Patents Examined by Theodore C Parsons
  • Patent number: 11435907
    Abstract: One example method includes accessing stored data, associating a unique identifier with the data, creating a hash by hashing a combination that comprises the unique identifier and the data, transmitting the hash to a notary service, receiving, from the notary service, a digital signature that corresponds to the hash, appending the digital signature to the data, and storing, as an object, a combination that comprises the digital signature, the data, and the unique identifier.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: September 6, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Yossef Saad, Radia J. Perlman, Charles William Kaufman
  • Patent number: 11436348
    Abstract: The present technology relates to an information processing device, an information processing method, and a program that allow authority to be delegated without bothering the user. Provided are an acquisition unit that acquires information for receiving delegation of an authority that is predetermined, a change unit that changes a level of the authority when a predetermined condition is satisfied, and a processing unit that performs a process using the authority that is predetermined. The acquisition unit acquires first information, an inquiry is made to a server using the first information to acquire second information from the server, and the authority that is predetermined is delegated by acquiring the second information. The present technology can be applied to, for example, an agent device to which the authority to access predetermined information is delegated from a user.
    Type: Grant
    Filed: February 21, 2018
    Date of Patent: September 6, 2022
    Assignee: Sony Corporation
    Inventors: Naoyuki Sato, Kuniaki Torii, Fujio Arai, Yusuke Kudo
  • Patent number: 11438380
    Abstract: To commission an industrial automation control system, IACS, a computing device generates commands to automatically set or verify a security configuration of the IACS. The commands are generated by the computing device based on a machine-readable security baseline, and, optionally, based on a machine-readable configuration file of the IACS.
    Type: Grant
    Filed: September 14, 2018
    Date of Patent: September 6, 2022
    Assignee: ABB SCHWEIZ AG
    Inventors: Thomas Locher, Thanikesavan Sivanthi
  • Patent number: 11423144
    Abstract: A computer implemented method to mitigate a security attack against a target virtual machine (VM) in a virtualized computing environment, the target VM having a target VM configuration including configuration parameters, and the security attack exhibiting a particular attack characteristic, is disclosed.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: August 23, 2022
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, Ian Herwono
  • Patent number: 11418327
    Abstract: A key management service creates a key upon user request. The key management service receives a request for a first cryptographic operation. The key management service performs the first cryptographic operation. The key management service returns results of the first cryptographic operation to a dependent service. The key management service receives a notification of key rotation. The key management service receives a request for a second cryptographic operation. The key management service performs the second cryptographic operation. The key management service returns results of the second cryptographic operation to the dependent service. The key management service returns updated key metadata to the dependent service.
    Type: Grant
    Filed: November 14, 2019
    Date of Patent: August 16, 2022
    Assignee: International Business Machines Corporation
    Inventors: Mark Duane Seaborn, Karunakar Bojjireddy, Erlander Lo
  • Patent number: 11418346
    Abstract: A system and method for recognition of biometric information for a shared vehicle in which data exposure is prevented which may otherwise occur when using a biometric recognition function in a shared vehicle or autonomous driving vehicle in a shared environment. The system and method may be associated with an AI device, a drone, an UAV, a robot, an AR device, a VR device, and a 5G service.
    Type: Grant
    Filed: August 30, 2019
    Date of Patent: August 16, 2022
    Assignee: LG Electronics Inc.
    Inventor: Soo-Hwan Oh
  • Patent number: 11416624
    Abstract: Technologies disclosed herein provide cryptographic computing with cryptographically encoded pointers in multi-tenant environments. An example method comprises executing, by a trusted runtime, first instructions to generate a first address key for a private memory region in the memory and generate a first cryptographically encoded pointer to the private memory region in the memory. Generating the first cryptographically encoded pointer includes storing first context information associated with the private memory region in first bits of the first cryptographically encoded pointer and performing a cryptographic algorithm on a slice of a first linear address of the private memory region based, at least in part, on the first address key and a first tweak, the first tweak including the first context information. The method further includes permitting a first tenant in the multi-tenant environment to access the first address key and the first cryptographically encoded pointer to the private memory region.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: August 16, 2022
    Assignee: Intel Corporation
    Inventors: David M. Durham, Michael LeMay, Ramya Jayaram Masti, Gilbert Neiger, Jason W. Brandt
  • Patent number: 11418537
    Abstract: A malware inspection apparatus includes one or more memories, and one or more processors configured to, when a first terminal belonging to a first system is infected with malware, in response to receiving, from the first terminal, a first packet destined for a second terminal belonging to the first system, change a destination address of the first packet to an address of a third terminal belonging to a second system, and send the changed first packet to the third terminal.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: August 16, 2022
    Assignee: FUJITSU LIMITED
    Inventor: Toru Shimanaka
  • Patent number: 11406196
    Abstract: A multi-factor authentication method and system is provided such that a push notification during an authentication process is only received if a mobile device and user are authenticated prior to receiving the push notification. Either the mobile device itself or a second device sending the push notification may be programmed to either reject or not forward the authentication request. Additionally, using the method of the present invention, enhanced security is provided by requiring the location of the mobile device and the second device to be approximately in the same geographical location.
