically encoded pointer and performing a cryptographic algorithm on a slice of a first linear address of the private memory region based, at least in part, on the first address key and a first tweak, the first tweak including the first context information. The method further includes permitting a first tenant in the multi-tenant environment to access the first address key and the first cryptographically encoded pointer to the private memory region.Type: GrantFiled: December 20, 2019Date of Patent: August 16, 2022Assignee: Intel CorporationInventors: David M. Durham, Michael LeMay, Ramya Jayaram Masti, Gilbert Neiger, Jason W. Brandt
-
Patent number: 11418537Abstract: A malware inspection apparatus includes one or more memories, and one or more processors configured to, when a first terminal belonging to a first system is infected with malware, in response to receiving, from the first terminal, a first packet destined for a second terminal belonging to the first system, change a destination address of the first packet to an address of a third terminal belonging to a second system, and send the changed first packet to the third terminal.Type: GrantFiled: December 20, 2018Date of Patent: August 16, 2022Assignee: FUJITSU LIMITEDInventor: Toru Shimanaka
-
Patent number: 11406196Abstract: A multi-factor authentication method and system is provided such that a push notification during an authentication process is only received if a mobile device and user are authenticated prior to receiving the push notification. Either the mobile device itself or a second device sending the push notification may be programmed to either reject or not forward the authentication request. Additionally, using the method of the present invention, enhanced security is provided by requiring the location of the mobile device and the second device to be approximately in the same geographical location.Type: GrantFiled: February 9, 2017Date of Patent: August 9, 2022Assignee: Traitware, Inc.Inventors: Christopher M. Canfield, Herbert W. Spencer, III, Andrew Heath Spencer, Todd S. Hickerson
-
Patent number: 11410163Abstract: A system and method for digital smart wallet communications that operates by managing separately-owned, private blockchains to reduce processing times, eliminate proof of work burdens, and retain blockchain immutable security while allowing protection of confidential information contained on each blockchain. The system and method may further comprise auditability of blockchains, and may be operated on an integrated communications platform that allows seamless interoperability of communication devices across multiple modes of communication, and automates digital smart wallet transactions.Type: GrantFiled: May 15, 2020Date of Patent: August 9, 2022Assignee: LIQUINEQ AGInventors: Dan Kikinis, Ari Birger, Haim Dror, Aleksandr Vorobets
-
Patent number: 11403409Abstract: An example computer-implemented method includes presenting, by a hardware control of a computing system, an exception to an untrusted entity when the untrusted entity accesses a secure page stored in a memory of the computing system, the exception preventing the untrusted entity from accessing the secure page. The method further includes, in response to the exception, issuing, by the untrusted entity, an export call routine. The method further includes executing, by a secure interface control of the computing system, the export call routine.Type: GrantFiled: March 8, 2019Date of Patent: August 2, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jonathan D. Bradbury, Martin Schwidefsky, Christian Borntraeger, Lisa Cranton Heller, Heiko Carstens, Fadi Y. Busaba
-
Patent number: 11397812Abstract: Disclosed herein are systems and methods of categorizing a .NET application. In one aspect, an exemplary method comprises, by a hardware processor of a security module, launching a CLR profiler upon launching of the .NET application, forming an execution log of the .NET application and adding information about events occurring during the execution of the .NET application via the launched CLR profiler, assigning to the .NET application, a category of a predetermined list of categories based on an analysis of the execution log of the .NET application, and determining whether the .NET application is categorized as being a malicious application.Type: GrantFiled: September 18, 2018Date of Patent: July 26, 2022Assignee: AO Kaspersky LabInventors: Vladimir A. Kuskov, Denis V. Anikin, Dmitry A. Kirsanov
-
Patent number: 11392714Abstract: A data storage and retrieval system stores a collection of data in which a first portion is encrypted using a first cryptographic key, and comprises a second portion encrypting using a second cryptographic key. The data storage and retrieval system receives a request to query the collection on behalf of a security principal. The request comprises information indicative of the first and second keys. The system confirms the authorization of the security principal to access at least some of the collection of data, and generates intermediate results which comprise the encrypted first and second portions. The system causes the intermediate results to be decrypted using the first and second key information.Type: GrantFiled: September 25, 2018Date of Patent: July 19, 2022Assignee: Amazon Technologies, Inc.Inventors: Nicholas Channing Matthews, Scott Bradley Ward, Joshua R. Hammer
-
Patent number: 11374951Abstract: A computer-implemented method, computer program product and computing system for: receiving platform information from a plurality of security-relevant subsystems; processing the platform information to generate processed platform information; identifying less threat-pertinent content included within the processed content; and routing the less threat-pertinent content to a long term storage system.Type: GrantFiled: June 6, 2019Date of Patent: June 28, 2022Assignee: RELIAQUEST HOLDINGS, LLCInventors: Brian P. Murphy, Joe Partlow, Colin O'Connor, Jason Pfeiffer
