Patents Examined by William J Goodchild
-
Patent number: 12153676Abstract: The present application discloses a method, system, and computer system for detecting malicious files. The method includes receiving a sample that comprises a .NET file, obtaining imported API function names based at least in part on a .NET header of the .NET file, determining a hash of a list of unmanaged imported API function names, and determining whether the sample is malware based at least in part on the hash of the list of unmanaged imported API function names.Type: GrantFiled: December 21, 2021Date of Patent: November 26, 2024Assignee: Palo Alto Networks, Inc.Inventors: Yaron Samuel, Dominik Reichel, Robert Jung, Lauren Che
-
Patent number: 12155650Abstract: Systems, apparatuses, methods, and computer program products are disclosed for providing passive continuous session authentication. An example method includes authenticating a session for a user of a client device. The example method further includes generating a video data structure comprising a video stream, deriving a set of biometric attributes of the user from the video stream, synchronizing temporal information with the set of biometric attributes derived from the video stream, generating an aggregated behavioral attribute data structure comprised of the video data structure and the set of biometric attributes derived from the video stream synchronized to the temporal information, and re-authenticating, by the session authentication circuitry at a second time after the first time, the session for the user of the client device based on the aggregated behavioral attribute data structure.Type: GrantFiled: July 3, 2023Date of Patent: November 26, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Abhijit Rao, Masoud Vakili
-
Patent number: 12124607Abstract: Various embodiments safeguard location visitation information, such as visitation counter information, for a location or place that can be visited by one or more users of a user-based system. According to various embodiments, one or more of the techniques or mechanisms described herein can be used to safeguard user visitation information on a user-based platform: a user's allow list (or block list) that indicates which location visitation information for the user can be shown to another user on the platform; using a visitation category, such as a label, in place of a visitation count when displaying information with respect to a location; using a count of users on a user's connected-users list to determine how visitation count information for a location will be presented or displayed to the user; or adding a certain level of noise to location visitation information that is presented to a user.Type: GrantFiled: December 14, 2021Date of Patent: October 22, 2024Assignee: Snap Inc.Inventors: Ioannis Kotsogiannis Teftsoglou, Mohammad Zaheri Darkahi
-
Patent number: 12118123Abstract: A method for a privacy-aware transcription includes receiving audio-visual signal including audio data and image data for a speech environment and a privacy request from a participant in the speech environment where the privacy request indicates a privacy condition of the participant. The method further includes segmenting the audio data into a plurality of segments. For each segment, the method includes determining an identity of a speaker of a corresponding segment of the audio data based on the image data and determining whether the identity of the speaker of the corresponding segment includes the participant associated with the privacy condition. When the identity of the speaker of the corresponding segment includes the participant, the method includes applying the privacy condition to the corresponding segment. The method also includes processing the plurality of segments of the audio data to determine a transcript for the audio data.Type: GrantFiled: November 18, 2019Date of Patent: October 15, 2024Assignee: Google LLCInventors: Oliver Siohan, Takaki Makino, Richard Rose, Otavio Braga, Hank Liao, Basilio Garcia Castillo
-
Patent number: 12114155Abstract: A system for authenticating communications from a vehicle to a remote assistance unit includes a connectivity module (CM) installed in the vehicle. A security device is adapted to transmit messages when the security device is within a predefined proximity of the CM. A security cloud unit is configured to validate the security device based in part on a first pair of complementary keys, including a first factory key stored by the security device and a second factory key stored by the security cloud unit. The first pair of complementary keys is configured for asymmetric encryption such that the first factory key is solely decryptable with the second factory key. The remote assistance unit is configured to authenticate an integrity of the CM based in part on a second pair of complementary keys which are dynamically generated by the security cloud unit.Type: GrantFiled: May 23, 2022Date of Patent: October 8, 2024Assignee: GM Global Technology Operations LLCInventor: Suresh Munagapati
-
Patent number: 12113778Abstract: A communication server, interacting with an organization system having users that wish to communicate securely, provides secure communication capability to the users, without the communication server itself having access to unencrypted content of the user communications or to cryptographic keys that would allow the communication server to derive the unencrypted content. Thus, the communication server that provides the secure communication capability need not itself be trusted by the users with access to communicated content. To achieve this, the various entities communicate to exchange cryptographic keys in such a manner that the communication server never obtains usable copies of the cryptographic keys.Type: GrantFiled: June 12, 2023Date of Patent: October 8, 2024Assignee: SYMPHONY COMMUNICATION SERVICES HOLDINGS LLCInventors: Serkan Mulayin, David M'Raihi, Tim Casey, Michael Harmon, Jon McLachlan
