Patents Examined by Wasika Nipa
-
Patent number: 12375526Abstract: Systems and methods for detecting a phishing attack in an email message. The method includes intercepting and evaluating an email, and generating a reputation score based on the evaluation of the email message. If the malicious component is detected, the email is blocked, if not, a trust score is generated. A determination is made whether the email is generated by AI, based on LLM. A certainty score is generated which is indicative of intentions and context of the email message being malicious. When the certainty score is higher than a threshold, a combined score by combining the reputation score, the trust score, and the certainty score. When the combined reputation score is higher than a threshold, the email is blocked, and if lower, a summary is generated by a summary AI engine. Based on a comparison with known malware summaries, the email is flagged or blocked.Type: GrantFiled: June 30, 2023Date of Patent: July 29, 2025Assignee: Acronis International GmbHInventors: Candid Wuest, Serg Bell, Stanislav Protasov
-
Patent number: 12363542Abstract: Systems and methods are provided for augmenting the services of SM-DP and SM-DP+ based mobile network systems. These systems and methods enable securing, in advance of arrival at the mobile network system, connectivity services (e.g., limited, short or one-time) or long-term subscription for eSIM/iSIM capable devices/machines. Such connectivity services may be purchased or booked in advance from a local or foreign network operator with service to be activated immediately or at a point in the future. For example, a traveler to a foreign country can pre-purchase (at the travel booking stage) mobile connectivity for use during upcoming travel to a foreign network. The corresponding service can be activated at the time/date of arrival for the selected period.Type: GrantFiled: October 12, 2023Date of Patent: July 15, 2025Assignee: CELITECH INC.Inventor: Ahmad Fares
-
Patent number: 12355814Abstract: A system, computer program product, and method for training users in phishing prevention may challenge a user with gamified user-specific phishing attacks for a user to encounter in a temporal pattern. Phishing data, including data relating to phishing techniques and actual and non-actual (fake) phishing attacks, may be generated or obtained and input to the training engine. User-related data, including user information, one or more social engineering vectors, or organization information relating to an organization, may be obtained and digitally manipulated. A sequential cross model training engine may process the phishing data and digitally manipulate the user-related data to generate training activities that include test phishing attacks. A gamification engine may generate gamified user-specific testing that includes two or more of the test phishing attacks in a sequence in real time. The test phishing attacks, which may be in a non-question format, may target the user in an XR environment.Type: GrantFiled: September 28, 2023Date of Patent: July 8, 2025Assignee: Bank of America CorporationInventor: Rahul Uniyal
-
Patent number: 12339987Abstract: A method may include accessing digital characteristics associated with a user identifier, the digital characteristics including a task identifier assigned to the user identifier; encoding the digital characteristics into components of an input vector, the components of the input vector corresponding to inputs of a machine learning model; inputting the input vector into the machine learning model; executing the machine learning model; subsequent to the executing, accessing an output of the machine learning model, the output corresponding to a cluster identifier associated with a plurality of user identifiers with similar digital characteristics; and automatically transmitting a request to change a resource access right for the user identifier based on access rights associated with the cluster identifier.Type: GrantFiled: April 26, 2023Date of Patent: June 24, 2025Assignee: Wells Fargo Bank, N.A.Inventors: Alejandro J. Carao, Robert William Childress, Donnell Douglas, Jaisimha L. Gyanmote, Jonathan Wayne Ingram, Gokarna KC, Naresh Kumar Koppuravuri, Suki Ramasamy, Tara R. Ross, Vijay Talupula
-
Patent number: 12335231Abstract: A configuration of a cloud application exposed via a public IP address is duplicated with modifications to include a private IP address to expose the application internally. The original configuration is updated so that external network traffic sent to the application is redirected to and distributed across agents running on nodes of a cloud cluster by which web application firewalls (WAFs) are implemented. A set of agents for which the respective WAFs should inspect the redirected network traffic are selected based on cluster metrics, such as network and resource utilization metrics. The redirected network traffic targets a port allocated to the agents that is unique to the application, where ports are allocated on a per-application basis so each of the agents can support WAF protection for multiple applications. Network traffic which a WAF allows to pass is directed from the agent to the application via its private IP address.Type: GrantFiled: December 27, 2022Date of Patent: June 17, 2025Assignee: Palo Alto Networks, Inc.Inventors: Liron Levin, Isaac Schnitzer, Elad Shuster, Ory Segal
-
Patent number: 12328329Abstract: A system and methods for protecting a serverless application, the system including: (a) a serverless application firewall configured to inspect input of the serverless function so as to ascertain whether the input contains malicious, suspicious or abnormal data; and (b) a behavioral protection engine configured to monitor behaviors and actions of the serverless functions during execution thereof.Type: GrantFiled: March 12, 2024Date of Patent: June 10, 2025Assignee: Palo Alto Networks, Inc.Inventors: Avraham Shulman, Ory Segal, Shaked Yosef Zin