-
Patent number: 11368462Abstract: HTTP requests and responses may be transmitted between cloud-based application instances. Each outgoing HTTP request may include authentication credentials and an “X-Snc-Integration-Source” header that identifies the source of the request. A table of approved users may be maintained, including each user's authentication credentials and one or more source instances from which they are expected to generate HTTP requests. When the HTTP request is received, the HTTP request will be parsed to identify the authentication credentials and the source of the request. The table of authorized users is then referenced to determine if the authentication credentials and the source of the request match those of an authorized user. If the authentication credentials and the source of the request match those of an authorized user, access will be granted. If the authentication credentials and the source of the request do not match those of an authorized user, access will be denied.Type: GrantFiled: September 6, 2018Date of Patent: June 21, 2022Assignee: ServiceNow, Inc.Inventors: Alexander North, Minaxi Pauranik
-
Patent number: 11347884Abstract: An apparatus includes a memory that stores a plurality of records and a hardware processor. The processor receives a request for a first record and a second record of the plurality of records and divides, based on a type of the first record and a type of the second record, the first record into a first portion and a second portion and the second record into a third portion and a fourth portion. The processor also creates a first chunk using the first portion of the first record and the third portion of the second record and creates a second chunk using the second portion of the first record and the fourth portion of the second record. The processor further scrubs the first chunk to create a first message, scrubs the second chunk to create a second message, and communicates the first and second messages to an external device.Type: GrantFiled: July 2, 2019Date of Patent: May 31, 2022Assignee: Bank of America CorporationInventors: Rajesh Narayanan, Manu Jacob Kurian
-
Patent number: 11341223Abstract: Techniques are described for enabling a user to access a secure system based on vital signs of the user that are collected by a wearable device worn by the user. The vital signs of the user may be used as an extra level of security when accessing the secure system. For example, a computing device may automatically validate that a user requesting access to a secure system is a person and not a robot based on receipt of vital signs of the user. As another example, a computing device may operate as a secure access badge that first analyzes vital signs of a user to confirm that the user is not in distress before sending an access signal to gain access to a secure system. In either example, the computing device may be a wearable device, or be paired to a wearable device to receive the vital signs.Type: GrantFiled: December 5, 2019Date of Patent: May 24, 2022Assignee: Wells Fargo Bank, N.A.Inventors: Kourtney Eidam, Andrew J. Garner, IV, Dennis Montenegro
-
Patent number: 11341233Abstract: Disclosed are various approaches for enforcing policies for unmanaged applications. A user supplied script can be evaluated to determine whether an application is installed on a computing device. In response to a determination that the application is installed on the computing device, a request can be sent to a management service for at least one policy applicable to the application. The policy can be evaluated to determine whether the application complies with the policy.Type: GrantFiled: December 21, 2018Date of Patent: May 24, 2022Assignee: VMware, Inc.Inventors: Shravan Shantharam, Kalyan Regula, Joshua Dobelstein, Sharath Chowdary Gude, Nigitha Alugubelli, Xueliang Hua
-
Patent number: 11321456Abstract: A method for protecting a machine learning (ML) model is provided. During inference operation of the ML model, a plurality of input samples is provided to the ML model. A distribution of a plurality of output predictions from a predetermined node in the ML model is measured. If the distribution of the plurality of output predictions indicates correct output category prediction with low confidence, then the machine learning model is slowed to reduce a prediction rate of subsequent output predictions. If the distribution of the plurality of categories indicates correct output category prediction with a high confidence, then the machine learning model is not slowed to reduce the prediction rate of subsequent output predictions of the machine learning model. A moving average of the distribution may be used to determine the speed reduction. This makes a cloning attack on the ML model take longer with minimal impact to a legitimate user.Type: GrantFiled: May 16, 2019Date of Patent: May 3, 2022Assignee: NXP B.V.Inventors: Gerardus Antonius Franciscus Derks, Brian Ermans, Wilhelmus Petrus Adrianus Johannus Michiels, Christine van Vredendaal
-
Patent number: 11316879Abstract: A computer-implemented method and system for protecting a host computer in a computer network from security threats uses local security-relevant data for the host computer, as well as global security-relevant data for other components in the computer network downloaded from a security information plane system to the host computer, to determine a security threat to the host computer. When a security threat is determined to be a legitimate threat, a security alert is issued, and then an action is initiated in response to the security alert.Type: GrantFiled: January 23, 2019Date of Patent: April 26, 2022Assignee: VMWARE, INC.Inventors: David Ott, Lei Xu, Ruimin Sun, Vijay Ganti, Dennis R. Moreau