Patents Issued in February 1, 2024
  • Publication number: 20240039898
    Abstract: Embodiments are directed to managing communication over one or more networks. An underlay network that couples a source gateway and a target gateway using underlay protocols may be provided such that the target gateway includes two or more port groups that may each be associated with a separate target node. An overlay network may be provided on the underlay network based on policy information such that the source gateway and the target gateway may each be assigned separate gateway identifiers (GIDs) that are associated with the overlay network. In response to the source gateway authorizing a source node to employ the overlay network to communicate one or more encrypted payloads to a target node, the one or more encrypted payloads may be provided to the target node based on the overlay network and the policy information.
    Type: Application
    Filed: July 7, 2023
    Publication date: February 1, 2024
    Inventors: Ludwin Fuchs, Dustin Orion Lundquist
  • Publication number: 20240039899
    Abstract: A system and method for sending end-to-end encrypted messages comprising a sender's web browser, a recipient's web browser, and a server. The system and method avoid both the sender and the recipient having to download encryption programs themselves onto their respective computers. In addition, the system and method ensure that unencrypted messages are never disclosed to the server. The system and method operate by first downloading the web browser files, verifying them and then preventing the web browser page from refreshing, thereby preventing malicious code from entering the web browser each time the web browser page would normally be refreshed. The system and method also provide for securely implementing cryptography using client-side scripting in a web browser.
    Type: Application
    Filed: October 6, 2023
    Publication date: February 1, 2024
    Inventor: Michael A. MEIXLER
  • Publication number: 20240039900
    Abstract: The technologies described herein are generally directed to using a transmission profile to provide availability and security options for communicating data in a fifth generation (5G) network or other next generation networks. For example, a method described herein can include identifying a transmission profile for a data item for transmission to a destination node, with the transmission profile including transmission parameters having an availability importance parameter applicable to an availability of the data item by the destination node and a security importance parameter applicable to a security applicable to transmission. The method can further include segmenting the data item into data segments comprising a first data segment and a second data segment. Further, the method can include, based on the transmission profile, selecting a first network route and a second network route for a transmission of the data segments.
    Type: Application
    Filed: July 27, 2022
    Publication date: February 1, 2024
    Inventors: James Pratt, Yupeng Jia, Eric Zavesky
  • Publication number: 20240039901
    Abstract: An electronic device and a data transmission method thereof are provided. The data transmission method includes: setting dummy data having multiple dummy bits; inserting the dummy bits of the dummy data into transmission data according to an insertion type to generate encryption data; and transmitting the encryption data to a memory device.
    Type: Application
    Filed: August 1, 2022
    Publication date: February 1, 2024
    Applicant: Winbond Electronics Corp.
    Inventor: Wen-Chiao Ho
  • Publication number: 20240039902
    Abstract: In various embodiments, a kernel uses a NIC to transmit encrypted data over TCP connections. The kernel causes the NIC to encrypt first data to generate a first transmission control protocol (TCP) packet in accordance with a hardware-based transport layer security (TLS) offload mode. The kernel computes a first re-transmission statistic in response to the first TCP packet failing to reach a first device over a first TCP connection; the kernel assigns the first TCP connection to a software-based TLS offload mode instead of the hardware-based TLS offload mode based on the first re-transmission statistic. Subsequently, the kernel encrypts second data to generate a second TCP packet in accordance with the software-based TLS offload mode, the kernel then causes the NIC to transmit the second TCP packet to the first device over the first TCP connection.
    Type: Application
    Filed: August 1, 2022
    Publication date: February 1, 2024
    Inventor: Andrew John GALLATIN
  • Publication number: 20240039903
    Abstract: This disclosure describes techniques for performing multi-factor authentication (MFA) by utilizing user generated authenticating gestures. The techniques may include establishing and monitoring peer-to-peer communication links between user devices. The techniques may include monitoring channel properties for fluctuations in the channel properties associated with the user generated authenticating gesture passing through signals of the communication links. The techniques may further include comparing a gesture performed by a user to a predefined authenticating gesture. The techniques may include determining a pattern of fluctuations in the channel properties associated with the predefined authenticating gesture. The techniques may include determining a confidence score associated with comparing the gesture performed and the predefined authenticating gesture. The techniques may further include determining a proximity of the user and/or the gesture to the user device.
    Type: Application
    Filed: July 27, 2022
    Publication date: February 1, 2024
    Inventors: Indermeet Gandhi, Srinath Gundavelli
  • Publication number: 20240039904
    Abstract: Methods and apparatus are disclosed for facilitating online storage of files (e.g., audio tracks, video, etc.) for playback/access or sale/exchange by the owners of the files without violating copyrights that copyright holders have in the files. For example, by providing a playback service that does not store additional versions of an audio file when the file is transmitted to, and immediately played on, a user device without buffering, the present invention avoids violating copyright laws by not making copies of the file. Numerous other aspects are disclosed.
