Patents Issued in January 9, 2024
-
Patent number: 11868431Abstract: According to one embodiment, an information processing apparatus includes: a processor configured to select a first case based on subject data including at least one feature, and acquire a first prediction value that is a value of an objective variable included in the first case; a first estimator configured to estimate frequency data indicating frequencies of observation values of the objective variable, based on a history of observation values of the objective variable; a second estimator configured to estimate first frequency data indicating frequencies of first prediction values, based on a history of first prediction values acquired before the first prediction value is acquired; and a corrector configured to correct the first prediction value acquired by the processor, based on the frequency data and the first frequency data.Type: GrantFiled: March 10, 2021Date of Patent: January 9, 2024Assignee: Kabushiki Kaisha ToshibaInventors: Mitsuru Kakimoto, Hiromasa Shin, Yoshiaki Shiga, Fang Ni
-
Patent number: 11868432Abstract: A method for extracting a kansei adjective of a product based on principal component analysis and explanation (PCA-E) includes constructing a product kansei evaluation vector matrix through original kansei adjectives; performing dimensionality reduction through PCA; and determining, based on principal component load factors, kansei adjectives representing principal components. In this way, the kansei adjectives extracted are explanatory to help users understand the selected kansei adjectives and make accurate evaluation.Type: GrantFiled: June 2, 2023Date of Patent: January 9, 2024Assignee: SICHUAN UNIVERSITYInventors: Wu Zhao, Xin Guo, Miao Yu, Kai Zhang, Wei Jiang, Chong Jiang, Bing Lai, Yiwei Jiang, Jun Li, Bo Wu, Xingyu Chen
-
Patent number: 11868433Abstract: In some implementations, a target object identification system may train a machine learning model to identify a target object in a volume of solid waste. The target object identification system may receive, from at least one imaging device positioned in a waste processing facility, imaging data associated with a portion of a volume of solid waste. The target object identification system may identify, using the trained machine learning model and based at least in part on the imaging data, the target object, wherein the target object is disposed within the volume of solid waste. The target object identification system may provide, to a separator control assembly that controls a separator, an output associated with the target object, wherein the output is to facilitate removal of the target object from the volume of solid waste.Type: GrantFiled: November 20, 2020Date of Patent: January 9, 2024Assignee: Accenture Global Solutions LimitedInventors: Sarah Crabb, Narendra Anand, Sai Gattu, Raquel Andrea Werner, Alfredo Arvide, Arijit Bhuyan, Gabriel Ernesto Gutierrez Anez, Aparna Pranavi Kakarlapudi
-
Patent number: 11868434Abstract: A method for creating training data for an artificial intelligence system to classify hyperspectral data. The method including receiving a hyperspectral image from a data source, wherein the hyperspectral image includes a first pixel group associated with a first classification, forming from the hyperspectral image a first augmented image using a first augmentation algorithm and a second augmented image using a second augmentation algorithm, selecting a first group of sample pixels from the hyperspectral image, the first augmented image and the second augmented image, wherein each pixel of the selected first group of sample pixels is having an association with the first classification or with a second classification and providing the selected first group of sample pixels and the associated classifications of each pixel for an artificial training system to be used as a training data.Type: GrantFiled: March 26, 2021Date of Patent: January 9, 2024Assignee: Sharper Shape OyInventors: Jaroslavs Uljanovs, Vladislav Serkov
-
Patent number: 11868435Abstract: According to an embodiments of the present disclosure, a method comprising: at an electronic device with one or more processors, obtaining a data set; identifying, based on the data set, a first data point set on a first embedding space, wherein each data point included in the first data point set corresponds to each data included in the data set; identifying a modified first data point set on the first embedding space based on the first data point set by adjusting a property associated with a distribution of the first data point set, wherein the modified first data point set includes at least one modified data point which is not included in the first data point set; and providing a Modified Image of Data (MIOD) by representing the modified first data point set on an imaging space may be provided.Type: GrantFiled: March 31, 2023Date of Patent: January 9, 2024Assignee: PEBBLOUS INC.Inventors: Joo Haeng Lee, Jeong Won Lee
-
Patent number: 11868436Abstract: At an artificial intelligence system, one or more classifier training iterations are performed until a training completion criterion is met. A particular iteration comprises obtaining, via an interactive interface, asynchronously with respect to the start of the iteration, class labels for data items identified in a previous iteration as candidates for labeling feedback. The particular iteration also comprises identifying, based on an analysis of classification predictions generated using classifiers trained using class labels obtained via the interface, another set of data items as candidates for labeling feedback. After the training criterion is met, a classifier trained using labels obtained during the iterations is stored.Type: GrantFiled: June 14, 2018Date of Patent: January 9, 2024Assignee: Amazon Technologies, Inc.Inventors: Sedat Gokalp, Abhishek Dan
