Computer Network Access Regulating Patents (Class 709/225)
-
Patent number: 11930125Abstract: Root certificates generated by root certificate authorities may be bound at the time of generation. In an example, a first root certificate can include an identity of a first root certificate authority, a first key identifier associated with a first key of the first root certificate authority and an identity of a first digital signature algorithm used by the first root certificate authority. The first root certificate can also include at least one extension including a second key identifier of a second key associated with the second root certificate authority and an identity of a second digital signature algorithm used by the second root certificate authority, the second digital signature algorithm being different from the first digital signature algorithm.Type: GrantFiled: August 17, 2021Date of Patent: March 12, 2024Assignee: Entrust CorporationInventors: Michael Ounsworth, John Robert Gray, Serge Jean Maurice Mister
-
Patent number: 11929978Abstract: A content delivery method including the operations of receiving a uniform resource locator resolution request at an authoritative name server for a domain where the uniform resource resolution request is received based, at least in part, on a host name of the uniform resource resolution request where the host name is uniquely related to a resource associated with the uniform resource resolution request. The method further including the operation of tracking a popularity of the resource based on the host name uniquely related to the resource and providing a location within a network capable of delivering the resource where the provided location is based on the popularity of the resource.Type: GrantFiled: April 7, 2023Date of Patent: March 12, 2024Assignee: Level 3 Communications, LLCInventor: Christopher Newton
-
Patent number: 11929816Abstract: Some demonstrative embodiments include apparatuses, devices, systems and methods of beamforming. For example, a responder station may process a received Beam Refinement Protocol (BRP) request including a beam tracking request from an initiator station; and select whether or not to transmit a BRP response including beam tracking feedback, in response to the BRP request, based on a comparison between a time period and a BRP tracking time limit, the time period being based on a timing of the BRP request and a timing of the BRP response.Type: GrantFiled: March 14, 2021Date of Patent: March 12, 2024Assignee: INTEL CORPORATIONInventors: Solomon B. Trainin, Assaf Kasher, Carlos Cordeiro
-
Patent number: 11921901Abstract: A system receives a request associated with a first account to delegate, to a second account, authority to send documents on behalf of the first account. The request identifies requirements that must be satisfied before the second account can send documents on behalf of the first account. Responsive to receiving a request to send a first document to a first entity from the second account and on behalf of the second account, the system sends the first document to the first entity. Responsive to receiving a request to send a second document to a second entity from the second account and on behalf of the first account, the system determines whether the request to send the second document satisfies the requirements. Responsive to the request satisfying the requirements, the system sends the second document to the second entity on behalf of the first account.Type: GrantFiled: January 28, 2022Date of Patent: March 5, 2024Assignee: DOCUSIGN, INC.Inventors: Janice Bae, Pavel Rebriy, Matthew Ritchie, Macklin Douglas Underdown
-
Patent number: 11922929Abstract: To provide a presentation assistance system capable of dynamically changing presentation materials according to terms used in a presentation. A presentation assistance system comprises: a presentation material storage unit 3; a related word storage unit 5 which stores a plurality of related words related to the presentation material; a succeeding information storage unit 7 which stores, for each of the related words, information about a succeeding related word that is one or a plurality of related words that are preferably used next; a related word analysis unit 9 which analyzes which one of the related words corresponds to the word analyzed by a term analysis unit; and a succeeding related word selecting unit 11 which selects a succeeding related word from the succeeding information storage unit, by using information about an analyzed related word which is a related word analyzed by the related word analysis unit.Type: GrantFiled: January 6, 2020Date of Patent: March 5, 2024Assignee: Interactive Solutions Corp.Inventor: Kiyoshi Sekine
-
Patent number: 11924160Abstract: Techniques for management of traffic in a network. The techniques provide application awareness in a Network Address Translation (NAT) system. In some examples, a first traffic is received at a first switch in a network from a first application hosted behind the first switch. The first switch identifies a first resource tag associated with the application from the first traffic. Further, the first switch identifies a first rule from the first resource tag indicating that the first traffic is to be routed through an intermediate device that performs network address translation. Moreover, the first switch transmits the traffic to an intermediate device, which perform NAT to translate the source IP address of the first traffic to a second IP address. Finally, the intermediate device sends the traffic to a destination device indicated by the first traffic.Type: GrantFiled: February 22, 2022Date of Patent: March 5, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Sudhakar Chunduru, Junyun Li, Ajay Kumar Modi