    Type: Application
    Filed: October 16, 2023
    Publication date: February 1, 2024
    Inventors: Howard W. Lutnick, Dean P. Alderucci
  • Publication number: 20240039905
    Abstract: This disclosure is directed to intelligent synchronization of computing users, and associated timing data, based on parameters or data received from computing systems connected via wireless, satellite, wire-based, optical-fiber based, etc., computing networks.
    Type: Application
    Filed: October 8, 2023
    Publication date: February 1, 2024
    Inventor: Lilly R. Talavera
  • Publication number: 20240039906
    Abstract: A platform for creating secured connections between motor carriers and intermediaries by requiring physical identity verification of users and authentication of association with regulated entities. The platform may also offer security through distinguishing between authorized motor carrier personnel and third party dispatcher services.
    Type: Application
    Filed: August 1, 2022
    Publication date: February 1, 2024
    Applicant: HIGHWAY APP, INC.
    Inventors: CHARLES JORDAN GRAFT, BRITTANY HARLAN GRAFT, BRENNAN BAILEY, LAWSON HOPKINS, CLARK TAYLOR, CHARLES DEW, ROBERT CRADY, JOHN HARLAN
  • Publication number: 20240039907
    Abstract: Arrangements for providing multi-party exchange functions are provided. In some aspects, a request for exchange may be received by a computing platform. The request for exchange may include identification of parties involved in the exchange, identification of goods, services, property, or the like, involved in the exchange, and the like. In some examples, the computing platform may determine a value of property, goods, or services associated with the exchange. The computing platform may request additional exchange data from one or more other parties. For instance, data associated with the exchange and another party to the exchange may be requested and received. In some examples, unique exchange identifiers may be generated linking each party to the exchange to the goods, services or property being exchange, a value, or the like. An indication of acceptance may be received and one or more exchange processing functions may be executed.
    Type: Application
    Filed: October 11, 2023
    Publication date: February 1, 2024
    Inventors: Morgan S. Allen, Melissa Ortiz-Munoz, ChellaPrabhu Andrew Mariadoss
  • Publication number: 20240039908
    Abstract: A wireless earpiece system, method, and one or more wireless earpieces for communications between one or more wireless earpieces and a wireless dongle. The one or more wireless earpieces are associated with the wireless dongle. Biometric readings of a user are performed using the wireless earpieces. Content is communicated between the one or more wireless earpieces and the wireless dongle in response to determining the user is authorized to communicate with the wireless dongle based on the biometric readings. The wireless dongle is physically connected to a report of a system.
    Type: Application
    Filed: September 29, 2023
    Publication date: February 1, 2024
    Applicant: BRAGI GmbH
    Inventor: Peter Vincent Boesen
  • Publication number: 20240039909
    Abstract: A method performed by a user device may include obtaining biometric information relating to a user of the user device using a biometric sensor of the user device; determining that the biometric information is valid; generating a biometric indicator indicating that the biometric information is valid; providing a request for a callback from an entity, wherein the request includes the biometric information indicating that the biometric information is valid; and receiving the callback from the entity, wherein the callback is received based on the biometric information indicating that the biometric information is valid, and wherein the callback is associated with an entity identifier that is not provided to the user.
    Type: Application
    Filed: October 6, 2023
    Publication date: February 1, 2024
    Inventors: Jeffrey BROWN, Clayton JOHNSON
  • Publication number: 20240039910
    Abstract: A method for authenticating a communication partner on a device is provided, in which method, in addition to a physical device implementation, there is at least one virtual device implementation allocated to the device, the method having the following steps: receiving an access authorization of a communication partner one first of these two device implementations, checking, by the first device implementation, the access authorization and if the access authorization is deemed permissible, providing an authorization verification from the first device implementation to the communication partner, and permitting an access to the second device implementation of these two device implementations by the communication partner by the authorization verification.
    Type: Application
    Filed: August 10, 2021
    Publication date: February 1, 2024
    Inventors: Rainer Falk, Steffen Fries
  • Publication number: 20240039911
    Abstract: Techniques for verifying correctness of associations between assets related to events detected in at least one computer network and assets in an asset catalog for the at least one computer network. The techniques include obtaining information specifying a first asset and a first set of assets with which the first asset was previously associated; generating a signature of the first asset from the computer network addressing information for the first asset; generating a hashed signature by applying a locality sensitive hashing (LSH) technique to the signature; associating the first asset with a second set of assets in the asset catalog using the hashed signature and at least one hashed signature of the at least one asset in the asset catalog; and when it is determined that the second set of includes the first set, outputting an indication that the first asset was correctly associated with the first set of assets.