-
Patent number: 11868437Abstract: Embodiments for training a deep neural network by applying tags to enhanced versions of a raw data set are disclosed. In one embodiment, the raw data set may comprise, for example, images, and the method may comprise receiving the raw data set of images, applying an enhancement to the images, deriving tags based on the enhanced images while maintaining a correlation to the original raw images, and using the raw images and the tags to train a deep neural network.Type: GrantFiled: September 30, 2020Date of Patent: January 9, 2024Assignee: Sighthound, Inc.Inventors: R J Burnham, Syed Zain Masood, Sam Michel, Jonathan Taylor
-
Patent number: 11868438Abstract: A method and a device for self-supervised learning, a storage medium, and an electronic device are provided. The method includes: organizing real points in one column along a vertical direction into a pillar; determining a predicted point in a next frame; determining a first loss term based on a minimum distance among distances between predicted points in the next frame and real points in the next frame, and generating a loss function including the first loss term; and performing self-supervised learning processing based on the loss function. A pillar motion parameter representing motion of a real point is determined with the pillar as a unit, so as to enhance correlation between point clouds. Self-supervised learning can be realized in a case of no precise correspondence between the predicted point and the real point, and training is performed based on a large number of unlabeled point clouds.Type: GrantFiled: April 15, 2021Date of Patent: January 9, 2024Assignee: BEIJING QINGZHOUZHIHANG INTELLIGENT TECHNOLOGY CO., LTDInventors: Xiaodong Yang, Chenxu Luo
-
Patent number: 11868439Abstract: Systems, methods, and other embodiments described herein relate to training a multi-task network using real and virtual data. In one embodiment, a method includes acquiring training data that includes real data and virtual data for training a multi-task network that performs at least depth prediction and semantic segmentation. The method includes generating a first output from the multi-task network using the real data and second output from the multi-task network using the virtual data. The method includes generating a mixed loss by analyzing the first output to produce a real loss and the second output to produce a virtual loss. The method includes updating the multi-task network using the mixed loss.Type: GrantFiled: March 29, 2021Date of Patent: January 9, 2024Assignee: Toyota Research Institute, Inc.Inventors: Vitor Guizilini, Adrien David Gaidon, Jie Li, Rares A. Ambrus
-
Patent number: 11868440Abstract: Subsets of training data are selected for iterations of a statistical model through a training process. The selection can reduce the amount of data to be processed by selecting the training data that will likely have significant training value for the pass. This can include using a metric such as the loss or certainty to sample the data, such that easy to classify instances are used for training less frequently than harder to classify instances. A cutoff value or threshold can also, or alternatively, be used such that harder to classify instances are not selected for training until later in the process when the model may be more likely to benefit from training on those instances. Sampling can vary between passes for variety, and the cutoff value might also change such that all data instances are eligible for training selection by at least the last iteration.Type: GrantFiled: October 4, 2018Date of Patent: January 9, 2024Assignee: A9.com, Inc.Inventors: Yash Patel, R. Manmatha, Alexander Smola, Son D. Tran, Sheng Zha
-
Patent number: 11868441Abstract: Systems and methods for detecting duplicate frames is provided. An automated duplicate frames detection service may extract one or more frames from content and determine a hamming distance between each of the extracted one or more frames and adjacent frames. In response to determining the hamming distance is less than a threshold hamming distance, the duplicate frames detection service may determine duplicate frames. In turn, the duplicate frames detection service may determine the duplicate frames are created without intent in response to determining the average distance between the one or more duplicate frames meets threshold criteria and provide an indication of the one or more duplicate frames without intent to a client device.Type: GrantFiled: July 30, 2021Date of Patent: January 9, 2024Assignee: NBCUniversal Media, LLCInventors: Michael S. Levin, Christopher Lynn, Alexandra Paige, Constantinos Hoppas, Matthew Nash, Rachel A. Price
-
Patent number: 11868442Abstract: A board damage classification system includes a Convolutional Neural Network (CNN) sub-engine and a Graph Convolutional Network (GCN) sub-engine that were trained based on digital images of structures that have experienced natural disasters. The CNN sub-engine receives a board digital image of a board, analyzes the board digital image to identify board features, and determines a board feature damage classification for the board features. The CGN sub-engine receives a board feature graph that was generated using the board digital image and that includes nodes that correspond to the board features in the board digital image, and defines relationships between the nodes included in the board feature graph. The board feature damage classification determined by the CNN sub-engine and the relationships defined by the GCN sub-engine are then used to generate a board damage classification that includes a damage probability for board features in the board digital image.Type: GrantFiled: June 8, 2021Date of Patent: January 9, 2024Assignee: Dell Products L.P.Inventors: Vinay Sawal, Ravi Shankar Sabapathy, Sithiqu Shahul Hameed