-
Patent number: 12113909Abstract: A method and electronic device are provided for decrypting homomorphically encrypted (HE) data. The method may include generating, in the electronic device, result metadata that specifies a size of the HE data to be decrypted. The electronic device generates or collects HE input data and the result metadata. The HE input data and the encrypted result metadata are transmitted to a cloud server in a cloud environment to allow the cloud server to perform computations using the HE input data. The cloud server is enabled by the hardware device to send a result of the computations on the HE input data to a secure element (SE) for decryption. A relatively secure online connection is established to the SE in the cloud environment. The SE is enabled by the electronic device to decrypt the result of the computations on the HE input data as specified by the result metadata.Type: GrantFiled: April 28, 2022Date of Patent: October 8, 2024Assignee: NXP B.V.Inventors: Adrian Marotzke, Leonard Clemens Püttjer
-
Patent number: 12107854Abstract: Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.Type: GrantFiled: June 29, 2023Date of Patent: October 1, 2024Assignee: Cisco Technology, Inc.Inventors: Thomas Szigeti, Alan Robert Lynn, David John Zacks, Frank Michaud
-
Patent number: 12095791Abstract: A cyber monitored control system includes a controller with a first processing resource operable to execute a control application for a controlled system. The cyber monitored control system also includes a cyber monitor with a second processing resource isolated from the first processing resource. The cyber monitor is operable to evaluate a plurality of inputs to the cyber monitored control system with respect to a cyber threat model, verify one or more update rates of the controller, apply trending using the cyber threat model to distinguish between a fault and a cyber attack, and isolate one or more subsystems of the cyber monitored control system based on identifying the cyber attack.Type: GrantFiled: November 3, 2021Date of Patent: September 17, 2024Assignee: RTX CORPORATIONInventor: Paul A. Adamski
-
Patent number: 12093431Abstract: Systems and techniques for a System-on-a-Chip (SoC) security plugin are described herein. A component message may be received at an interconnect endpoint from an SoC component. The interconnect endpoint may pass the component message to a security component via a security interlink. The security component may secure the component message, using a cryptographic engine, to create a secured message. The secured message is delivered back to the interconnect endpoint via the security interlink and transmitted across the interconnect by the interconnect endpoint.Type: GrantFiled: August 1, 2023Date of Patent: September 17, 2024Assignee: Intel CorporationInventors: Manoj R. Sastry, Alpa Narendra Trivedi, Men Long
-
Patent number: 12093355Abstract: A system for secure data transfer in a virtual environment receives a request to initiate a virtual interaction session between an avatar and an entity within the virtual environment. The avatar is operated by a user using a user device. The system presents a virtual data reader to the avatar. The virtual data reader comprises a screen to display data. The system receives user input from the user device. The user input includes user information and data object to be transferred to the entity. The user input is transferred from the user input to the virtual data reader. The system receives a security token from the avatar. The system verifies that the user input belongs to the user. The system also determines that the security token is valid. In response, the system transfers the data object to the entity and concludes the virtual interaction session.Type: GrantFiled: September 7, 2022Date of Patent: September 17, 2024Assignee: Bank of America CorporationInventors: Sheetal Bhatia, Sandeep Kumar Chauhan
-
Patent number: 12086295Abstract: A lock node for storing data and a protected storage unit. The lock node includes an input section which provides a plurality of key maps, each corresponding to one of a plurality of primary keys, respectively, applied to the input section, each key map including at least one main key, a variable lock section producing a derived key from a logical operation on the main keys corresponding to the primary keys applied to the input section, and an output section producing the data in response to the derived key.Type: GrantFiled: April 16, 2021Date of Patent: September 10, 2024Assignee: NUTS HOLDINGS, LLCInventor: Yoon Ho Auh
-
Patent number: 12088720Abstract: Systems, computer program products, and methods are described herein for dynamically tracking resources using non-fungible tokens. The present invention is configured to electronically receive, over a distributed computing network from a computing device of a user, a request for a non-fungible token (NFT) for a resource, wherein the resource is a physical object; initiate a non-fungible token (NFT) generator on the resource in response to receiving the request; extract resource information from the resource; generate, using the NFT generator, the NFT, wherein the NFT comprises at least the resource information; and record the NFT for the resource on a distributed ledger.Type: GrantFiled: November 3, 2023Date of Patent: September 10, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Michael Robert Young, Manu Jacob Kurian
-