    Type: Application
    Filed: March 27, 2023
    Publication date: February 1, 2024
    Applicant: Rapid7, Inc.
    Inventors: Stuart Millar, Ralph McTeggart
  • Publication number: 20240039912
    Abstract: A method of authenticating a user device in providing access to a computer resource, the method includes: extracting a plurality of device fingerprint records from an access log, each of the device fingerprint records associated with an unauthorized access of a computer resource; from each of the plurality of device fingerprint records, extracting a digital signature, each of the digital signatures comprising a plurality of session characteristics; determining, by a processing device from the digital signatures, a root signature pattern, the root signature pattern comprising a combination of values of one or more of the plurality of session characteristics; and identify a subsequent access request for the computer resource as an unauthorized access based on a comparison of a device fingerprint associated with the subsequent access request and the root signature pattern.
    Type: Application
    Filed: July 7, 2023
    Publication date: February 1, 2024
    Inventors: David Senecal, Luke Stork
  • Publication number: 20240039913
    Abstract: A service processing method and apparatus, a device, and a storage medium are disclosed. In the method, network communication such as network identification, service authorization, and service processing is performed by separating network identifiers and location identifiers of a client (110) and a server (210) and establishing a mapping relationship between the network identifiers and the location identifiers of the client and the server.
    Type: Application
    Filed: December 6, 2021
    Publication date: February 1, 2024
    Inventors: Xincheng YAN, Zhenwu HAO, Yu MA, Bo YANG, Na ZHOU
  • Publication number: 20240039914
    Abstract: A method for accessing a data source is described. A communication for the data source is received from a proxy at a sidecar. The proxy mirrors the communication so that the communication is provided to the data source and the sidecar. The sidecar includes a dispatcher and service(s). The dispatcher receives the communication, is data agnostic, and provides the communication to the data source and service(s). The service(s) inspect the communication. In some embodiments, the dispatcher is an open systems interconnection (OSI) Layer 4 dispatcher and the service(s) include OSI Layer 7 service(s). The service(s) perform function(s) based on the communication.
    Type: Application
    Filed: August 14, 2023
    Publication date: February 1, 2024
    Inventors: Manav Ratan Mital, Srinivas Nageswarrao Vadlamani
  • Publication number: 20240039915
    Abstract: A method for logging a user into a device for a power generation plant, using a service gateway, wherein an access authorization of the user for the device is stored on the service gateway, is disclosed. The method includes authenticating the user on the service gateway, sending a device access request using an access device from the user to the service gateway specifying an identifier of the device for the power generation plant, and comparing a device secret stored on the service gateway with a copy of the device secret generated using the device secret and stored on the device, via an SRP protocol.
    Type: Application
    Filed: October 10, 2023
    Publication date: February 1, 2024
    Inventors: Marek Seeger, Stefan Börger, Dirk Schlote, Jens Klein, Raimund Thiel, Mirko Wischer, Ingo Hanke
  • Publication number: 20240039916
    Abstract: A policy enforcement application receives input specifying policy constraints for resources of a given type. The application imports a pre-existing resource into the policy enforcement application, and determines, by the policy enforcement application, that the pre-existing resource is of the given type. Responsive to determining that the pre-existing resource is of the given type, the application determines that the pre-existing resource does not comply with the policy constraints. The application determines an owner of the resource based on metadata associated with the resource, and prompts the owner with a set of recommended configuration changes. Responsive to receiving a selection of a selectable option from the owner, the application reconfigures the resource with the recommended configuration changes.
    Type: Application
    Filed: June 22, 2023
    Publication date: February 1, 2024
    Inventors: Travis MacLeod McPeak, Alaeddin Saleh Abdelrahman Almubayed
  • Publication number: 20240039917
    Abstract: Technologies are shown for session centric access control of a remote connection. A request for a remote connection is received from a client. A container is created for the remote connection, and an identifier for each of one or more endpoints authorized for the remote connection are stored in the container. A secure shell is initiated for the remote connection. Access is provided to the first endpoint from the one or more endpoints via the secure shell based on a first identifier for the first endpoint being stored in the container.
    Type: Application
    Filed: October 16, 2023
    Publication date: February 1, 2024
    Inventor: John Ezra-Razi JAWED
  • Publication number: 20240039918
    Abstract: A method of controlling access to a digital resource of a group of digital resources, the method comprising: determining information sensitive features comprised in information contents of the resources for which access to the features are limited to a selection of users from a group of users associated with the group of resources; determining if contents of the digital resource comprise at least one of the information sensitive features; determining whether a user of the group of users has authorization to access at least a portion of the resource based on the at least one information sensitive feature; and enabling the user access only to the at least portion of the resource for which the user is determined to have authorization.