-
Patent number: 11868443Abstract: A neural network is trained to process input data and generate a classification value that characterizes the input with respect to an ordered continuum of classes. For example, the input data may comprise an image and the classification value may be indicative of a quality of the image. The ordered continuum of classes may represent classes of quality of the image ranging from “worst”, “bad”, “normal”, “good”, to “best”. During training, loss values are determined using an ordered classification loss function. The ordered classification loss function maintains monotonicity in the loss values that corresponds to placement in the continuum. For example, the classification value for a “bad” image will be less than the classification value indicative of a “best” image. The classification value may be used for subsequent processing. For example, biometric input data may be required to have a minimum classification value for further processing.Type: GrantFiled: May 12, 2021Date of Patent: January 9, 2024Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Rajeev Ranjan, Prithviraj Banerjee, Manoj Aggarwal, Gerard Guy Medioni, Dilip Kumar
-
Patent number: 11868444Abstract: In an approach for creating synthetic visual inspection data sets for training an artificial intelligence computer vision deep learning model utilizing augmented reality, a processor enables a user to capture a plurality of images of an anchor object using a camera on a user computing device. A processor receives the plurality of images of the anchor object from the user. A processor generates a baseline model of an anchor object. A processor generates a training data set. A processor trains the baseline model of the anchor object. A processor creates a trained Artificial Intelligence (AI) computer vision deep learning model. A processor enables the user to interact with the trained AI computer vision deep learning model in an access mode.Type: GrantFiled: July 20, 2021Date of Patent: January 9, 2024Assignee: International Business Machines CorporationInventors: Michael Charles Hollinger, Mal Pattiarachi, Abhinav Pratap Singh
-
Patent number: 11868445Abstract: A central asset registry and associated satellite registries tie Digital Asset Management (DAM) repositories and satellite repositories into a unified enterprise system. The system removes rights and asset relationship tracking from the DAMs and the satellites by gathering asset metadata tags and capturing digital asset rights and relationships between assets to improve speed, scalability, and flexibility in analyzing and traversing networks of rights and relationships of digital assets. The central asset registry and the satellite registries use a pluggable architecture and track and store multi-dimensional relationships as an asset hierarchy. The asset hierarchy and rights model depicts rights and relationship data between the assets and provides a flexible array of asset types and properties for addition of new assets, new asset types, and new rights without re-factoring the other data, nodes, and edges. The system uses asset metadata to create edge relationships between the assets.Type: GrantFiled: August 7, 2020Date of Patent: January 9, 2024Assignee: DISCOVERY COMMUNICATIONS, LLCInventors: Beth Jackson, William C. Hurst, Chris Goodacre, Melissa Roberts, Lisa Seeto, Pedro Lopez, Jarrod Clift, Brant Boehmann, Dennis Killingsworth
-
Patent number: 11868446Abstract: In a method of operating a neural network model, neural network model data and raw data are received during a non-secure mode. The neural network model data is encrypted by digital rights management (DRM). An operation mode is changed from the non-secure mode to a secure mode based on the receiving the neural network model data and the raw data. The neural network model is executed during the secure mode based on decrypted neural network model data that is obtained by decrypting the neural network model data encrypted by the DRM. The inference operation is performed on the raw data during the secure mode using the neural network model.Type: GrantFiled: June 14, 2021Date of Patent: January 9, 2024Assignee: Samsung Electronics Co., Ltd.Inventor: Jonghyuk Lee
-
Patent number: 11868447Abstract: The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing,Type: GrantFiled: September 30, 2022Date of Patent: January 9, 2024Assignee: OL SECURITY LIMITED LIABILITY COMPANYInventors: David H. Sitrick, Russell T. Fling
-
Patent number: 11868448Abstract: Techniques for host resource group sharing in a provider network are described. A resource share is made of a host resource group made up of dedicated hosts in the provider network. The share provides access to the host resource group of a primary account with one or more other principals—e.g., user accounts, an organization, or a group of users. The other principals can launch compute instances into the host resource group, which may cause the automatic provisioning of new hosts into the host resource group, of the primary account, as needed.Type: GrantFiled: June 22, 2020Date of Patent: January 9, 2024Assignee: Amazon Technologies, Inc.Inventors: Murtaza Muidul Huda Chowdhury, Ankit Jain, Ramapulla Reddy Chennuru, Niti S. Khadapkar, Yashi Kamboj, Xiangyu Ren, Anupama Anand
-
