Patents Examined by William B Jones
-
Patent number: 11895109Abstract: The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a first command to create a Module and executes a Module Template to generate the Module in response to the first command. The RA device receives a second command to create a deployment authorization message. The Module and the deployment authorization message are deployed to an Appliance device. A set of instructions of the Module, when permitted by the deployment authorization message and executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device.Type: GrantFiled: April 15, 2022Date of Patent: February 6, 2024Assignee: Cryptography Research, Inc.Inventors: Michael Hamburg, Benjamin Che-Ming Jun, Paul C. Kocher, Daniel O'Loughlin, Denis Alexandrovich Pochuev
-
Patent number: 11882442Abstract: A terminal device seeking access to a mobile network retrieves a handset identifier identifying the terminal device and a cryptographic key for proving an identity of the terminal device from storage circuitry of the terminal device. The terminal device generates signature information by signing a block of information including the handset identifier using the cryptographic key. During a network connection process for negotiating access to the mobile network with a network control device, the terminal device communicates the signature information to the network control device.Type: GrantFiled: December 3, 2021Date of Patent: January 23, 2024Assignee: Trustonic LimitedInventor: Chris Loreskar
-
Patent number: 11882211Abstract: A function secret sharing (FSS) scheme that facilitates multiple evaluations of a secret function. The FSS scheme includes a function share based on a secret function and at least one key of a key-homomorphic pseudo random function (PRF). At least one key and a function share are provided to each party in the FSS scheme. In turn, each party may generate an output share comprising a function share output evaluated at a function input and a masking component generated based on the at least one key in relation to the key-homomorphic PRF. In turn, the output shares of each participating party may be combined to evaluate the secret function. The FSS scheme facilitates multiple evaluations of the secret function without leaking information regarding the secret function.Type: GrantFiled: September 29, 2021Date of Patent: January 23, 2024Assignee: SEAGATE TECHNOLOGY LLCInventors: Foo Yee Yeo, Nolan Miranda, Vipin Singh Sehrawat
-
Patent number: 11870909Abstract: Presented here is a system to reduce the computational cost of validating transactions recorded in a block chain by at least 500 million. In one embodiment, no proof of work is required, and the validity of the data stored in the block chain is guaranteed using a combination of private identification associated with one or more authorized users and a hash value propagated from each block to the subsequent blocks in the block chain. In another embodiment, the proof of work required is designed to be mildly computationally expensive, for example, at least 500 million times cheaper than the proof of work required to perform a bitcoin verification. The proof of work required can be increased or decreased based on various factors such as an expected time to add a new block to the block chain and/or current processor performance.Type: GrantFiled: April 29, 2021Date of Patent: January 9, 2024Assignee: Certinia Inc.Inventor: Raphael Bres
-
Patent number: 11853453Abstract: A processor may receive clear text data. The processor may represent at least a portion of the clear text data as at least one array encoding a description of at least one feature of the clear text data. The processor may process the at least one array using a clustering algorithm to determine whether the at least one array is grouped with a benign cluster or a sensitive cluster of a model. In response to determining that the at least one array is grouped with the sensitive cluster, the processor may generate an alert indicating that the clear text data includes sensitive information.Type: GrantFiled: March 27, 2019Date of Patent: December 26, 2023Assignee: INTUIT INC.Inventors: Ariel Simhon, Liron Hayman, Gabriel Goldman, Yaron Moshe
-
Patent number: 11853412Abstract: Systems and methods of defending against stack-based cybersecurity attacks that exploit vulnerabilities in buffer overflows. The embodiments disclosed herein propose applying a randomized modification to the original size of the stack frames of functions of a program. By applying a randomized modification to the length of the stack frame, e.g., randomly increasing the length of the allocated stack frame memory, it becomes harder (if not impossible) for the attacker to guess or estimate the memory location where the return address of a function is stored, regardless of the attacker's knowledge of the length of the stack frame. Multiple implementations, e.g., randomizations at transform time, load time, and run time are discussed herein.Type: GrantFiled: August 15, 2019Date of Patent: December 26, 2023Assignee: RUNSAFE SECURITY, INC.Inventors: Shane Paulsen Fry, David Nicholas Graham
-
