Patents Examined by Wasika Nipa
  • Patent number: 12375526
    Abstract: Systems and methods for detecting a phishing attack in an email message. The method includes intercepting and evaluating an email, and generating a reputation score based on the evaluation of the email message. If the malicious component is detected, the email is blocked, if not, a trust score is generated. A determination is made whether the email is generated by AI, based on LLM. A certainty score is generated which is indicative of intentions and context of the email message being malicious. When the certainty score is higher than a threshold, a combined score by combining the reputation score, the trust score, and the certainty score. When the combined reputation score is higher than a threshold, the email is blocked, and if lower, a summary is generated by a summary AI engine. Based on a comparison with known malware summaries, the email is flagged or blocked.
    Type: Grant
    Filed: June 30, 2023
    Date of Patent: July 29, 2025
    Assignee: Acronis International GmbH
    Inventors: Candid Wuest, Serg Bell, Stanislav Protasov
  • Patent number: 12363542
    Abstract: Systems and methods are provided for augmenting the services of SM-DP and SM-DP+ based mobile network systems. These systems and methods enable securing, in advance of arrival at the mobile network system, connectivity services (e.g., limited, short or one-time) or long-term subscription for eSIM/iSIM capable devices/machines. Such connectivity services may be purchased or booked in advance from a local or foreign network operator with service to be activated immediately or at a point in the future. For example, a traveler to a foreign country can pre-purchase (at the travel booking stage) mobile connectivity for use during upcoming travel to a foreign network. The corresponding service can be activated at the time/date of arrival for the selected period.
    Type: Grant
    Filed: October 12, 2023
    Date of Patent: July 15, 2025
    Assignee: CELITECH INC.
    Inventor: Ahmad Fares
  • Patent number: 12355814
    Abstract: A system, computer program product, and method for training users in phishing prevention may challenge a user with gamified user-specific phishing attacks for a user to encounter in a temporal pattern. Phishing data, including data relating to phishing techniques and actual and non-actual (fake) phishing attacks, may be generated or obtained and input to the training engine. User-related data, including user information, one or more social engineering vectors, or organization information relating to an organization, may be obtained and digitally manipulated. A sequential cross model training engine may process the phishing data and digitally manipulate the user-related data to generate training activities that include test phishing attacks. A gamification engine may generate gamified user-specific testing that includes two or more of the test phishing attacks in a sequence in real time. The test phishing attacks, which may be in a non-question format, may target the user in an XR environment.
    Type: Grant
    Filed: September 28, 2023
    Date of Patent: July 8, 2025
    Assignee: Bank of America Corporation
    Inventor: Rahul Uniyal
  • Patent number: 12339987
    Abstract: A method may include accessing digital characteristics associated with a user identifier, the digital characteristics including a task identifier assigned to the user identifier; encoding the digital characteristics into components of an input vector, the components of the input vector corresponding to inputs of a machine learning model; inputting the input vector into the machine learning model; executing the machine learning model; subsequent to the executing, accessing an output of the machine learning model, the output corresponding to a cluster identifier associated with a plurality of user identifiers with similar digital characteristics; and automatically transmitting a request to change a resource access right for the user identifier based on access rights associated with the cluster identifier.
    Type: Grant
    Filed: April 26, 2023
    Date of Patent: June 24, 2025
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Alejandro J. Carao, Robert William Childress, Donnell Douglas, Jaisimha L. Gyanmote, Jonathan Wayne Ingram, Gokarna KC, Naresh Kumar Koppuravuri, Suki Ramasamy, Tara R. Ross, Vijay Talupula
  • Patent number: 12335231
    Abstract: A configuration of a cloud application exposed via a public IP address is duplicated with modifications to include a private IP address to expose the application internally. The original configuration is updated so that external network traffic sent to the application is redirected to and distributed across agents running on nodes of a cloud cluster by which web application firewalls (WAFs) are implemented. A set of agents for which the respective WAFs should inspect the redirected network traffic are selected based on cluster metrics, such as network and resource utilization metrics. The redirected network traffic targets a port allocated to the agents that is unique to the application, where ports are allocated on a per-application basis so each of the agents can support WAF protection for multiple applications. Network traffic which a WAF allows to pass is directed from the agent to the application via its private IP address.
    Type: Grant
    Filed: December 27, 2022
    Date of Patent: June 17, 2025
    Assignee: Palo Alto Networks, Inc.
    Inventors: Liron Levin, Isaac Schnitzer, Elad Shuster, Ory Segal
  • Patent number: 12328329
    Abstract: A system and methods for protecting a serverless application, the system including: (a) a serverless application firewall configured to inspect input of the serverless function so as to ascertain whether the input contains malicious, suspicious or abnormal data; and (b) a behavioral protection engine configured to monitor behaviors and actions of the serverless functions during execution thereof.
    Type: Grant
    Filed: March 12, 2024
    Date of Patent: June 10, 2025
    Assignee: Palo Alto Networks, Inc.