Patent number: 11868449Abstract: Disclosed is a system and method for the monitoring and authorization of an optimization device in a network. In exemplary embodiments, an optimization device transmits an authorization request message to a portal to receive authorization to operate. The portal transmits an authorization response message to the optimization device with capability parameters for operation of the device, including at least one expiration parameter for the authorization. The optimization device sends updated authorization request messages to the portal with its device usage information, such that the portal can dynamically monitor the optimization device and continue to authorize its operation.Type: GrantFiled: December 31, 2020Date of Patent: January 9, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: David Anthony Hughes, Damon John Ennis
-
Patent number: 11868450Abstract: A system, apparatuses, and methods for device and network security are discussed herein. In an example, a security device for providing security to user-entered inputs includes a universal serial bus (“USB”) port configured to receive a connector of an input device and a USB connector configured to connect to a port of a user device. The apparatus also includes a processor configured to receive a string of characters from the input device that correspond to inputs made by a user into a web browser or application on the user device. The processor adds at least one security character to the string of characters to generate a watermark string, and transmits the watermark string to the user device. The processor is configured to format the at least one security character such that only the string of characters are displayed in the web browser or the application at the user device.Type: GrantFiled: July 1, 2022Date of Patent: January 9, 2024Assignee: SUNSTONE INFORMATION DEFENSE, INC.Inventor: David K. Ford
-
Patent number: 11868451Abstract: On-demand application permissions is described, including obtaining one or more consents associated with one or more functions of an application, where the application does not allow using the functions without associated consents; receiving, from a user, a consent associated with a function; activating to allow that function to be executed; when a request from the user to use another function is received, determining that the another function requires an associated consent to activate; determining that there is no consent from the user associated with the another function; prompting for a consent associated with the another function; receiving the consent associated with another function; and activating to allow the another function to be executed.Type: GrantFiled: December 9, 2021Date of Patent: January 9, 2024Assignee: Google LLCInventor: Alejo Grigera
-
Patent number: 11868452Abstract: Provided is a method for automatically registering a user on a field device for the purpose of administering the field device, including a) providing user information on the basis of an identity of the user and an identity of the field device by a security device; b) transmitting the provided user information to a mobile device of the user; c) generating field-device-specific registration information on the basis of the transmitted user information by the mobile device; and d) registering the user on the field device by the generated registration information. This method has the particular advantage that a highly secure infrastructure can be used for administering access information for administering the field devices without problems arising during the registration process.Type: GrantFiled: September 17, 2020Date of Patent: January 9, 2024Inventors: Dirk Kröselberg, Carl Henrik Denis, Silvio Riener
-
Patent number: 11868453Abstract: In one embodiment, certain words or phrases spoken by customers during calls to a call center are used to identify or authenticate the user. Words or phrases such as a customer's name, or an account number or telephone number, are selected for a customer. Recordings of the selected words or phrases spoken by the customer during previous calls are used to generate voiceprints that are stored and associated with the customer. Later, when the customer calls the call center, instances of the customer speaking the selected words are extracted from the call (referred to herein as “audio-of-interest”) and are compared against the voiceprints stored for the customer. If the voiceprints match the audio-of-interest the customer is authenticated.Type: GrantFiled: November 7, 2019Date of Patent: January 9, 2024Assignee: Verint Americas Inc.Inventors: Marc Adam Calahan, Timothy Andrew Furnell, Jamie Richard Williams
-
Patent number: 11868454Abstract: An electronic device is disclosed that includes a camera, a display, and a processor.Type: GrantFiled: September 13, 2018Date of Patent: January 9, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Hee Jun Lee, Hyeong Wook Yang, Ju Woan Yoo, Kwang Hyun Lee, Won Suk Chang, Tushar Balasaheb Sandhan, Yang Soo Lee, Ji Yoon Park, Da Som Lee
-
Patent number: 11868455Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.Type: GrantFiled: February 22, 2021Date of Patent: January 9, 2024Assignee: Apple Inc.Inventors: Deepti S. Prakash, Lucia E. Ballard, Jerrold V. Hauck, Feng Tang, Etai Littwin, Pavan Kumar Anasosalu Vasu, Gideon Littwin, Thorsten Gernoth, Lucie Kucerova, Petr Kostka, Steven P. Hotelling, Eitan Hirsh, Tal Kaitz, Jonathan Pokrass, Andrei Kolin, Moshe Laifenfeld, Matthew C. Waldon, Thomas P. Mensch, Lynn R. Youngs, Christopher G. Zeleznik, Michael R. Malone, Ziv Hendel, Ivan Krstic, Anup K. Sharma
-