Patent number: 11853422Abstract: Embodiments detect malicious code in distributed software components. A detector element references a source code repository (e.g., open source, commercial) containing lines of various files of a distributed artifact. Subject to certain possible optimizations, the detector inspects the individual files and lines of the artifact file-by-file and line-by-line, to identify whether any commit history information is available from a Versioning Control System (VCS). A risk assessor element receives from the detector element, results identifying those lines and/or files for which no VCS commit history is available. The risk assessor then references code features (e.g., file extension, security-critical API calls) in the results, to generate a probability of the malicious nature of the source code lacking VCS commit history information. An analysis report including this probability and additional relevant information, is offered to a user to conduct further manual review (e.g.Type: GrantFiled: December 12, 2019Date of Patent: December 26, 2023Assignee: SAP SEInventor: Henrik Plate
-
Patent number: 11841938Abstract: The present invention relates to a method for activating at least one sensor among a plurality of sensors embedded in a multi-unit device, said at least one sensor being configured to detect attacks during an execution by said multi-unit device of a software code comprising computer code instructions, wherein: said multi-unit device comprises at least two code execution units and a sensor activation circuit, and each sensor is associated to one code execution unit, and said method comprising, performed by said sensor activation circuit before execution of a computer code instruction of said software code by one of said code execution units: —determining (S1) the code execution unit configured to execute said instruction, —activating (S2) only the sensors associated with the determined code execution unit.Type: GrantFiled: April 9, 2019Date of Patent: December 12, 2023Assignee: THALES DIS FRANCE SASInventors: Sylvain Charbonnier, Philippe Loubet Moundi
-
Patent number: 11841963Abstract: Examples described herein relate to a data aggregation system for enabling query operations on restricted data that originates from multiple independent sources.Type: GrantFiled: June 21, 2021Date of Patent: December 12, 2023Assignee: NEUSTAR, INC.Inventors: Xavier Riley, Alan Burye
-
Patent number: 11836267Abstract: A computer-implemented method includes receiving deduplication information at a storage system. The deduplication information is accessible to the storage system for performing operations thereon. The deduplication information includes signatures associated with portions of client data. The method also includes receiving the client data encrypted with a client secret key. The client secret key is unavailable to the storage system. The method includes deduplicating data chunks stored in the storage system against chunks of the client data, wherein the client data chunks are selected from the client data for deduplication using the deduplication information.Type: GrantFiled: August 19, 2019Date of Patent: December 5, 2023Assignee: International Business Machines CorporationInventor: Steven Robert Hetzler
-
Patent number: 11822657Abstract: Disclosed is a computer implemented method for malware detection that analyses a file on a per packet basis. The method receives a packet of one or more packets associated a file, and converting a binary content associated with the packet into a digital representation and tokenizing plain text content associated with the packet. The method extracts one or more n-gram features, an entropy feature, and a domain feature from the converted content of the packet and applies a trained machine learning model to the one or more features extracted from the packet. The output of the machine learning method is a probability of maliciousness associated with the received packet. If the probability of maliciousness is above a threshold value, the method determines that the file associated with the received packet is malicious.Type: GrantFiled: April 20, 2022Date of Patent: November 21, 2023Assignee: Zscaler, Inc.Inventors: Huihsin Tseng, Hao Xu, Jian L Zhen
-
Patent number: 11809604Abstract: A fully-automated, defensible and highly-scalable system for disposition decisioning and, where applicable deleting previously archived electronic communications. In this regard, the present invention is capable of determining, on an individual e-communication basis, whether an e-communication should be deleted/purged from archive or retained in archive taking into account applicable rules and policies based on the geographic location from which the e-communication was sent, received or posted, as well as, based on the status on the sender/poster and/or recipient.Type: GrantFiled: July 15, 2021Date of Patent: November 7, 2023Assignee: BANK OF AMERICA CORPORATIONInventors: German Ulloa Albertazzi, Brian A. Blakley, Jessica Bond, Bryan L. Ford, Srinivasa Madireddi, James Charles Montagna, Aarti Patel, Jerome N. Rogers, Anthony Stone, Wayne Welsh
-
Patent number: 11809923Abstract: Techniques for governing access to third-party application programming interfaces (API's) are disclosed. A proxy service exposes an API configured to receive requests, from user-facing services, to perform functions of backend services. The proxy service stores a usage policy that defines a criterion that is (a) different from any authorization criterion and (b) associated with using a function of a backend service. The proxy service receives a request to perform the function of the first backend service for a user-facing service and determines that the request does not satisfy the usage policy. Based on determining that the request does not satisfy the usage policy, the proxy service refrains from accessing the backend service to perform the function responsive to the request, and transmits an alert to the user-facing service indicating that the request does not satisfy the usage policy.Type: GrantFiled: May 24, 2021Date of Patent: November 7, 2023Assignee: Oracle International CorporationInventors: Tuck Chang, Zhengming Zhang