    Type: Application
    Filed: October 15, 2023
    Publication date: February 1, 2024
    Inventors: Ofer Ben-Noon, Ohad Bobrov
  • Publication number: 20240039919
    Abstract: A method and system determine network based access to restricted systems. The method includes receiving a request for a permission access status of a party seeking access to one of the restricted systems. A database of periodically updated lists of entities is accessed. A name of the party is extracted from the request. A determination is made whether the name does not match one of the entities. The name is decomposed into parts if the name not matching one of the entities. A determination is made whether any of the parts of the name matches one of the entities. A denial of access status is forwarded from the computer server to an external computing device if any of the parts of the name matches one of the entities.
    Type: Application
    Filed: December 28, 2021
    Publication date: February 1, 2024
    Inventors: Juan Cruz Benito, Iván Durán Martínez, Sanjay Kumar Lalta Prasad Vishwakarma, Sanket Panda, Francisco Jose Martin Fernandez, Ismael Faro Sertage
  • Publication number: 20240039920
    Abstract: Systems, devices, and methods are disclosed for wireless communication of analyte data. In embodiments, a method of using a diabetes management partner interface to configure an analyte sensor system for wireless communication with a plurality of partner devices is provided. The method includes the analyte sensor system receiving authorization to provide one of the partner devices with access to a set of configuration parameters via the diabetes management partner interface. The set of configuration parameters is stored in a memory of the analyte sensor system. The method also includes, responsive to input received from the one partner device via the diabetes management partner interface, the analyte sensor system setting or causing a modification to the set of configuration parameters, according to a system requirement of the one partner device.
    Type: Application
    Filed: October 9, 2023
    Publication date: February 1, 2024
    Inventors: Apurv Ullas KAMATH, Michael Robert MENSINGER, Nicholas POLYTARIDIS, Gary A. MORRIS, Alexandra Elena CONSTANTIN, Douglas William BURNETTE, Mario REMON, Jorge R. BARRERAS, Benjamin Elrod WEST, Christopher Robert HANNEMANN
  • Publication number: 20240039921
    Abstract: Systems, devices, and methods are disclosed for wireless communication of analyte data. In embodiments, a method of using a diabetes management partner interface to configure an analyte sensor system for wireless communication with a plurality of partner devices is provided. The method includes the analyte sensor system receiving authorization to provide one of the partner devices with access to a set of configuration parameters via the diabetes management partner interface. The set of configuration parameters is stored in a memory of the analyte sensor system. The method also includes, responsive to input received from the one partner device via the diabetes management partner interface, the analyte sensor system setting or causing a modification to the set of configuration parameters, according to a system requirement of the one partner device.
    Type: Application
    Filed: October 10, 2023
    Publication date: February 1, 2024
    Inventors: Apurv Ullas KAMATH, Michael Robert MENSINGER, Nicholas POLYTARIDIS, Gary A. MORRIS, Alexandra Elena CONSTANTIN, Douglas William BURNETTE, Mario REMON, Jorge R. BARRERAS, Benjamin Elrod WEST, Christopher Robert HANNEMANN
  • Publication number: 20240039922
    Abstract: Nextdate provides an online dating and game experience for all participants, including live streamers, contestants, and viewers. Nextdate offers advantages over both offline and online speed dating. In respect to offline speed dating, Nextdate is better in that it provides conversational prompts to the participants (the “star” and the contestant), as well as a “Love-o-meter” and audience comments that provide additional items and context to which the participants can respond. In respect to online speed dating, Nextdate includes features that remove the friction from traditional online dating experience and encourage user participation. Nextdate may be implemented as a standalone app or as a tab or feature of another video-centric social networking app.
    Type: Application
    Filed: October 12, 2023
    Publication date: February 1, 2024
    Inventors: Geoffrey Cook, Anton Djamoos, David Weinstein, Omar Beiruty, Jeremy Zorn
  • Publication number: 20240039923
    Abstract: A method and an apparatus for deploying a network device, a device, a system, and a storage medium. The method includes: a terminal device obtains a server identifier and an enterprise identifier, where the server identifier indicates a server to which the network device needs to connect, and the enterprise identifier indicates an enterprise to which the network device belongs; obtains an identifier of the network device; associates the identifier of the network device with the enterprise identifier to generate association information; and sends the association information to the server indicated by the server identifier. With such implementation, deployment of a network device can be implemented without a need for enterprise's network management personnel to arrive at a site of installation of the network device, providing convenience and efficiency.