Patent number: 11868456Abstract: A modular biometric station system is used to form one or more modular biometric stations with cohesive form factors. Such biometric stations include a core unit, one or more end caps, and one or more modules. The modules may be configured to communicably and electrically couple to one or more of the end caps. The end caps may be configured to communicably and electrically couple to the core unit and/or one or more of the modules and may communicably and electrically couple one or more of the modules to the core unit. The core unit, end caps, and/or the modules may be able to communicably interact when coupled together. The core unit, end caps, and modules may all share a form factor. The core unit may include hardware and/or software that satisfies common requirements, and the modules may include peripherals and/or other components that can be coupled to the core unit to adapt the modular biometric station to a variety of different needs of different applications.Type: GrantFiled: May 13, 2021Date of Patent: January 9, 2024Assignee: SECURE IDENTITY, LLCInventors: Matthew Wilkins, Austin Puckett, Raymond Protasiewicz, Aditi Vyas, Travis Baldwin, Gregory Sparks, Navni Garg, Nicholas Oxley
-
Patent number: 11868457Abstract: The present invention relates to a device and method for authenticating users and obtaining user signatures, which can be provided in business services using networks and various user information devices including information devices equipped with touch displays such as smartphones, or desktop PCs, laptops, tablet PCs, CCTVs, IoT, self-driving cars, drones, etc. and, more specifically, to a device and method for authenticating users and obtaining user digital signatures which, as an encryption key/password generation and verification system for user authentication to be provided in various web-based businesses in which various information devices are serviced in a client-server or peer-to-peer model network environment and in app-based businesses running on a specific platform, is simpler and ensures confidentiality and security.Type: GrantFiled: May 31, 2019Date of Patent: January 9, 2024Assignee: NEOPAD INC.Inventor: Hee Sung Chung
-
Patent number: 11868458Abstract: The present disclosure provides a pixel structure comprising a plurality of layers for providing a touch sensitive pixel of a sensing array. The layers comprising: a thin film transistor; and a conductive layer deposited on a dielectric shield to be touched by an object to be sensed and arranged to provide a capacitive sensing electrode coupled to the thin film transistor. The present disclosure also provides methods of manufacturing such a pixel structure.Type: GrantFiled: June 5, 2020Date of Patent: January 9, 2024Assignee: TOUCH BIOMETRIX LIMITEDInventors: Henricus Derckx, Wilhelmus Van Lier, Michael A. Cowin
-
Patent number: 11868459Abstract: An operation method with fingerprint event recognition, an apparatus, and a mobile terminal relate to the field of communications technologies. The method includes receiving a fingerprint event from a user at a preset position on a mobile terminal, and displaying on a display screen of the mobile terminal at least one shortcut when the fingerprint matches a stored fingerprint event. A sliding gesture input from the user is detected, the sliding gesture starting at the preset position and extending from the preset position to select a first shortcut from the at least one shortcut, thereby improving operation efficiency.Type: GrantFiled: May 18, 2022Date of Patent: January 9, 2024Assignee: GODO KAISHA IP BRIDGE 1Inventors: Jianjun Chen, Fredrik Rusek, Hongjun Wang
-
Patent number: 11868460Abstract: A computer program product includes one or more computer readable storage media, and program instructions collectively stored on the one or more computer readable storage media, the program instructions include program instructions to authenticate an application as authorized to perform encryption and program instructions to receive data at an authenticated encryption layer. The program instructions include program instructions to encrypt the data using an encryption key, wherein the encryption key is not available to the application, and program instructions to generate a watermark token of the encrypted data. The program instructions include program instructions to generate a watermark of the encrypted data using the watermark token and a watermark key and program instructions to send the encrypted data, the watermark token, and the watermark to a storage system. The storage system is configured to verify the encrypted data for storage using the watermark key.Type: GrantFiled: March 5, 2021Date of Patent: January 9, 2024Assignee: International Business Machines CorporationInventors: Guerney D. H. Hunt, Steven Robert Hetzler
-
Patent number: 11868461Abstract: The present disclosure generally relates to displaying a user interface for sharing an account associated with a first user identity with a second user identity. The user interface includes a first sharing option and a second sharing option. One or more inputs corresponding to a request to share the account are detected. If the one or more inputs include a selection of the first sharing option, a request to invite the second user identity to become a joint owner of the account is transmitted. If the one or more inputs include a selection of the second sharing option, a request to invite the second user identity to become a participant of the account without becoming a joint owner of the account is transmitted.Type: GrantFiled: August 5, 2021Date of Patent: January 9, 2024Assignee: Apple Inc.Inventors: Mischa McLachlan, Steven Eastcott, Brian Jett, Katie McIndoe, Thomas John Miller, Ashish Chandrakant Nagre, Rachel Reddy, Marcel Van Os, Vinay Venkatesh, Haya Iris Villanueva Gaviola, Nicole Marie Weaver, Jennifer Bailey, Corey Fugman, Richard Heard, Akila Suresh
-