-
Patent number: 11924202Abstract: Systems and methods are provided for establishing a secure communication link between a first client and a second client. One exemplary computer-implemented method for establishing a secure communication link between a first diem and a second client includes accessing, from a storage, identification information of a user of the first client. The method further includes receiving a Domain Name Service (DNS) request from the first client requesting a secure network address corresponding to a secure domain name associated with the second client. The method further includes authenticating the user based on the user identification information. The method also includes transmitting the secure computer network address in response to the DNS request based on a determination that the user has been authenticated. A secure communication link between the first diem and the second client is established based on the secure computer network address.Type: GrantFiled: December 30, 2021Date of Patent: March 5, 2024Assignee: VirnetX, Inc.Inventors: Robert Dunham Short, III, Nathaniel Jackson Short, Michael Glenn Williamson
-
Patent number: 11922080Abstract: A printing system including: a location registration equipment (11) that performs user authentication of a user who operates a client terminal (14) at a workspace (100); a remote desktop server (12) that enables a desktop screen of an office-installed terminal to be operated through the client terminal (14); and a printing device (13) that outputs printing data in accordance with a printing request, wherein the location registration equipment (11) transmits location information of a user for whom it has performed user authentication to the printing device (13), and the printing device (13) transmits, when it receives a printing request from the remote desktop server (12), printing data to which the location information is added to the location registration equipment (11).Type: GrantFiled: May 24, 2021Date of Patent: March 5, 2024Assignee: NEC CORPORATIONInventor: Masayuki Kanai
-
Patent number: 11916882Abstract: Network traffic through a router, e.g., home router, operating as a firewall is monitored and analyzed the network to identify devices and the type of one or more of the identified devices. In some embodiments, the device type identification is performed using a neural network. The router stores a set of firewall templates. At different times, different templates are applied, e.g. based on mode of operation, user selection, and/or time information. Rules in a firewall template, applicable at a given time to traffic corresponding to identified devices, that are attempting to send or receive via the router, are applied. Different rules may, and sometimes do, apply to different device type classifications.Type: GrantFiled: September 26, 2022Date of Patent: February 27, 2024Assignee: Charter Communications Operating, LLCInventor: Mark Reimer
-
Patent number: 11914710Abstract: A system and method for early detection of a compromised client device includes a tamper detection service configured to monitor modifications to resource access privileges over time to identify unusual variations in jailbreak status that indicate compromise of the client device. For example, the tamper detection service may monitor the jailbreak status of system files over time to expose attempts to hide the jailbreak status of a protected resource. To validate that malware is attempting to hide the jailbreak status of a protected resources, the tamper detection process may launch multiple different resource accesses, targeting the protected resource, to determine whether different accessibility results are returned, indicating a compromised device.Type: GrantFiled: June 23, 2022Date of Patent: February 27, 2024Assignee: Capital One Services, LLCInventors: Jon Whitmore, Kevin Nieman
-
Patent number: 11917088Abstract: A computer-implemented method for configuring a blockchain network, a computer program product for integrating device identity into a permissioning framework of a blockchain network, and a blockchain network. One embodiment may comprise registering a device at a delineate node of a blockchain network, creating, by a processor of the delineate node based on the registering, a profile for the device; an performing, by the processor of the delineate node, a pass-through service for the device. The registering may include receiving, by a network interface, an immutable device identity from the device.Type: GrantFiled: September 21, 2020Date of Patent: February 27, 2024Assignee: International Business Machines CorporationInventors: Nitin Gaur, Jeronimo Irazabal, Abhishek Malvankar
-
Patent number: 11904418Abstract: Provided is a welding-type power source, comprising power conversion circuitry configured to convert input power to welding-type power, a user interface comprising a first input device, a second input device, and an output device, and control circuitry. The control circuitry is configured to, in response to a first input via the first input device, control the output device to output an indication that the welding-type power source is in a preconfigured state, set predetermined ones of welding-type parameters to respective predetermined values, set a welding current, when there is an input from the second input device, to a value indicated by the second input device, and set the welding current, when there is not an input from the second input device, to one of: the default value when the default welding current has not been changed, or a welding current that has been changed previously via the second input device.Type: GrantFiled: April 24, 2020Date of Patent: February 20, 2024Assignee: Illinois Tool Works Inc.Inventors: Andrew Pfaller, Brian J. Bornemann