    Type: Application
    Filed: September 25, 2023
    Publication date: February 1, 2024
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Zhengquan HUANG
  • Publication number: 20240039924
    Abstract: A blockchain of block entries that can be requested by users from user devices is maintained in a distributed network of nodes. Block entries include a plurality of data portions that are each associated with an access level. A request from an auditor to view one or more data portions of a block entry can includes an access code associated with at least one access level can be evaluated to identify one or more data portions associated with the access level. A customized view of the block entry which includes the one or more data portions associated with the access level can be generated. An artificial intelligence engine can review entries within the distributed ledger, identify earnings information associated with the sales of the commercial inventory, determine tax based on earning information, and pay the tax via fiat or cryptocurrency to government authorities based on earnings information.
    Type: Application
    Filed: July 23, 2023
    Publication date: February 1, 2024
    Applicant: AMERICORP INVESTMENTS LLC
    Inventor: Jordan Simons
  • Publication number: 20240039925
    Abstract: Methods and systems are presented for authenticating web content. A request to authenticate web content is received from a user device. A first document object model (DOM) tree representing elements of the web content within a hierarchical structure is accessed. A hash value for each node of the first DOM tree is calculated based on the corresponding element of the web content represented by that node. A second DOM tree associated with a host of the web content is retrieved from a database. The second DOM tree represents predefined elements of the web content. The hash value calculated for each node of the first DOM tree is compared with a hash value associated with a corresponding node of the second DOM tree to determine whether the first DOM tree matches the second DOM tree. The web content is authenticated when the first DOM tree matches the second DOM tree.
    Type: Application
    Filed: July 26, 2022
    Publication date: February 1, 2024
    Inventors: Michael Charles Todasco, Vladimir Bacvanski, Michael Jim Tien Chan
  • Publication number: 20240039926
    Abstract: A system for hosting a virtual environment-to-virtual environment interaction session receives a request to grant access to a particular location in a host virtual environment. The request includes avatar information associated with a first avatar in a first virtual environment. The system generates a software token that uniquely identifies the particular location in the host virtual environment. The system communicates the software token to a computing device associated with a first virtual environment. The system detects that the first avatar presents the software token to gain access to the particular location in the host virtual environment. The system determines that the software token is valid. The system hosts an interaction session between the first avatar and a second avatar associated with the host virtual environment in the particular location of the host virtual environment.
    Type: Application
    Filed: July 29, 2022
    Publication date: February 1, 2024
    Inventor: Saurabh Gupta
  • Publication number: 20240039927
    Abstract: A cloud resource management system detects resource misconfiguration for resources in a cloud including cloud policy misconfigurations and resource vulnerabilities. An attack chain analyzer identifies attack chains from misconfigured resources ordered according to stages in an attack framework that models sequential behavior for malicious attacks. The attack chains are detected according to a depth-first search traversal of adjacent resources that have pairwise exposure according to characteristics indicated in the cloud policy misconfigurations and resource vulnerabilities. The attack chain analyzer generates further diagnostics that inform remediation of resource misconfigurations for malicious attack prevention.
    Type: Application
    Filed: July 29, 2022
    Publication date: February 1, 2024
    Inventors: Krishnan Shankar Narayan, Praveen Herur
  • Publication number: 20240039928
    Abstract: A UE may detect, at the UE, a suspected fabricated transmission attack based on PHY security. The UE may transmit, to a network node, and the network node may receive, from the UE, an indication of the suspected fabricated transmission attack. The network node may receive, from the UE, an indication of one or more characteristics associated with a potential attacker associated with the suspected fabricated transmission attack. The UE may transmit, via a sidelink to at least one additional UE, a second indication of whether the UE identifies that the suspected fabricated transmission attack corresponds to the UE being attacked. The network node may identify a geographical location of the potential attacker based on a plurality of indications of the one or more characteristics associated with the potential attacker. The network node may compile an adversary pool including one or more compromised identities.
    Type: Application
    Filed: August 1, 2022
    Publication date: February 1, 2024
    Inventors: Igor GUTMAN, Yavuz YAPICI, Tao LUO, Junyi LI
  • Publication number: 20240039929
    Abstract: A system and method improves cloud detection and response by generating a normalized event log from a plurality of cloud service providers (CSPs). The method includes receiving a plurality of events, wherein a first event of the plurality of events is generated in a cloud computing environment provided by a first CSP and a second event of the plurality of events is generated in a cloud computing environment provided by a second CSP; extracting data from an event of the plurality of events; generating a normalized event based on the extracted data and a predefined data schema, the predefined data schema including a plurality of data fields; storing the normalized event in a transactional database having stored therein a normalized event log; and applying a rule from a rule engine on a normalized event stored in the transactional database to detect a cybersecurity threat in any of the CSPs.
    Type: Application
    Filed: August 1, 2022
    Publication date: February 1, 2024
    Applicant: Wiz, Inc.
