Patents Examined by Yogesh Paliwal
-
Patent number: 11785019Abstract: A system and a method are disclosed for verifying a suspicious electronic communication. To this end, a secure communications service may detect an electronic communication comprising an identifier of a purported originator of the electronic communication and an identifier of an intended recipient, and determine that an attribute of the electronic communication corresponds to a suspicious attribute. Responsively, the service may intercept the electronic communication and storing the electronic communication in purgatory memory, so as to prevent the electronic communication from being populated in a private repository of the intended recipient, transmit a verification message, and receive a reply to the verification message that verifies the authenticity of the electronic communication.Type: GrantFiled: October 14, 2021Date of Patent: October 10, 2023Assignee: Material Security Inc.Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Patent number: 11777922Abstract: An apparatus comprises a processing device that is configured to maintain a list of a managed devices, to generate a seed value and to submit a login request to a first managed device. The processing device is configured to generate a value based at least in part on the seed value and to select a second managed device from the list based at least in part on the value. The processing device is further configured to receive a second factor authentication challenge from the first managed device and to obtain a device key encrypted passcode from the second managed device. The processing device is further configured to provide the device key encrypted passcode to the first managed device and to receive a successful authentication of the login request from the first managed device based at least in part on providing the device key encrypted passcode to the first managed device.Type: GrantFiled: October 12, 2021Date of Patent: October 3, 2023Assignee: Dell Products L.P.Inventors: Shivendra Katiyar, Naman Goel, Ravishankar Kanakapura Nanjundaswamy, Ravikanth Chaganti
-
Patent number: 11768960Abstract: Generating anonymized data from events are disclosed. Via a graphical user interface (GUI), an output dataset mode for an anonymized output dataset is received. The output dataset mode is stored or an active stream. The output dataset mode in anonymization configuration information. An anonymized output dataset is produced in accordance with the anonymization configuration information, where the output dataset comprises information related to at least a portion of a plurality of events, wherein the plurality of events each comprise a timestamp and a portion of machine data. Further, the GUI to displays the anonymized output dataset.Type: GrantFiled: October 5, 2021Date of Patent: September 26, 2023Assignee: Splunk Inc.Inventor: David Carasso
-
Patent number: 11765177Abstract: A system and method provides access to one or more web services requested from a web site by using an app on a smart device, such as a smart phone or tablet, or the smart device itself.Type: GrantFiled: September 19, 2021Date of Patent: September 19, 2023Assignee: Charles Schwab & Co., Inc.Inventors: Jay Desai, Konstantinos P. Konstantinides, Suwat Phruksawan, Toby R. Kendall, Patrick C. McGraw, Dominic E. Caudell, Valery Zubovsky, Charles E. Gotlieb
-
Patent number: 11765145Abstract: An exchange processing system may include multiple exchange components that are respectively included in multiple computing systems. A central exchange component may receive a request to enable access to secured data, the request having identity data encrypted via an identity encryption module and inquiry data encrypted via a first request encryption module. The central exchange component may decrypt the identity data via the identity encryption module, and decrypt the inquiry data via the first request encryption module. Response data may be generated from secured data that is selected based on the identity and inquiry data. The central exchange component may encrypt the response data via a second request encryption module and re-encrypt the identity data via the identity encryption module. The encrypted identity and response data may be provided to a second remote exchange module.Type: GrantFiled: November 1, 2021Date of Patent: September 19, 2023Assignee: Equifax Inc.Inventor: Sri Krishnamacharya
-
Patent number: 11750373Abstract: A technique, performed by an electronic device, of managing a security key is provided. The electronic device may receive security information from each of at least one other electronic device, determine a master electronic device based on a security level of the electronic device and a security level of a security level of the at least one other electronic device, the security level of the at least one other electronic device being included in the received security information, generate a security key as the electronic device is determined as the master electronic device, and determine a portion to be removed from the security key for each security level of a plurality of electronic devices including the electronic device and the at least one other electronic device, and provide each partial security key from which the determined portion is omitted, to the at least one other electronic device.Type: GrantFiled: January 11, 2022Date of Patent: September 5, 2023Assignee: Samsung Electronics Co., Ltd.Inventors: Sangwan Kwon, Taeho Kgil, Jinsu Kim
-
Patent number: 11736276Abstract: A key delegation request is received from a host system. The key delegation request includes a new public key. A challenge is generated based on the new public key and a root public key, and the challenge is provided to the host system responsive to the request. A first and second digital signature are received from the host system. The first digital signature is generated by cryptographically signing the challenge using a new private key corresponding to the new public key and the second digital signature is generated by cryptographically signing the challenge using a root private key corresponding to the root public key. The first digital signature is validated using the new public key and the second digital signature is validated using the root public key. Based on successful validation of both signatures, the new public key is utilized in one or more cryptographic operations.Type: GrantFiled: March 9, 2022Date of Patent: August 22, 2023Assignee: Micron Technology, Inc.Inventors: James Ruane, Robert W. Strong