-
Patent number: 11909772Abstract: Systems and methods for providing least privilege access to a resource within a secured server are disclosed. The systems and method can include receiving an access request from a client requesting access to the resource, the access request comprising a role or policy associated with the client and one or more actions associated with the resource. A rules engine can be initialized, the engine defining one or more rules usable by the system to determine whether the access request complies with a least privilege policy. The systems and method can analyze the role or policy and the access request with the rules engine to determine whether the access request complies with the least privilege policy. When the access request complies with the rules, access to the resource can be granted; when the access request does not comply with the rules, access to the resource can be denied.Type: GrantFiled: March 8, 2021Date of Patent: February 20, 2024Assignee: CAPITAL ONE SERVICES, LLCInventors: Jordan Hale, Devon Powley, Wesley Sham, Thomas Shaffer, Jared Baker, John Bollinger, Robert Stump, Gabriel Duke
-
Patent number: 11907493Abstract: An interactive demonstration application can be used to test and experience the use of overlay elements (e.g., application add-ons, such as an interactive chat overlay) on a graphical interface (e.g., of a website or a computer application) before fully integrating the overlay elements into the graphical interface. The interactive demonstration application can also be used to demonstrate and update the live settings of a live overlay element used on a live webpage.Type: GrantFiled: June 13, 2022Date of Patent: February 20, 2024Assignee: LIVEPERSON, INC.Inventors: Grant Lawrence Miller, Marc Campbell
-
Patent number: 11909575Abstract: A cloud-connected baseboard management controller (BMC) enables remote management of all management layers of edge-based host machines from the cloud without imposition of costs associated with firewalls and private data connections. A remote management agent incorporated into the BMC enables creation of a remote management-enabled bare-metal server paradigm in which remote management from the cloud is supported at the lowest hardware levels which provides for cost-effective utilization of network resources down to even a single isolated node.Type: GrantFiled: June 15, 2023Date of Patent: February 20, 2024Assignee: Microsoft Technology Licensing, LLCInventor: Sanjeev Mehrotra
-
Patent number: 11900324Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for managing projects in a content management system. For example, the content management system can create a project folder (e.g., shared folder) for managing data associated with a project. The project folder can be shared with content management system users (e.g., project members) who are contributors to the project. The content management system can store project data (e.g., content items, communications, comments, tasks, etc.) related to the project in the project folder. When the project folder is selected by a user, the content management system can generate a project folder view that presents the project data associated with the project folder and/or project in a convenient and easy to access graphical user interface. The content management system can aggregate project data from various content items associated with the project and present the project data in a single graphical user interface.Type: GrantFiled: April 30, 2021Date of Patent: February 13, 2024Assignee: Dropbox, Inc.Inventors: Min Ming Lo, Matteus Pan, Linjie Ding, Lilian Weng
-
Patent number: 11899622Abstract: Techniques for managing erasure of data are presented. In response to receiving a request for erasure of data from a set of data stores, an erasure component can analyze a set of rules and information relating to the user account, including an account status and erasure hold status associated with the user account. The set of rules can be based on legal or contractual obligations applicable to the set of data stores, and can indicate various conditions under which data associated with a user account of a user can be eligible to be erased from the set of data stores or an associated data vault repository. The erasure component can determine eligibility for erasure of all or a portion of the set of data from the set of data stores based on the analysis results. Erasure component can determine erasure eligibility scores to pre-qualify user accounts for erasure eligibility.Type: GrantFiled: July 12, 2021Date of Patent: February 13, 2024Assignee: PayPal, Inc.Inventors: Suhail Sadiq, Alejandro Picos, Vladimir Bacvanski, Devdatta Rivonkar, Rahul Mahendrakumar
-