Patent number: 11868462Abstract: A method, system, and apparatus comprising: automatically identifying a login session to a first software system in a Graphical User Interface (GUI) of a user device; automatically extracting user credentials from the login session; automatically manipulating at least a portion of the user credentials to obtain manipulated credentials; automatically verifying that the login session is authentic by: encrypting the user credentials, providing the encrypted credentials to a separate environment, and reconstructing the login session at the separate environment; and automatically adding the manipulated credentials to an account of the user in a second software system that is independent from the separate environment.Type: GrantFiled: November 1, 2022Date of Patent: January 9, 2024Assignee: Vim Inc.Inventors: Asaf David, Nicolas Mendzylewski, Moran Shemesh, Chen Rozenes, Daniel Hallel Jakobsen, Nandy Vaisman
-
Patent number: 11868463Abstract: A method for managing an application permission and an electronic device includes an electronic device that displays a home screen, where the home screen includes an icon of a first application. In response to a first operation from the user on the icon, the electronic device displays a first interface, and when displaying the first interface, the electronic device allows the first application to use a first application permission. In response to a second operation of the user on the first interface, the electronic device displays a second interface, and when displaying the second interface, the electronic device rejects the first application to use the first application permission.Type: GrantFiled: January 23, 2019Date of Patent: January 9, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Zhongju Yuan, Manhai Yao, Haitao Long
-
Patent number: 11868464Abstract: A method and/or system for processing an application for launch to determine whether it might be legitimate or non-legitimate, and if non-legitimate taking security action.Type: GrantFiled: December 22, 2021Date of Patent: January 9, 2024Assignee: SentryBay LimitedInventors: David Lynch Waterson, Rynier Van Der Watt
-
Patent number: 11868465Abstract: A computer includes a memory and a processor programmed to execute instructions stored in the memory. The instructions include identifying a function in a binary file, assigning one of a plurality of classifications to the function, and determining that the function requires stack cookie protection based at least in part on the classification assigned to the function.Type: GrantFiled: October 25, 2021Date of Patent: January 9, 2024Assignee: Blackberry LimitedInventors: Adam John Boulton, Benjamin John Godwood
-
Patent number: 11868466Abstract: An apparatus includes a processor coupled to a memory. The processor calls a second function from a first function by coloring with an inaccessible color value a first memory area associated with the first function, branching to the second function, coloring with a second color value a second memory area associated with the second function, operating on the second memory area, and coloring with the inaccessible color value the second memory area. The processor then returns control to the first function, and colors with a first color value the first memory area. The coloring step includes branching to a coloring routine that includes a basic block beginning with a single branch target instruction, identifying and authorizing the calling routine, coloring with a hardcoded color value a memory area associated with the calling routine, and returning to the calling routine.Type: GrantFiled: March 12, 2019Date of Patent: January 9, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Jan-Erik Ekberg
-
Patent number: 11868467Abstract: A semiconductor device (100) includes: a determination unit (110) configured to determine whether an avoidance condition of inspection of control flow integrity is satisfied (e.g., a degree of similarity with a previous input value is in a predetermined range) based on determination auxiliary information, which is at least an input value in a target code block to be executed among a plurality of code blocks in a predetermined program, and an inspection unit (120) configured to avoid inspection of control flow integrity in the target code block when it is determined that the avoidance condition is satisfied.Type: GrantFiled: June 25, 2019Date of Patent: January 9, 2024Assignee: NEC CORPORATIONInventors: Astha Jada, Toshiki Kobayashi, Takayuki Sasaki, Daniele Enrico Asoni, Adrian Perrig
-
Patent number: 11868468Abstract: Examples of the present disclosure describe systems and methods for discrete processor feature behavior collection and analysis. In aspects, a monitoring utility may initialize a set of debugging and/or performance monitoring feature sets for a microprocessor. When the microprocessor receives from software content a set of instructions that involves the loading of a set of modules or code segments, the set of modules or code segments may be evaluated by the monitoring utility. The monitoring utility may generate a process trace of the loaded set of modules or code segments. Based on the process trace output, various execution paths may be reconstructed in real-time. The system and/or API calls made by the microprocessor may then be compared to the process trace output to quickly observe the interaction between the software content and the operating system of the microprocessor.Type: GrantFiled: February 26, 2021Date of Patent: January 9, 2024Assignee: OPEN TEXT INC.Inventor: Eric Klonowski
-