    Inventors: George PISHA, Liran MOYSI, Itay VANZETTI, Alon SCHINDEL
  • Publication number: 20240039930
    Abstract: Provided is a way of evaluating rules/conditions that span different domain entities against a set of disparate events from multiple sources that have occurred within a specific window or interval of time from the current time back to a specific time in the past. Events are stored in dedicated storage to enable an extended window of time to be used for multiple event evaluation. Only relevant event/rule pairs are evaluated. The system will record when an event relevant to a rule happens. When a second event that is relevant to the rule happens, the system checks the records to see if a previous relevant event had happened in the past that would cause the rule to trigger an alert. A mechanism is also provided for evaluating static state in combination with changed properties.
    Type: Application
    Filed: March 6, 2023
    Publication date: February 1, 2024
    Inventors: Tomas Piedrahita Herran, Hansel D'Ornellas
  • Publication number: 20240039931
    Abstract: [SUMMARY] A method of detecting a sequence-based intrusion by using a Database CAN (DBC) file, the method being performed by a computing device including a processor according to some exemplary embodiments of the present disclosure, includes: obtaining a first Controller Area Network (CAN) message generated from a CAN; determining the first CAN message as a first category among a plurality of categories based on a pre-stored DBC file; obtaining first predictive data from the first CAN message by using a pre-trained first neural network model, the pre-trained first neural network model corresponding to the first category and including a first hidden layer; and comparing the first predictive data and first actual data obtained based on the first CAN message to determine whether the first CAN message has an anomaly.
    Type: Application
    Filed: July 19, 2023
    Publication date: February 1, 2024
    Applicant: KOREA UNIVERSITY RESEARCH AND BUSINESS FOUNDATION
    Inventors: Huy Kang KIM, Hwejae LEE, Sangho LEE, Yeon Jae KANG, Daekwon PI, Jae Woong CHOI, Huiju LEE
  • Publication number: 20240039932
    Abstract: A module for a vehicle includes: a first communication module that transmits and receives first data to and from a first in-vehicle module; a second communication module that transmits and receives second data to and from a second in-vehicle module; and a control module that controls relay of third data among the first communication module and the second communication module. In a case where reception data received by the control module from the first or second communication module is unauthorized, the control module stops relaying the third data in accordance with a traveling state of the vehicle satisfying a predetermined condition, The traveling state includes: the vehicle being stopped; a vehicle speed being at or below a predetermined speed; brakes being applied; a hazard indicator being on; a driver being in a state capable of driving; and/or self-driving functions being in an off state.
    Type: Application
    Filed: October 4, 2023
    Publication date: February 1, 2024
    Applicant: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Yuishi TORISAKI, Takamitsu SASAKI, Tomoyuki HAGA
  • Publication number: 20240039933
    Abstract: A method including determining, by an infrastructure device, a mixed set of harmful traits and clean traits, the harmful traits being associated with affected data known to include harmful content and the clean traits being associated with clean data known to be free of the harmful content; determining, by the infrastructure device, harmful patterns indicating characteristics of the harmful traits based on comparing the affected data with the mixed set, wherein a harmful pattern indicates a particular combination of one or more of the harmful traits; transmitting, by the infrastructure device to a user device, the harmful patterns; determining, by the user device, a determined pattern based at least in part on traits included in given data; and determining, by the user device, whether the given data includes the malicious content based on comparing the determined pattern with the harmful patterns is disclosed. Various other aspects are contemplated.
    Type: Application
    Filed: October 6, 2023
    Publication date: February 1, 2024
    Applicant: UAB 360 IT
    Inventors: Aleksandr Sevcenko, Mantas Brilliauskas
  • Publication number: 20240039934
    Abstract: Systems for improving security of a computer-implemented artificial intelligence by monitoring one or more transactions received by the machine learning decision model; receiving a first score generated by the machine learning decision model in association with a first transaction; identifying the first transaction as belonging to a first class, in response to the first score being lower than a certain score threshold and the first transaction having a low occurrence likelihood; receiving a second score in association with the first transaction based on one or more adversarial latent features associated with the first transaction as detectable by an adversary detection model; and determining at least one adversarial latent transaction feature being exploited by the first transaction, in response to determining that the second score falls above the certain score threshold.
    Type: Application
    Filed: October 11, 2023
    Publication date: February 1, 2024
    Applicant: FICO
    Inventors: Scott Michael Zoldi, Shafi Ur Rahman
  • Publication number: 20240039935
    Abstract: A system for implementing anomaly detection accesses user activities associated with an avatar in a virtual environment. The system extracts features from the user activities, where the features provide information about interactions of the avatar with other avatars and entities in the virtual environment. The system determines a deviation range for each feature, where the deviation range indicates a deviation between the features among the avatars over a certain period. The system determines whether the deviation range for a feature is more than a threshold deviation. If it is determined that a deviation range of a feature is more than the threshold deviation, a confidence score associated with the user is updated based on the deviation range of the feature. If the confidence score is more than a threshold score, the user is not associated with an anomaly. Otherwise, the user is determined to be associated with an anomaly.