Patent number: 11902436Abstract: A cryptographic key management service receives a request, associated with a principal, to use a cryptographic key to perform a cryptographic operation. In response to the request, the service determines whether a rate limit specific to the principal is associated with the cryptographic key. If the rate limit is associated with the cryptographic key, the service generates a response to the request that conforms to the rate limit. The service provides the response in response to the request.Type: GrantFiled: December 14, 2022Date of Patent: February 13, 2024Assignee: Amazon Technologies, Inc.Inventors: Alexis Lynn Carlough, William Frederick Hingle Kruse
-
Patent number: 11899784Abstract: A computer implemented and electronic process is provided that uses artificial intelligence to detect unauthorized activity by an insider or hacker. Electronic systems that employ artificial intelligence and machine learning to detect unauthorized transaction activity by insiders or hackers for a computer network system are also provided. Hardware required for carrying out the invention typically include a plurality of networked computers. Specialized software and/or firmware is typically needed in connection with the hardware for carrying out the invention.Type: GrantFiled: February 25, 2021Date of Patent: February 13, 2024Assignee: Brighterion, Inc.Inventor: Akli Adjaoute
-
Patent number: 11902281Abstract: On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. In some embodiments, opening the link according to the security policy may comprise redirecting the opening of the link from a first application to a second application.Type: GrantFiled: August 27, 2020Date of Patent: February 13, 2024Assignee: AirWatch LLCInventors: Erich Stuntebeck, Jonathan Blake Brannon
-
Patent number: 11902108Abstract: Systems and methods for managing a network are disclosed. In certain systems and methods, access to a network such as a wireless network, can be granted or denied based upon a threshold number of devices accessing the network. Moreover, access to a first service available over the network can be granted or denied based upon a threshold number of devices accessing the first service. Various network resource can be allocated to the first service based at least upon the number of device access the first service.Type: GrantFiled: February 1, 2023Date of Patent: February 13, 2024Assignee: COMCAST CABLE COMMUNICATIONS, LLCInventor: Richard Mo
-
Patent number: 11899617Abstract: Provided is an edge compute platform (“ECP”) for serving optimized content from local cache or from output of a shared customizable function executed by a compute device at the network edge on behalf of different customer content such that the function is not redundantly deployed for different customer content, and is not be executed each time the same variant of the optimized content is requested. The ECP may canonicalize first transformation parameters of a received original request according to a transformation parameter definition of a particular function that is implicated by the original request, may generate second transformation parameters with a different ordering than the first transformation parameters as a result of the canonicalization, may generate a variant of the original file by inputting the second transformation parameters to the particular function, and may provide the variant in response to the original request.Type: GrantFiled: December 14, 2020Date of Patent: February 13, 2024Assignee: Verizon Patent and Licensing Inc.Inventors: Derek Shiell, Francois Lacroix
-
Patent number: 11894978Abstract: The present invention provides a computing power scheduling method, apparatus, electronic devices and storage medium, the method comprising: a computing power node and an access terminal send computing power information to a switch using L4 network protocol; the switch uploads the computing power information to a distributed SDN subcontroller; the distributed SDN subcontroller collects switch state information and network quality information from the switch using in-band network telemetry technology; the distributed SDN sub-controller collects switch state information and network quality information from the switch using in-band network telemetry; the distributed SDN sub-controller uploads the computing power information, switch state information and network quality information to the SDN master controller; the SDN master controller determines the computing power scheduling policy based on the computing power information, switch state information, network quality information and master controller informationType: GrantFiled: July 25, 2023Date of Patent: February 6, 2024Assignee: Beijing University of Posts and TelecommunicationsInventor: Yang Liu
-
Patent number: 11895140Abstract: A system for analyzing computer systems and networks for potential vulnerabilities to cyber-attacks configured to (i) receive scan data from a scan of a target computer device; (ii) search for one or more vulnerabilities based on the scan data; (iii) determine at least one attack vector based on the one or more vulnerabilities; (iv) generate one or more exploits based on the one or more attack vectors and the one or more vulnerabilities; and (v) execute the one or more exploits on the target computer device.Type: GrantFiled: January 20, 2022Date of Patent: February 6, 2024Assignee: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANYInventors: Nicholas Valiensi, Austin Engelmann, Dave Dohrmann, Jeremy Samiec, Ryan Ang
-