Patent number: 11868469Abstract: A microprocessor that mitigates side channel attacks includes a front end that processes instructions in program order and a back end that performs speculative execution of instructions out of program order in a superscalar fashion. Producing execution units produce architectural register results during execution of instructions. Consuming execution units consume the produced architectural register results during execution of instructions. The producing and consuming execution units may be the same or different execution units. Control logic detects that, during execution by a producing execution unit, an architectural register result producing instruction causes a need for an architectural exception and consequent flush of all instructions younger in program order than the producing instruction and prevents all instructions within the back end that are dependent upon the producing instruction from consuming the architectural register result produced by the producing instruction.Type: GrantFiled: March 17, 2021Date of Patent: January 9, 2024Assignee: Ventana Micro Systems Inc.Inventors: John G. Favor, Srivatsan Srinivasan
-
Patent number: 11868470Abstract: A system and method for detecting embedded malware from a device including a receiver for receiving embedded binary image; a memory for encoding and storing the received embedded binary image; and one or more processors coupled to the receiver. The method includes extracting statistical features from the encoded embedded binary image; producing gridded data from the statistical features, using SV; inputting the gridded data to a machine learning (ML) trained to detect embedded malware from the gridded data; and determining whether the embedded binary image is benign or malware.Type: GrantFiled: January 12, 2021Date of Patent: January 9, 2024Assignee: RAYTHEON COMPANYInventors: Ryan Howard Thomson, Ross Mackinnon, Brandon Woolley
-
Patent number: 11868471Abstract: A method of particle-based threat scanning may include obtaining a sample from a sample source, generating a plurality of particles from the sample, wherein each particle from the plurality of particles is an array of unique bytes generated based on one or more particle properties, and determining whether the sample is associated with a known threat by comparing the plurality of particles to particle threat signatures in a threat database.Type: GrantFiled: January 27, 2021Date of Patent: January 9, 2024Assignee: Amazon Technologies, Inc.Inventor: Mircea Ciubotariu
-
Patent number: 11868472Abstract: According to examples, an apparatus may include a processor may identify features in a plurality of data items, determine similarities and/or patterns in the identified features, and group the plurality of data items into a plurality of clusters of data items based on the determined similarities and/or patterns in the identified features in the plurality of data items. The processor may also evaluate the plurality of clusters to identify a potentially malicious pattern among the data items in the plurality of clusters. In addition, the processor may, based on a potentially malicious pattern being identified in a generated cluster of the generated clusters, execute an action with regard to the data items in the generated cluster.Type: GrantFiled: March 30, 2021Date of Patent: January 9, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Abhijeet Surendra Hatekar, Jonathan Ray Armer
-
Patent number: 11868473Abstract: A method for constructing behavioral software signatures. The method includes: embedding execution traces of a set of software in a vector space, an execution trace of a software agent including at least one event and being representative of the execution of the software, the embedding representing an event of the execution trace by a vector encoding a context for occurrence of the event; partitioning the vectors associated with the software of the set to generate a data group representative of a behavior, a behavioral label being associated with the data group; associating a behavioral label with a vector, which is representative of the data group to which the vector belongs, and associating a trace of behavioral labels with a trace of vectors, the trace of labels being representative of execution of a software agent, and extracting in the trace of labels at least one behavioral signature associated with the software.Type: GrantFiled: January 30, 2020Date of Patent: January 9, 2024Assignee: ORANGEInventors: Baptiste Olivier, Xiao Han
-
Patent number: 11868474Abstract: A method for securing a plurality of compute nodes includes authenticating a hardware architecture of each of a plurality of components of the compute nodes. The method also includes authenticating a firmware of each of the plurality of components. Further, the method includes generating an authentication database comprising a plurality of authentication descriptions that are based on the authenticated hardware architecture and the authenticated firmware. Additionally, a policy for securing a specified subset of the plurality of compute nodes is implemented by using the authentication database.Type: GrantFiled: January 8, 2019Date of Patent: January 9, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Nigel Edwards, Michael R. Krause, Melvin Benedict, Ludovic Emmanuel Paul Noel Jacquin, Luis Luciani, Thomas Laffey, Theofrastos Koulouris, Shiva Dasari
-