    Inventors: Avraham Shulman, Ory Segal, Shaked Yosef Zin
  • Patent number: 12317085
    Abstract: A method for detecting that a removable secure element has been temporarily disconnected from a first device includes: Providing by the secure element to the first device a first Temporal Global Identity; Entering the first device in the sleeping mode; If the secure element is inserted and used by a second device during the sleeping mode of the first device, replacing in the secure element the first Temporal Global Identity by a second Temporal Global Identity and providing the second Temporal Global Identity to the second device; When getting out from the sleeping mode by the first device, reading by the first device the Temporal Global Identity stored in the secure element; If the Temporal Global Identity read is not the same than the stored Temporal Global Identity, sending to an MNO server a message to indicate that the secure element has been used by another device.
    Type: Grant
    Filed: January 2, 2020
    Date of Patent: May 27, 2025
    Assignee: THALES DIS FRANCE SAS
    Inventors: Ly Thanh Phan, Vincent Dany, Mireille Pauliac
  • Patent number: 12279109
    Abstract: Systems, methods, and devices can be utilized to verify wireless local area networks (WLANs) using fingerprints. An example method includes identifying a received fingerprint comprised in an advertisement message that is received by a user equipment (UE) at a time and within a coverage area. A source of the advertisement message is determined to be a rogue WLAN by determining that the received fingerprint is different than a verified fingerprint transmitted by an authorized WLAN at the time and in the coverage area. The UE outputs an alert indicating the rogue WLAN.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: April 15, 2025
    Assignee: T-Mobile USA, Inc.
    Inventors: Mark McDiarmid, Andrew Lee Watts
  • Patent number: 12278812
    Abstract: In various embodiments, a computer-implemented method for generating and verifying officially verifiable electronic representations may be disclosed.
    Type: Grant
    Filed: December 5, 2023
    Date of Patent: April 15, 2025
    Assignee: Cortex MCP, Inc.
    Inventor: Shaunt M. Sarkissian
  • Patent number: 12273724
    Abstract: An authentication system includes an authenticator that receives an authentication request from a device and receives sensor data from one or more sensors, the sensor data being indicative of interaction with one or more real world objects or with a displayed authentication image. The authenticator determines that the sensor data is indicative of an authorized interaction with the one or more real world objects or with the displayed authentication image and, in response to the determination, grants the authentication request.
    Type: Grant
    Filed: May 15, 2023
    Date of Patent: April 8, 2025
    Assignee: United Services Automobile Association (USAA)
    Inventors: Bradly Jay Billman, Jennifer Hunt Erickson
  • Patent number: 12273457
    Abstract: Methods and systems for a processing architecture that maintains a separate logic pathway corresponding to a first operation type and a second operation type, until a blockchain operation is submitted to the blockchain network using either the first operation type or a second operation type. Following submission of the blockchain operation to the blockchain network, the architecture collapses the parallel logic pathways to a single logical pathway for both types.
    Type: Grant
    Filed: July 7, 2022
    Date of Patent: April 8, 2025
    Assignee: Coinbase, Inc.
    Inventors: Spencer Stock, Mansi Prakash, Sid Coelho-Prabhu, Chia Hsieh
  • Patent number: 12261822
    Abstract: A firewall monitors network activity and stores information about that network activity in a network activity log. The network activity is analyzed to identify a potential threat. The potential threat is further analyzed to identify other potential threats that are related to the potential threat, and are likely to pose a future risk to a protected network. A block list is updated to include the potential threat and the other potential threats to protect the protected network from the potential threat and the other potential threats.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: March 25, 2025
    Assignee: OPEN TEXT INC.
    Inventors: Hal Lonas, David Dufour, Chip Witt, Patrick Kar Yin Chang
  • Patent number: 12255874
    Abstract: Techniques for securing control and user plane separation in mobile networks (e.g., service provider networks for mobile subscribers, such as for 4G/5G networks) are disclosed. In some embodiments, a system/process/computer program product for securing control and user plane separation in mobile networks in accordance with some embodiments includes monitoring network traffic on a mobile network at a security platform to identify an Packet Forwarding Control Protocol (PFCP) message associated with a new session, in which the mobile network includes a 4G network or a 5G network; extracting a plurality of parameters from the PFCP message at the security platform; and enforcing a security policy at the security platform on the new session based on one or more of the plurality of parameters to secure control and user plane separation in the mobile network.
    Type: Grant
    Filed: May 8, 2023
    Date of Patent: March 18, 2025
    Assignee: Palo Alto Networks, Inc.
    Inventors: Leonid Burakovsky, Sachin Verma, Fengliang Hu, I-Chun Chen, How Tung Lim
  • Patent number: 12250307
    Abstract: A method and system are described for storing and retrieving an encrypted master encryption key at multiple distinct physical servers in such a way as to prevent discovery of the master encryption key by any single one of the multiple holders. A retrieval mechanism is provided that facilitates a simple retrieval of the multiple pieces of the master encryption key from the multiple holders. The described system utilizes a combination of encryption algorithms, data storage, and transmission methods to carry out the new way of retrieving and storing the master encryption key.