-
Patent number: 12317085Abstract: A method for detecting that a removable secure element has been temporarily disconnected from a first device includes: Providing by the secure element to the first device a first Temporal Global Identity; Entering the first device in the sleeping mode; If the secure element is inserted and used by a second device during the sleeping mode of the first device, replacing in the secure element the first Temporal Global Identity by a second Temporal Global Identity and providing the second Temporal Global Identity to the second device; When getting out from the sleeping mode by the first device, reading by the first device the Temporal Global Identity stored in the secure element; If the Temporal Global Identity read is not the same than the stored Temporal Global Identity, sending to an MNO server a message to indicate that the secure element has been used by another device.Type: GrantFiled: January 2, 2020Date of Patent: May 27, 2025Assignee: THALES DIS FRANCE SASInventors: Ly Thanh Phan, Vincent Dany, Mireille Pauliac
-
Patent number: 12279109Abstract: Systems, methods, and devices can be utilized to verify wireless local area networks (WLANs) using fingerprints. An example method includes identifying a received fingerprint comprised in an advertisement message that is received by a user equipment (UE) at a time and within a coverage area. A source of the advertisement message is determined to be a rogue WLAN by determining that the received fingerprint is different than a verified fingerprint transmitted by an authorized WLAN at the time and in the coverage area. The UE outputs an alert indicating the rogue WLAN.Type: GrantFiled: October 22, 2020Date of Patent: April 15, 2025Assignee: T-Mobile USA, Inc.Inventors: Mark McDiarmid, Andrew Lee Watts
-
Patent number: 12278812Abstract: In various embodiments, a computer-implemented method for generating and verifying officially verifiable electronic representations may be disclosed.Type: GrantFiled: December 5, 2023Date of Patent: April 15, 2025Assignee: Cortex MCP, Inc.Inventor: Shaunt M. Sarkissian
-
Patent number: 12273724Abstract: An authentication system includes an authenticator that receives an authentication request from a device and receives sensor data from one or more sensors, the sensor data being indicative of interaction with one or more real world objects or with a displayed authentication image. The authenticator determines that the sensor data is indicative of an authorized interaction with the one or more real world objects or with the displayed authentication image and, in response to the determination, grants the authentication request.Type: GrantFiled: May 15, 2023Date of Patent: April 8, 2025Assignee: United Services Automobile Association (USAA)Inventors: Bradly Jay Billman, Jennifer Hunt Erickson
-
Patent number: 12273457Abstract: Methods and systems for a processing architecture that maintains a separate logic pathway corresponding to a first operation type and a second operation type, until a blockchain operation is submitted to the blockchain network using either the first operation type or a second operation type. Following submission of the blockchain operation to the blockchain network, the architecture collapses the parallel logic pathways to a single logical pathway for both types.Type: GrantFiled: July 7, 2022Date of Patent: April 8, 2025Assignee: Coinbase, Inc.Inventors: Spencer Stock, Mansi Prakash, Sid Coelho-Prabhu, Chia Hsieh
-
Patent number: 12261822Abstract: A firewall monitors network activity and stores information about that network activity in a network activity log. The network activity is analyzed to identify a potential threat. The potential threat is further analyzed to identify other potential threats that are related to the potential threat, and are likely to pose a future risk to a protected network. A block list is updated to include the potential threat and the other potential threats to protect the protected network from the potential threat and the other potential threats.Type: GrantFiled: May 7, 2020Date of Patent: March 25, 2025Assignee: OPEN TEXT INC.Inventors: Hal Lonas, David Dufour, Chip Witt, Patrick Kar Yin Chang
-
Patent number: 12255874Abstract: Techniques for securing control and user plane separation in mobile networks (e.g., service provider networks for mobile subscribers, such as for 4G/5G networks) are disclosed. In some embodiments, a system/process/computer program product for securing control and user plane separation in mobile networks in accordance with some embodiments includes monitoring network traffic on a mobile network at a security platform to identify an Packet Forwarding Control Protocol (PFCP) message associated with a new session, in which the mobile network includes a 4G network or a 5G network; extracting a plurality of parameters from the PFCP message at the security platform; and enforcing a security policy at the security platform on the new session based on one or more of the plurality of parameters to secure control and user plane separation in the mobile network.Type: GrantFiled: May 8, 2023Date of Patent: March 18, 2025Assignee: Palo Alto Networks, Inc.Inventors: Leonid Burakovsky, Sachin Verma, Fengliang Hu, I-Chun Chen, How Tung Lim
-
Patent number: 12250307Abstract: A method and system are described for storing and retrieving an encrypted master encryption key at multiple distinct physical servers in such a way as to prevent discovery of the master encryption key by any single one of the multiple holders. A retrieval mechanism is provided that facilitates a simple retrieval of the multiple pieces of the master encryption key from the multiple holders. The described system utilizes a combination of encryption algorithms, data storage, and transmission methods to carry out the new way of retrieving and storing the master encryption key.Type: GrantFiled: June 10, 2019Date of Patent: March 11, 2025Assignee: Enveloc, Inc.Inventor: William W. Oppenheimer