Patent number: 11868475Abstract: A new approach is proposed that contemplates systems and methods to support post reset fuse reload for latency reduction. First, values of fuses are read once and stored into one or more load registers on an electronic device, wherein the load registers are protected. Once the values of the fuse are loaded into the load registers, a valid indicator of the load registers is set indicating that the values have been successfully loaded into the load registers. When other components of the electronic device need to access these values, the other components will check the load registers first. If it is determined that the valid indicator of the load registers is set, the stored values are read from the load registers instead of from the fuses. If the valid indicator of the load registers is not set, the values are loaded again from the fuses into the load registers.Type: GrantFiled: October 31, 2020Date of Patent: January 9, 2024Assignee: Marvell Asia Pte LtdInventors: Ramacharan Sundararaman, Nithyananda Miyar, Martin Kovac, Avinash Sodani, Raghuveer Shivaraj
-
Patent number: 11868476Abstract: Some embodiments may facilitate boot-specific key access to perform cryptographic operations. A first boot record and a second boot record may be generated independently in response to a request to boot a virtual device. The first and second boot records may be compared and in response to a match between the first boot record and the second boot record, an identify certificate may be obtained. Authorization to access and use a key for cryptographic operations may be obtained in response to a verification of the identity certificate by a cryptographic processor.Type: GrantFiled: June 10, 2021Date of Patent: January 9, 2024Assignee: HYPORI, INC.Inventors: Brian J. Vetter, Phani Achanta, Mohammad Salman Dhedhi, Muhammad Irfan Azam, Terrimane Shon Pritchett
-
Patent number: 11868477Abstract: Some storage systems are configured with VDL (valid data length) type controls that are implemented on a per cluster basis and, in some instances, on a sub-cluster basis, rather than simply a per file basis. In some instances, per-cluster VDL metadata for the storage clusters is stored and referenced at the edge data volume nodes of a distributed network for the storage system rather than, and/or without, storing or synchronizing the per-cluster VDL metadata at a master node that manages the corresponding storage clusters for the different data volume nodes. Sequence controls are also provided and managed by the master node and synchronized with the edge data volume nodes to further control access to data contained in the storage clusters.Type: GrantFiled: July 18, 2022Date of Patent: January 9, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Mathew George, Rajsekhar Das, Vladimir Petter
-
Patent number: 11868478Abstract: Configuration monitoring is performed using a computer-based system and method by identifying misconfigured settings through the collection of large amounts of configuration data from diverse sources. The configuration data is then analyzed to identify misconfigured items. Automation of such configurations is implemented using machine learning to analyze existing configurations as well as new configurations. By using machine learning, the computer-based system and method can predict a pass state or a fail state of the configuration of a newly connected system in an organization. A logistic regression classifier is trained using old complying configuration data and data reflecting industry standards. The trained classifier can predict and classify whether a new configuration passes or fails the industry standards based on the training data of old configuration data.Type: GrantFiled: May 18, 2020Date of Patent: January 9, 2024Assignee: SAUDI ARABIAN OIL COMPANYInventors: Johara Abdulrahman Al Jarri, Aasim Ajaz
-
Patent number: 11868479Abstract: A security framework for life-critical and safety-critical devices, specifically medical devices, using: a) runtime, adaptive methods that dynamically assess the risk of newly discovered vulnerabilities and threats, and b) automatic mitigation methods that reduce system risk by seamlessly reconfiguring the device to operate within different execution modes. This technology automatically isolates threats by disabling affected system components. A multi-modal software design uses adaptive software in which operational modes have monotonically decreasing cumulative risk. Formal risk models are used to model the individual risk of accessing or controlling system components and to automatically calculate the cumulative risk of software modes. The automated detection of potential threats by the system or reporting of known vulnerabilities will dynamically change the system risk.Type: GrantFiled: November 1, 2019Date of Patent: January 9, 2024Assignees: ARIZONA BOARD OF REGENTS ON BEHALF OF THE UNIVERSITY OF ARIZONA, JOHANNES KEPLER UNIVERSITY LINZInventors: Roman Lysecky, Jerzy Rozenblit, Johannes Sametinger, Aakarsh Rao, Nadir Carreon
-
Patent number: 11868480Abstract: Provided are mechanisms and processes for computational risk analysis and intermediation. Security practices information characterizing security measures in place at a first computing system may be received from the first computing system via a network. Computing services interaction information characterizing data transmitted from a second computing system to the first computing system may be received from the second computing system via the network. A processor may determine a risk profile for the first computing system based on the security practices information. Based on the risk profile and the computing services interaction information, the processor may then determine an estimate of the information security risk associated with transmitting the data from the second computing system to the first computing system. A risk assessment message including the estimate of the information security risk may be transmitted to the second computing system.Type: GrantFiled: June 3, 2021Date of Patent: January 9, 2024Assignee: VALENTE SHERMAN, INC.Inventors: Russell Sherman, Paul Valente