    Type: Grant
    Filed: June 10, 2019
    Date of Patent: March 11, 2025
    Assignee: Enveloc, Inc.
    Inventor: William W. Oppenheimer
  • Patent number: 12231415
    Abstract: User data is aggregated across a plurality of electronic communication channels and domains. An online system initially authenticates a user for access to the online system over a network. The online system provides a user identifier for the user to an authentication service. The authentication service generates a non-repeatable challenge from the aggregated user data for the user identifier and provides the non-repeatable challenge to the online system. The online system provides the challenge to the user and receives a response from the user. The online system provides the response to the authentication service and the authentication sends a success or failure back to the online system based on the response to the challenge, and based on the success or failure the online system makes a final determination for authenticating the user for accessing to the online system.
    Type: Grant
    Filed: October 14, 2022
    Date of Patent: February 18, 2025
    Assignee: NCR Voyix Corporation
    Inventors: Yehoshua Zvi Licht, Joseph Arnold White
  • Patent number: 12212968
    Abstract: Communication enabled circuit breakers are described. Methods associated with secure communication between communication enabled circuit breakers and a panel system are described. Additionally, methods for commissioning and decommissioning such communication enabled circuit breakers in the panel system are described. The communication enabled circuit breakers may be paired with a controller and information regarding such breakers can be added to a database.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: January 28, 2025
    Assignee: Leviton Manufacturing Co., Inc.
    Inventors: Scott Freeman, Abhishek Golwala, Rejaul Monir, Ozgur Keser
  • Patent number: 12212651
    Abstract: In an approach for training machine-learning models using encrypted data, a processor receives a set of encrypted data from a client computing device. A processor trains a machine-learning model using a boosting algorithm. A processor performs a first classification on the set of encrypted data using the machine-learning model. A processor sends a first set of encrypted results of the first classification to the client computing device. A processor receives a first set of boosting updates from the client computing device. A processor applies the first set of boosting updates to the machine-learning model.
    Type: Grant
    Filed: November 15, 2019
    Date of Patent: January 28, 2025
    Assignee: International Business Machines Corporation
    Inventors: Kanthi Sarpatwar, Roman Vaculin
  • Patent number: 12206783
    Abstract: A set of distance measurable encrypted feature vectors can be derived from any biometric data and/or physical or logical user behavioral data, and then using an associated deep neural network (“DNN”) on the output (i.e., biometric feature vector and/or behavioral feature vectors, etc.) an authentication system can determine matches or execute searches on encrypted data. Behavioral or biometric encrypted feature vectors can be stored and/or used in conjunction with respective classifications, or in subsequent comparisons without fear of compromising the original data. In various embodiments, the original behavioral and/or biometric data is discarded responsive to generating the encrypted vectors. In another embodiment, distance measurable or homomorphic encryption enables computations and comparisons on cypher-text without decryption of the encrypted feature vectors. Security of such privacy enabled embeddings can be increased by implementing an assurance factor (e.g.
    Type: Grant
    Filed: July 18, 2022
    Date of Patent: January 21, 2025
    Assignee: Private Identity LLC
    Inventor: Scott Edward Streit
  • Patent number: 12206678
    Abstract: A network reachability solving algorithm based on formal verification, which abstractly models the network reachability problem, concretely models and refines it through semantic equivalence, and implements the network reachability solving algorithm through logical equivalence transformation. With the help of formal verification tools, the present disclosure ensures the correctness and logical completeness of the reachability solving algorithm through mathematical reasoning. Compared with traditional testing-based schemes, the present disclosure guarantees the correctness and effectiveness of the network reachability algorithm based on formal method.
    Type: Grant
    Filed: November 17, 2022
    Date of Patent: January 21, 2025
    Assignee: ZHEJIANG UNIVERSITY
    Inventors: Rui Chang, Yongwang Zhao, Zhuoruo Zhang, Chenyang Yu
  • Patent number: 12207092
    Abstract: Methods, systems and computer readable media for rogue device detection are described. The method may include automatically generating one or more dummy network identifiers associated with a wireless network, advertising the one or more dummy network identifiers, and identifying a device as a suspect device based on receiving a connection attempt to at least one of the one or more dummy network identifiers by the device. The method can also include allocating a virtual local area network within the wireless network to process traffic associated with the at least one of the one or more dummy network identifiers, and monitoring network traffic of the suspect device on the virtual local area network. The method can further include, if the monitored network traffic meets an abnormality threshold, determining that the suspect device is a rogue device, and performing an action to protect the wireless network from the rogue device.
    Type: Grant
    Filed: March 25, 2021
    Date of Patent: January 21, 2025
    Assignee: Sophos Limited
    Inventors: Anil Kaushik, Shail Talati, Dirk Bolte