-
Patent number: 11736523Abstract: Systems and methods are described by which a serving module of a campaign controller identifies a first version of a model which the campaign controller uses to communicate a first simulated phishing communication to a plurality of users. The campaign controller receives a first response from a first user to the simulated phishing communication and a second response from a second user to the simulated phishing communication and determines that the first and second responses are corresponding, for example are the same or similar. The serving module assigns a first user to a first group of users and a second user to a second group of users and identifies a second version of the model to use for the first user and a third version of the model to use for the second user.Type: GrantFiled: April 15, 2021Date of Patent: August 22, 2023Assignee: KnowBe4, Inc.Inventor: Eric Sites
-
Patent number: 11728985Abstract: The present application relates to a method and apparatus for providing fault tolerant provisioning verification for cryptographic keys including receiving, via an interface, a first security key, a second security key, and a first verification data generated in response to the first security key and the second security key, coupling, by a processor, the first security key and the second security key to an electronic controller, receiving, by the processor, a second verification data generated by the electronic controller in response to the first security key and the second security key, and marking, by the processor, the controller as provisioned in response to the first verification data matching the second verification data.Type: GrantFiled: January 14, 2021Date of Patent: August 15, 2023Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Brian Farrell, Thomas M. Forest, David W. Racklyeft
-
Patent number: 11720706Abstract: A system, method, and computer-readable media for providing inline data loss prevention (DLP) within a group-based communication system. A DLP engine is included to apply an organization-specific DLP policy to a user input to determine whether the user input should be displayed in a group-based communication channel of the group-based communication system. Multiple organizations sharing a channel may each have their own respective organization-specific DLP policies applied to incoming and outgoing messages for that organization.Type: GrantFiled: February 19, 2021Date of Patent: August 8, 2023Assignee: Slack Technologies, LLCInventors: Max Baez, Calvin Cheng, Stephen Hamrick, Ratnadeep Bhattacharjee, Caroline Shen
-
Patent number: 11722503Abstract: Embodiments of the present disclosure provide centralized and coordinate learning techniques for identifying malicious e-mails while maintaining privacy of the analyzed e-mails of different organizations. One or more models may be generated and configured to construct feature sets that may be used to characterize e-mails as malicious or safe. Feedback associated with one or more models trained by a first organization (and other organizations) may be shared with a modelling device to modify parameters of the one or more models, where the modified parameters are configured to improve identification of malicious e-mail threats. The feedback provided by the first organization may not include e-mails received by the first organization, thereby enabling the privacy of the e-mails received by the first organization to be maintained in an confidential manner even though the updated parameters may be shared with a second organization.Type: GrantFiled: May 5, 2020Date of Patent: August 8, 2023Assignee: Accenture Global Solutions LimitedInventors: Amin Hassanzadeh, Benjamin Glen McCarty
-
Patent number: 11711214Abstract: Methods and systems for token transfer are described herein. A remote computing device may receive, from a mobile computing device, a public key of a public-private key pair. The public key may be associated with a first application of the mobile computing device. The first application may be configured to send credentials to a second application of the mobile computing device. The second application may be isolated from other applications executable on the mobile computing device. The remote computing device may receive, from the first application, a token. The token may have been previously issued to the first application and may have been encrypted, using the public key, by the first application. The remote computing device may send, to the second application, the token to enable the second application to authenticate with a plurality of services that interact with the second application.Type: GrantFiled: July 12, 2022Date of Patent: July 25, 2023Inventors: Thierry Duchastel, Harold Teramoto, Vikas Nambiar, Ashish Gujarathi
-
Patent number: 11706033Abstract: A method of sharing encrypted data includes, by an electronic device, receiving a password from a user to perform an action, receiving a salt value, generating a user key using the password and salt value, receiving an encrypted key location identifier value, decrypting the encrypted key location identifier value to obtain a key location identifier, receiving an encrypted read token value, decrypting the encrypted read token value using the user key to obtain a read token value, and transmitting the read token value and the key location identifier to a server electronic device.Type: GrantFiled: May 20, 2021Date of Patent: July 18, 2023Assignee: Powch, LLCInventors: Essam Abadir, Rosco Schock, Joshua R. Cox
-
Patent number: 11693949Abstract: Various embodiments are directed to a password security warning system. An artificial neural network or other types of models may be used to determine whether a password that is created, input, or proposed by a user via an interface includes one or more predictable or typical transformations or combinations of characters derived from user-specific information. Based on the determination, a warning may be provided to the user.Type: GrantFiled: January 20, 2021Date of Patent: July 4, 2023Assignee: Capital One Services, LLCInventors: Reza Farivar, Anh Truong, Vincent Pham, Austin Grant Walters, Galen Rafferty, Jeremy Edward Goodsitt