Patent number: 12079336Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security application is configured to determine a suspicious file from a client using the security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: GrantFiled: December 30, 2022Date of Patent: September 3, 2024Assignee: Musarubra US LLCInventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Patent number: 12081518Abstract: A method is provided for performing selective inspection of network traffic associated with a plurality of network-connected smart devices using a Man-In-The-Middle (MITM) gateway. The MITM gateway operate in a first mode or a second mode for each of the network-connected smart devices. The first mode configures the MITM gateway to perform inspection of network traffic associated with the respective network-connected smart device, and the second mode configures the MITM gateway to not perform any inspection of network traffic associated with the respective network-connected smart device. The MITM gateway is changed to operate in the second mode for a respective network-connected smart device when it is detected that the MITM gateway operating in the first mode is adversely affecting the operation of the respective network-connected smart device.Type: GrantFiled: February 22, 2022Date of Patent: September 3, 2024Assignee: EVERYTHING SET INC.Inventors: Michael D. Melnick, David L Knudsen
-
Patent number: 12081587Abstract: A system and method for injecting network chaos between a client system and a server system within a network are disclosed. A processor implement a chaos controller DNS (Domain Name System) server and configures a client application running on the client system to utilize the chaos controller DNS server as a DNS server. The processor also selects the chaos controller DNS as the DNS server and implements a chaos controller application programming interface (API) and a chaos controller central server; and orchestrates a type and a duration of a network chaos injection by utilizing the chaos controller API and the chaos controller central server without modifying an application code of the client application.Type: GrantFiled: December 14, 2021Date of Patent: September 3, 2024Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Deepak Sarda, Yohei Kusakabe
-
Patent number: 12061723Abstract: In one embodiment, a data sharing platform uses data associated with a data owner to share data via a plurality of sharing services, each sharing service in the plurality of sharing services providing a different type of data. The data sharing platform tracks access to each of the plurality of sharing services. The data sharing platform computes, based in part on the access to each of the plurality of sharing services, an importance metric for the data associated with the data owner. The data sharing platform provides an indication of the importance metric for display to the data owner.Type: GrantFiled: September 16, 2021Date of Patent: August 13, 2024Assignee: Cisco Technology, In nc.Inventors: Louis Gwyn Samuel, Oliver James Bull, Nicholas Bradley Selk
-
Patent number: 12058118Abstract: Disclosed herein is a method. The method is implemented by an authentication engine stored on a memory as processor executable instructions. The processor executable instructions are executed by at least one processor. The method (i.e., as implemented by the authentication engine) includes determining an authentication mechanism for an external system to a software platform, generating an interface, executing the authentication mechanism within the interface, authenticating an entity within the interface, and provisioning element instance details with respect to the authentication of the entity.Type: GrantFiled: October 18, 2021Date of Patent: August 6, 2024Assignee: UiPath, Inc.Inventors: Vineet Joshi, Maxwell Warner, Guy Van Wert
-
Patent number: 12047413Abstract: An apparatus, method and computer program product are provided, the apparatus for identifying a set of messages of interest in a network, the apparatus comprising circuitry configured to: receive information of a plurality of sets of messages which have been exchanged by nodes in a network; select a portion of the plurality of sets of messages which have been received using a property of a source message of each set of messages of the plurality of sets of messages; generate individual first values for the nodes of each set of messages of the selected portion of the plurality of sets of messages using a property of the nodes associated with each set of messages; and identify at least one set of messages of the selected portion of the plurality of sets of messages as a set of messages of interest using the individual first values which have been generated for the selected portion of the sets of messages.Type: GrantFiled: December 13, 2021Date of Patent: July 23, 2024Assignee: Vocalink International LimitedInventors: Graham David Chester, Syed Asim Ali Shah, Sebastian Ix
-
Patent number: 12041043Abstract: A system for verifying a user identity. The system comprises one or more memory devices storing instructions and one or more processors configured to execute the instructions. The processors are configured to receive information associated with an account of a user. The processors are further configured to generate a first profile, where the first profile being related to the user. The processors also receive an indication that the account is accessed by an accessor through an accessor device; and receive, from the accessor device, identity data comprising a plurality of data subsets associated with the accessor. The processors are configured to store the data subsets in respective clusters. The processors are further configured generate cluster analyses by analyzing the data subsets in respective clusters; and output the cluster analyses to node instances that weighs the cluster analyses outputs.Type: GrantFiled: May 2, 2023Date of Patent: July 16, 2024Assignee: Capital One Services, LLCInventors: Timur Sherif, Benjamin Lindquist