-
Patent number: 12231415Abstract: User data is aggregated across a plurality of electronic communication channels and domains. An online system initially authenticates a user for access to the online system over a network. The online system provides a user identifier for the user to an authentication service. The authentication service generates a non-repeatable challenge from the aggregated user data for the user identifier and provides the non-repeatable challenge to the online system. The online system provides the challenge to the user and receives a response from the user. The online system provides the response to the authentication service and the authentication sends a success or failure back to the online system based on the response to the challenge, and based on the success or failure the online system makes a final determination for authenticating the user for accessing to the online system.Type: GrantFiled: October 14, 2022Date of Patent: February 18, 2025Assignee: NCR Voyix CorporationInventors: Yehoshua Zvi Licht, Joseph Arnold White
-
Patent number: 12212968Abstract: Communication enabled circuit breakers are described. Methods associated with secure communication between communication enabled circuit breakers and a panel system are described. Additionally, methods for commissioning and decommissioning such communication enabled circuit breakers in the panel system are described. The communication enabled circuit breakers may be paired with a controller and information regarding such breakers can be added to a database.Type: GrantFiled: February 27, 2018Date of Patent: January 28, 2025Assignee: Leviton Manufacturing Co., Inc.Inventors: Scott Freeman, Abhishek Golwala, Rejaul Monir, Ozgur Keser
-
Patent number: 12212651Abstract: In an approach for training machine-learning models using encrypted data, a processor receives a set of encrypted data from a client computing device. A processor trains a machine-learning model using a boosting algorithm. A processor performs a first classification on the set of encrypted data using the machine-learning model. A processor sends a first set of encrypted results of the first classification to the client computing device. A processor receives a first set of boosting updates from the client computing device. A processor applies the first set of boosting updates to the machine-learning model.Type: GrantFiled: November 15, 2019Date of Patent: January 28, 2025Assignee: International Business Machines CorporationInventors: Kanthi Sarpatwar, Roman Vaculin
-
Patent number: 12206783Abstract: A set of distance measurable encrypted feature vectors can be derived from any biometric data and/or physical or logical user behavioral data, and then using an associated deep neural network (“DNN”) on the output (i.e., biometric feature vector and/or behavioral feature vectors, etc.) an authentication system can determine matches or execute searches on encrypted data. Behavioral or biometric encrypted feature vectors can be stored and/or used in conjunction with respective classifications, or in subsequent comparisons without fear of compromising the original data. In various embodiments, the original behavioral and/or biometric data is discarded responsive to generating the encrypted vectors. In another embodiment, distance measurable or homomorphic encryption enables computations and comparisons on cypher-text without decryption of the encrypted feature vectors. Security of such privacy enabled embeddings can be increased by implementing an assurance factor (e.g.Type: GrantFiled: July 18, 2022Date of Patent: January 21, 2025Assignee: Private Identity LLCInventor: Scott Edward Streit
-
Patent number: 12206678Abstract: A network reachability solving algorithm based on formal verification, which abstractly models the network reachability problem, concretely models and refines it through semantic equivalence, and implements the network reachability solving algorithm through logical equivalence transformation. With the help of formal verification tools, the present disclosure ensures the correctness and logical completeness of the reachability solving algorithm through mathematical reasoning. Compared with traditional testing-based schemes, the present disclosure guarantees the correctness and effectiveness of the network reachability algorithm based on formal method.Type: GrantFiled: November 17, 2022Date of Patent: January 21, 2025Assignee: ZHEJIANG UNIVERSITYInventors: Rui Chang, Yongwang Zhao, Zhuoruo Zhang, Chenyang Yu
-
Patent number: 12207092Abstract: Methods, systems and computer readable media for rogue device detection are described. The method may include automatically generating one or more dummy network identifiers associated with a wireless network, advertising the one or more dummy network identifiers, and identifying a device as a suspect device based on receiving a connection attempt to at least one of the one or more dummy network identifiers by the device. The method can also include allocating a virtual local area network within the wireless network to process traffic associated with the at least one of the one or more dummy network identifiers, and monitoring network traffic of the suspect device on the virtual local area network. The method can further include, if the monitored network traffic meets an abnormality threshold, determining that the suspect device is a rogue device, and performing an action to protect the wireless network from the rogue device.Type: GrantFiled: March 25, 2021Date of Patent: January 21, 2025Assignee: Sophos LimitedInventors: Anil Kaushik, Shail Talati, Dirk Bolte