-
Patent number: 11687628Abstract: A system and method for performing a verification process of media content comprising, for example, receiving, via a digital vault, identification information from a non-fungible token (NFT) creator user or owner user of an NFT, wherein the NFT creator user initiates a minting process that creates the NFT for exchange on an NFT marketplace of the digital vault, and wherein the NFT is associated with a container file comprising media content submitted by a first user; verifying, via the digital vault, the identification information from the NFT creator user by comparing the identification information with stored user information at the digital vault; transmitting, via the digital vault, a confirmation code to the NFT creator user; and upon receiving the confirmation code, providing diligence information during a verification process to an NFT collector user in the NFT marketplace of the digital vault in verifying authenticity of the NFT creator user.Type: GrantFiled: June 17, 2022Date of Patent: June 27, 2023Assignee: TUNEGO, INC.Inventors: Mark Goldston, Stacy Haitsuka, John Kohl, Ofek Hayon, Harold MacKenzie
-
Patent number: 11689559Abstract: A method includes: receiving, by a computer, a user input corresponding to selection of a link associated with an address; determining, by the computer, that the address would not fit in an address bar of a browser displayed on a screen of the computer; and based on the determination that the address would not fit in the address bar of the browser, displaying, by the computer, in the address bar of the browser, a first element of the address and at least part of a second element of the address, including displaying a first portion of the second element of the address and an ellipsis indication representing a second portion of the second element of the address. The display of the first element of the address is visually distinguished from the display of the first portion of the second element of the address.Type: GrantFiled: April 22, 2021Date of Patent: June 27, 2023Assignee: Huawei Technologies Co., Ltd.Inventors: Aaron T. Emigh, James A. Roskind
-
Patent number: 11683189Abstract: With the popularity of Blockchain comes grave security-related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject to specific scenarios. The present disclosure proposes a method, a system, and a device for maintaining privacy and traceability of a Blockchain-based system. The method includes: registering in a Blockchain-based system; transmitting a message from a transmitter T to a receiver R via an anonymous network, after a registration request of the transmitter T has been approved and storing message transmission data generated during a message transmission process in a Blockchain; and performing an identity disclosure by using the message transmission data when the message is detected to be false. The anonymous network may transmit the message by onion routing. The solution proposed by the present disclosure can achieve traceability and privacy for a Blockchain-based system simultaneously.Type: GrantFiled: March 19, 2020Date of Patent: June 20, 2023Assignee: Jinan UniversityInventors: Jian Weng, Yue Zhang, Jiasi Weng, Ming Li, Weiqi Luo
-
Patent number: 11671452Abstract: A system and method for cryptographically securing data communications between a group of networked devices establishes and maintains an overlay network at the Application Layer, on top of a unicast routing service provided at the Internetworking Layer. The overlay network provides first, the routes that are used to deliver multicast datagrams and second, the cryptographic keys used to secure multicast datagrams. A common cryptographic key is established between all members of each group, and end-to-end encryption ensures that multicast datagrams can be accessed only by authorized group members. In other embodiments, keys are established between pairs of adjacent devices in the overlay network, and hop-by-hop encryption ensures that multicast datagrams can be accessed only by overlay network members.Type: GrantFiled: June 4, 2020Date of Patent: June 6, 2023Assignee: CALIOLA ENGINEERING, LLCInventor: Thomas R. Halford
-
Patent number: 11664258Abstract: Disclosed is a physical unclonable function generator circuit and method. In one embodiment, a physical unclonable function (PUF) generator comprising: a plurality of PUF cells, wherein each of the plurality of PUF cells comprises a first MOS transistor and a second MOS transistor, wherein terminal S of the first MOS transistor is connected to terminal D of the second MOS transistor at a dynamic node, terminal D of the first MOS transistor is coupled to a first bus and terminal G of the first NMOS transistor is coupled to a second bus, and terminals S and G of the second NMOS transistor are coupled to ground; a plurality of dynamic flip-flop (DFF) circuits wherein each of the plurality of DFF circuits is coupled to each of the plurality of PUF cells respectively; a population count circuit coupled to the plurality of DFF circuits; and an evaluation logic circuit having an input coupled to the population count circuit and an output coupled to the plurality of DFF circuits.Type: GrantFiled: June 4, 2021Date of Patent: May 30, 2023Assignee: Taiwan Semiconductor Manufacturing Co., Ltd.Inventors: Shih-Lien Linus Lu, Cormac Michael O'Connell
-
Patent number: 11665536Abstract: An information handling system includes a wireless management controller having a first wireless network interface used to establish a secure short-range wireless network connection between a management controller and a mobile device. A second wireless network interface establishes a peer-to-peer wireless network connection between the management controller and the mobile device. The management controller stores a secure shell public key received from the mobile device through the secure short-range wireless network connection. The management controller randomly identifies a port number for the peer-to-peer wireless network connection, and disables network traffic through other ports associated with the peer-to-peer wireless network connection.Type: GrantFiled: September 20, 2021Date of Patent: May 30, 2023Assignee: Dell Products L.P.Inventors: George Francis Ramsay, III, Saurabh Kishore, Arulnambi Raju, Dung K. Le