    Type: Application
    Filed: July 29, 2022
    Publication date: February 1, 2024
    Inventors: Rama Krishnam Raju Rudraraju, Om Purushotham Akarapu
  • Publication number: 20240039936
    Abstract: A system and method improves cloud detection and response by generating a normalized event log from a plurality of cloud computing layers. The method includes receiving a plurality of events, wherein a first event is generated in a first cloud layer of a cloud computing environment provided by a cloud service provider (CSP) and a second event is generated in a second cloud layer of the cloud computing environment; extracting data from each event; generating a normalized event based on the extracted data and further based on a predefined data schema, the predefined schema including a plurality of data fields, at least a portion of which are related to cloud layers; storing the normalized event in a transactional database having stored therein a normalized event log; and applying a rule from a rule engine on the normalized event to detect a cybersecurity threat in the cloud computing environment.
    Type: Application
    Filed: August 1, 2022
    Publication date: February 1, 2024
    Applicant: Wiz, Inc.
    Inventors: George PISHA, Liran MOYSI, Itay VANZETTI, Alon SCHINDEL
  • Publication number: 20240039937
    Abstract: Aspects of the subject disclosure may include, for example, a device, having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, including gathering and aggregating historical data provided to an APN gateway of a connected car manufacturer and a packet core of a communications network; using the historical data gathered and aggregated to train a ML model to recognize anomalies from the historical data, thereby creating a trained ML model; monitoring current data provided to the APN gateway and the packet core; and generating an alert when the trained ML model recognizes an anomaly. Other embodiments are disclosed.
    Type: Application
    Filed: August 1, 2022
    Publication date: February 1, 2024
    Applicant: AT&T Intellectual Property I, L.P.
    Inventor: Yaron Koral
  • Publication number: 20240039938
    Abstract: Distributed denial of service (DDoS) attacks launched using internet of things (IoT) devices may be detected and addressed using decentralized computing, potentially in combination with blockchain or other decentralized ledger technology. One method of doing this may include identifying an anomaly by comparing traffic data against baseline traffic data, reporting an anomaly as a potential attack, receiving an indication that the anomaly is an attack, and then performing a set of response measures. The set of response measures may comprise allocating a dedicated frequency channel to traffic associated with the attack and assigning devices associated with the attack to that channel, while assigning other user devices to different frequency channels. Records of the attack and associated devices may be recorded and propagated across nodes, thereby enabling each node to respond appropriately even as the device moves from its original location.
    Type: Application
    Filed: August 1, 2022
    Publication date: February 1, 2024
    Inventors: Rani Yadav-Ranjan, Arthur R. Brisebois, Serene Banerjee
  • Publication number: 20240039939
    Abstract: A non-transitory computer-readable recording medium storing an attack situation output program for causing a computer to execute a process, the process includes extracting, from information regarding communication that includes a threat level of an attack, information regarding first communication in which the threat level satisfies a first condition, executing anomaly detection processing that detects a suspicious terminal by using the information regarding the first communication of each terminal, and outputting information regarding a first terminal detected as the suspicious terminal by the anomaly detection processing and information regarding content of an attack that corresponds to the first condition, in association with each other.
    Type: Application
    Filed: April 17, 2023
    Publication date: February 1, 2024
    Applicant: Fujitsu Limited
    Inventors: Takanori Oikawa, Hirotaka Kokubo, Ikuya Morikawa
  • Publication number: 20240039940
    Abstract: A learning apparatus includes: a learning unit that learns a first parameter and a second parameter that are included in a mapping model for mapping, to a region set based on a subspace set in advance and a distance from the subspace, a feature vector generated based on normal data input as training data, the first parameter being for generating the feature vector and the second parameter being for adjusting the distance.
    Type: Application
    Filed: December 14, 2020
    Publication date: February 1, 2024
    Applicant: NEC Corporation
    Inventors: Shohei Mitani, Naoki YOSHINAGA
  • Publication number: 20240039941
    Abstract: Mechanisms for defending a computing system from attack are provided. The mechanisms include: maintaining a round counter that tracks a round number for a local host; determining a location in a graph for each of a plurality of hosts including the local host; determining monitor hosts of the plurality of hosts that are monitoring the local host; determining monitoree hosts of the plurality of hosts that are being monitored by the local host; sending a message to each of the monitor hosts identifying a value of the round counter; forwarding a first set of heartbeat messages from previous monitoree hosts to the monitor hosts; attempting to receive messages from the monitoree hosts; determining whether any messages were not received from the monitoree hosts; and in response to determining that one or more messages were not received from the monitoree hosts, generating an alert.