    Type: Grant
    Filed: February 9, 2017
    Date of Patent: August 9, 2022
    Assignee: Traitware, Inc.
    Inventors: Christopher M. Canfield, Herbert W. Spencer, III, Andrew Heath Spencer, Todd S. Hickerson
  • Patent number: 11410163
    Abstract: A system and method for digital smart wallet communications that operates by managing separately-owned, private blockchains to reduce processing times, eliminate proof of work burdens, and retain blockchain immutable security while allowing protection of confidential information contained on each blockchain. The system and method may further comprise auditability of blockchains, and may be operated on an integrated communications platform that allows seamless interoperability of communication devices across multiple modes of communication, and automates digital smart wallet transactions.
    Type: Grant
    Filed: May 15, 2020
    Date of Patent: August 9, 2022
    Assignee: LIQUINEQ AG
    Inventors: Dan Kikinis, Ari Birger, Haim Dror, Aleksandr Vorobets
  • Patent number: 11403409
    Abstract: An example computer-implemented method includes presenting, by a hardware control of a computing system, an exception to an untrusted entity when the untrusted entity accesses a secure page stored in a memory of the computing system, the exception preventing the untrusted entity from accessing the secure page. The method further includes, in response to the exception, issuing, by the untrusted entity, an export call routine. The method further includes executing, by a secure interface control of the computing system, the export call routine.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: August 2, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan D. Bradbury, Martin Schwidefsky, Christian Borntraeger, Lisa Cranton Heller, Heiko Carstens, Fadi Y. Busaba
  • Patent number: 11397812
    Abstract: Disclosed herein are systems and methods of categorizing a .NET application. In one aspect, an exemplary method comprises, by a hardware processor of a security module, launching a CLR profiler upon launching of the .NET application, forming an execution log of the .NET application and adding information about events occurring during the execution of the .NET application via the launched CLR profiler, assigning to the .NET application, a category of a predetermined list of categories based on an analysis of the execution log of the .NET application, and determining whether the .NET application is categorized as being a malicious application.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: July 26, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Vladimir A. Kuskov, Denis V. Anikin, Dmitry A. Kirsanov
  • Patent number: 11392714
    Abstract: A data storage and retrieval system stores a collection of data in which a first portion is encrypted using a first cryptographic key, and comprises a second portion encrypting using a second cryptographic key. The data storage and retrieval system receives a request to query the collection on behalf of a security principal. The request comprises information indicative of the first and second keys. The system confirms the authorization of the security principal to access at least some of the collection of data, and generates intermediate results which comprise the encrypted first and second portions. The system causes the intermediate results to be decrypted using the first and second key information.
    Type: Grant
    Filed: September 25, 2018
    Date of Patent: July 19, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Nicholas Channing Matthews, Scott Bradley Ward, Joshua R. Hammer
  • Patent number: 11374951
    Abstract: A computer-implemented method, computer program product and computing system for: receiving platform information from a plurality of security-relevant subsystems; processing the platform information to generate processed platform information; identifying less threat-pertinent content included within the processed content; and routing the less threat-pertinent content to a long term storage system.