-
Patent number: 11809563Abstract: A system and method of protecting against control-flow attacks provides two complementary, transparent, and strong security policies for the RTL design at a hardware level. The approach performs static analysis of controller, followed by lightweight instrumentation, such that CFI is enforced in-place and at runtime. The modified controller follows conservative CFG with the help of a monitor.Type: GrantFiled: July 7, 2021Date of Patent: November 7, 2023Assignee: University of South FloridaInventors: Srinivas Katkoori, Sheikh Ariful Islam
-
Patent number: 11809335Abstract: A device includes a memory. The device also includes a controller. The controller includes a register configured to store an indication of whether an ability of a received command to alter an access protection scheme of the memory is enabled. The received command may alter the access an access protection scheme of the memory responsive to the indication.Type: GrantFiled: June 2, 2021Date of Patent: November 7, 2023Inventors: Danilo Caraccio, Graziano Mirichigni
-
Patent number: 11768937Abstract: Techniques for hash based flexible scanning are described. A method of hash based flexible scanning may include obtaining a sample from a sample source, determining a size of the sample, generating one or more hashes of one or more blocks of the sample based on the size of the sample, and determining whether the sample is associated with a known threat by comparing the one hashes of the one or more blocks to hashes in a threat database.Type: GrantFiled: November 30, 2020Date of Patent: September 26, 2023Assignee: Amazon Technologies, Inc.Inventor: Mircea Ciubotariu
-
Patent number: 11765170Abstract: This application discloses a data processing method, system, and apparatus, a storage medium, and a device, and belongs to the field of database technologies. The method includes receiving, a trigger request; triggering, according to the trigger request, the first cloud encryptor to store a root key seed, an operating policy, a data key seed, and a data key identifier, and triggering the database proxy to store an encryption data dictionary, the operating policy indicating an operation policy of the first cloud encryptor. The method further includes receiving a data processing request from the client; sending first data that the data processing request requests to process and the data key identifier in the encryption data dictionary to the first cloud encryptor. The method further includes implementing the operating policy, processing the first data, and responding to the data processing request by using the second data.Type: GrantFiled: March 9, 2021Date of Patent: September 19, 2023Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Hongfei Zhou
-
Patent number: 11755735Abstract: Provided are a computer program product, system, and method for determining a frequency at which to execute trap code in an execution path of a process executing a program to generate a trap address range to detect potential malicious code. Trap code is executed in response to processing a specified type of command in application code to allocate a trap address range used to detect potentially malicious code. A determination is whether to modify a frequency of executing the trap code in response to processing a specified type of command. The frequency of executing the trap code is modified in response to processing the specified type of command in response to determining to determining to modify the frequency of executing the trap code.Type: GrantFiled: February 19, 2021Date of Patent: September 12, 2023Assignee: International Business Machines CorporationInventors: Lokesh M. Gupta, Matthew G. Borlick, Trung N. Nguyen, Micah Robison
-
Patent number: 11750376Abstract: A method of securing, by a managing node, communication in a network of member nodes including a first member node. Communication is secured using a (k, n1) secret sharing scheme during a first phase. The managing node announces a phase shift to a subsequent phase relative to the first phase. The managing node secures communication in the network during the subsequent phase using a (k+x, n2) secret sharing scheme. Each of the member nodes is previously in possession of exactly one corresponding unique share for the second key. The first member node is previously in possession of a first unique share for the second key. The managing node deletes the first member node from the subsequent phase by broadcasting the first unique share for the second key.Type: GrantFiled: May 26, 2022Date of Patent: September 5, 2023Assignee: The Boeing CompanyInventors: Mingyan Li, Douglas A. Stuart, Jai J. Choi, Joshua D. Cazalas
-
Patent number: 11734414Abstract: Example implementations include generating a guard service for a secure service at a secure region of a processing system by detecting a call to a secure service at a secure region of a processing device, obtaining a secure interface associated with the secure service, generating a guard interface based at least partially on the secure interface, generating a guard service based at least partially on the guard interface, locating the guard service at a secure region, and locating the guard interface at a secure address at the secure region.Type: GrantFiled: September 29, 2020Date of Patent: August 22, 2023Assignee: Renesas Electronics CorporationInventors: Kimberly Dinsmore, Brandon Hussey