    Type: Application
    Filed: October 9, 2023
    Publication date: February 1, 2024
    Inventors: Yuan Jochen Kang, Salvatore Stolfo
  • Publication number: 20240039942
    Abstract: Aspects of the disclosure relate to malware detection at endpoint devices. A computing platform may send rule information to a browser extension including a set of rules defining reportable behavior of network traffic associated with a website. Subsequently, the computing platform may receive report information including an identification of a loaded web page associated with the website that exhibits the reportable behavior defined by at least one rule of the set of rules and an indication of which rules of the set of rules have been met. Based on receiving the report information, the computing platform may assign a risk score for the identified loaded web page. Thereafter, the computing platform may determine that the risk score is above a predetermined threshold, and in response, the computing platform may send commands to the browser extension directing the browser extension to close the identified loaded web page.
    Type: Application
    Filed: October 16, 2023
    Publication date: February 1, 2024
    Inventor: Ricardo Varanda
  • Publication number: 20240039943
    Abstract: A request to add a new block to a blockchain is received. Data associated with the new block is scanned to identify malware and/or an anomaly. In response to identifying the malware and/or the anomaly in the data associated with the new block, an action is taken. The action includes: rejecting the request to add the new block to the blockchain, or removing the malware/anomaly from the new block and adding the new block to the blockchain. In a second embodiment, a malware event is identified that identifies malware/an anomaly in a block in a blockchain. In response to the malware event, an action is taken. The action includes: consolidating the blockchain, bypassing the block in the blockchain, consolidating the blockchain and bypassing the block in the blockchain, and deleting an encryption key that was used to encrypt the associated data that comprises the malware and/or the anomaly.
    Type: Application
    Filed: October 11, 2023
    Publication date: February 1, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: Douglas Max Grover, Michael F. Angelo
  • Publication number: 20240039944
    Abstract: An automated method, system, device and/or computer program for performing security analysis of an information system or computing device by modeling attacks and attack surfaces using Knowledge Graphs and Graph Computing systems. A contextual data model and a set of data instances of security knowledge can be accessed. A Knowledge Graph representing a Simulated Neural Network for security attacks can be built and trained. A security analysis tool can receive a description of an attack scenario. The Graph Computing system can analyze an attack scenario using the Security Attack Knowledge Graph. A set of observations about the attack scenario and the attack surface can be generated. The observations can include attack paths, recommendations and action plans on how to detect, prevent or address the attack scenario. The action plans can be invoked and applied to the target information system and its operating environment either manually, or by automation.
    Type: Application
    Filed: July 30, 2022
    Publication date: February 1, 2024
    Inventor: James Whitmore
  • Publication number: 20240039945
    Abstract: A computer-implemented method, in accordance with one embodiment, includes generating, using data defining physical characteristics and security characteristics of a physical environment, a digital twin of the physical environment. A set of test conditions are simulated within the digital twin of the physical environment to test the security characteristics. The simulation of the set of test conditions are analyzed for evaluating the security characteristics. A result of the evaluation is output.
    Type: Application
    Filed: July 27, 2022
    Publication date: February 1, 2024
    Inventors: Tushar Agrawal, Christian Compton, Jeremy R. Fox, Sarbajit K. Rakshit
  • Publication number: 20240039946
    Abstract: Disclosed embodiments pertain to cybersecurity assessment and remediation. A questionnaire comprising a set of questions can be generated and provided electronically to a device of a small business representative. In one instance, the questionnaire can be dynamically responsive to input to focus on questions relevant to a particular business. Responses to questions can be used to generate a score that captures cyberattack readiness and a recommendation to reduce cybersecurity risk. Further, tests can be executed on a technology stack of the business. Test results can then be employed as a basis to generate the score and recommendation.
    Type: Application
    Filed: July 28, 2022
    Publication date: February 1, 2024
    Inventors: Andrew Eshman, Mohamed Seck, Ibrahima Mbaye
  • Publication number: 20240039947
    Abstract: Systems and methods are provided for inspecting, identifying, blocking, and combatting browser security vulnerabilities. In various embodiments, an inspection module may execute on a browser accessing a web domain on a first computing device. Inspection modules may dynamically analyze a set of scripts associated with the web domain to identify privacy vulnerabilities. Such vulnerabilities may be blocked and/or combatted to prevent communications of private information to one or more third-, fourth-, . . . , nth-party sites and applications. Embodiments may generate a customized privacy plan directed to one or more privacy vulnerabilities and execute on a graphical user interface on a computing device.
    Type: Application
    Filed: October 14, 2022
    Publication date: February 1, 2024
    Applicant: APOMAYA DBA LOKKER
    Inventors: IAN COHEN, JEREMY BARNETT, PETER JOLES