    Type: Grant
    Filed: June 6, 2019
    Date of Patent: June 28, 2022
    Assignee: RELIAQUEST HOLDINGS, LLC
    Inventors: Brian P. Murphy, Joe Partlow, Colin O'Connor, Jason Pfeiffer
  • Patent number: 11368462
    Abstract: HTTP requests and responses may be transmitted between cloud-based application instances. Each outgoing HTTP request may include authentication credentials and an “X-Snc-Integration-Source” header that identifies the source of the request. A table of approved users may be maintained, including each user's authentication credentials and one or more source instances from which they are expected to generate HTTP requests. When the HTTP request is received, the HTTP request will be parsed to identify the authentication credentials and the source of the request. The table of authorized users is then referenced to determine if the authentication credentials and the source of the request match those of an authorized user. If the authentication credentials and the source of the request match those of an authorized user, access will be granted. If the authentication credentials and the source of the request do not match those of an authorized user, access will be denied.
    Type: Grant
    Filed: September 6, 2018
    Date of Patent: June 21, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Alexander North, Minaxi Pauranik
  • Patent number: 11347884
    Abstract: An apparatus includes a memory that stores a plurality of records and a hardware processor. The processor receives a request for a first record and a second record of the plurality of records and divides, based on a type of the first record and a type of the second record, the first record into a first portion and a second portion and the second record into a third portion and a fourth portion. The processor also creates a first chunk using the first portion of the first record and the third portion of the second record and creates a second chunk using the second portion of the first record and the fourth portion of the second record. The processor further scrubs the first chunk to create a first message, scrubs the second chunk to create a second message, and communicates the first and second messages to an external device.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: May 31, 2022
    Assignee: Bank of America Corporation
    Inventors: Rajesh Narayanan, Manu Jacob Kurian
  • Patent number: 11341223
    Abstract: Techniques are described for enabling a user to access a secure system based on vital signs of the user that are collected by a wearable device worn by the user. The vital signs of the user may be used as an extra level of security when accessing the secure system. For example, a computing device may automatically validate that a user requesting access to a secure system is a person and not a robot based on receipt of vital signs of the user. As another example, a computing device may operate as a secure access badge that first analyzes vital signs of a user to confirm that the user is not in distress before sending an access signal to gain access to a secure system. In either example, the computing device may be a wearable device, or be paired to a wearable device to receive the vital signs.
    Type: Grant
    Filed: December 5, 2019
    Date of Patent: May 24, 2022
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Kourtney Eidam, Andrew J. Garner, IV, Dennis Montenegro
  • Patent number: 11341233
    Abstract: Disclosed are various approaches for enforcing policies for unmanaged applications. A user supplied script can be evaluated to determine whether an application is installed on a computing device. In response to a determination that the application is installed on the computing device, a request can be sent to a management service for at least one policy applicable to the application. The policy can be evaluated to determine whether the application complies with the policy.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: May 24, 2022
    Assignee: VMware, Inc.
    Inventors: Shravan Shantharam, Kalyan Regula, Joshua Dobelstein, Sharath Chowdary Gude, Nigitha Alugubelli, Xueliang Hua
  • Patent number: 11321456
    Abstract: A method for protecting a machine learning (ML) model is provided. During inference operation of the ML model, a plurality of input samples is provided to the ML model. A distribution of a plurality of output predictions from a predetermined node in the ML model is measured. If the distribution of the plurality of output predictions indicates correct output category prediction with low confidence, then the machine learning model is slowed to reduce a prediction rate of subsequent output predictions. If the distribution of the plurality of categories indicates correct output category prediction with a high confidence, then the machine learning model is not slowed to reduce the prediction rate of subsequent output predictions of the machine learning model. A moving average of the distribution may be used to determine the speed reduction. This makes a cloning attack on the ML model take longer with minimal impact to a legitimate user.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: May 3, 2022
    Assignee: NXP B.V.
    Inventors: Gerardus Antonius Franciscus Derks, Brian Ermans, Wilhelmus Petrus Adrianus Johannus Michiels, Christine van Vredendaal
  • Patent number: 11316879
    Abstract: A computer-implemented method and system for protecting a host computer in a computer network from security threats uses local security-relevant data for the host computer, as well as global security-relevant data for other components in the computer network downloaded from a security information plane system to the host computer, to determine a security threat to the host computer. When a security threat is determined to be a legitimate threat, a security alert is issued, and then an action is initiated in response to the security alert.
    Type: Grant
    Filed: January 23, 2019
    Date of Patent: April 26, 2022
    Assignee: VMWARE, INC.
    Inventors: David Ott, Lei Xu, Ruimin Sun, Vijay Ganti, Dennis R. Moreau