Patent number: 11893044Abstract: Recognizing unknown data objects may be implemented for data objects stored in a data store. Data objects that are identified as unknown may be accessed to retrieve a portion of the data object. Different representations of the data object may be generated for recognizing different data schemas. An analysis of the representations may be performed to identify a data schema for the unknown data object. The data schema may be stored in a metadata store for the unknown data object.Type: GrantFiled: April 10, 2020Date of Patent: February 6, 2024Assignee: Amazon Technologies, Inc.Inventors: Mehul A Shah, George Steven McPherson, Prajakta Datta Damle, Gopinath Duddi, Anurag Windlass Gupta
-
Patent number: 11893614Abstract: Methods and systems for balancing online stores across servers. Monitoring a level of customer activity associated with a particular online store in a plurality of online stores. Detecting, based on the level of customer activity, a demand-level condition for the particular online store. Responsive to the detecting of the demand-level condition for the particular online store, moving one or more of the plurality of online stores from a first server of a plurality of servers to a second server of the plurality of servers.Type: GrantFiled: August 23, 2021Date of Patent: February 6, 2024Assignee: Shopify Inc.Inventor: Kathryn Tang
-
Patent number: 11895091Abstract: A computer readable medium having non-transitory memory for storing machine instructions that are to be executed by a computer. The machine instructions when executed by the computer implement the following function: establishing a network interface communication path between a first router on a first network and a second router on a second network. The first network including first and second network devices is in communication with the first router. A further function is establishing a first network interface between the second router and the first network device through the network interface communication path and a second network interface between the second router and the second network device through the network interface communication path. A further function includes permitting access to the first and second network devices through the first and second router interfaces, respectively, by a user application. The network interfaces may be virtual private networks (VPNs).Type: GrantFiled: February 3, 2023Date of Patent: February 6, 2024Assignee: Dice CorporationInventors: Clifford V. Dice, Kevin P. Kilborn
-
Patent number: 11886381Abstract: The present disclosure provides new and innovative systems and methods for publishing standardized data in a variety of formats. In an example, a computer-implemented method includes obtaining source data, wherein the source data is in a standardized format, obtaining target platform data comprising a target platform address and a target format, generating a directory structure based on the source data and the target format, generating target data based on the source data and the target format, wherein the target data is in the target format, packaging the target data in the directory structure, generating instructions based on the target platform data and the packaged data, and transmitting the packaged data and the instructions to a third-party server system identified by the target platform address.Type: GrantFiled: June 28, 2021Date of Patent: January 30, 2024Assignee: Red Hat, Inc.Inventors: Paolo Antinori, Brian Fitzpatrick
-
Patent number: 11886912Abstract: Data processing approaches are disclosed that include receiving a configuration indicating a plurality of parameters for performing a data processing job, identifying available compute resources from a plurality of public cloud infrastructures, where each public cloud infrastructure of the plurality of public cloud infrastructures supports one or more computing applications, one or more job schedulers, and one or more utilization rates, selecting one or more compute clusters from one or more of the plurality of public cloud infrastructures based on a matching process between the parameters for performing the data processing job and a combination of the one or more computing applications, the one or more job schedulers, and the one or more utilization rates, and initiating the one or more compute clusters for processing the data processing job based on the selecting.Type: GrantFiled: January 29, 2021Date of Patent: January 30, 2024Assignee: Salesforce Inc.Inventors: Amit Martu Kamat, Siddharth Sharma, Raveendrnathan Loganathan, Anil Raju Puliyeril, Kenneth Siu
-
Patent number: 11888819Abstract: Disclosed herein are devices, systems and methods for securely accessing data transferred via multiple isolated networks network, comprising adjusting one or more mapping records comprising network mapping and routing settings for a plurality of isolated networks connecting a plurality of clients to a server to expose one of the plurality of isolated networks to one or more processing engines executed by the server while concealing all other isolated networks from the respective processing engine, activating a lock configured to enable each processing engines to execute a single thread, executing the processing engine(s) to fetch data from the exposed isolated network(s), and releasing the lock. Wherein each processing engine is able to access the isolated network exposed to the respective processing engine while unable to access any of the isolated networks concealed from respective processing engine.Type: GrantFiled: November 9, 2021Date of Patent: January 30, 2024Assignee: Axonius Solutions Ltd.Inventors: Sagi Haas, Dean Sysman, Ofri Shur, Avidor Bartov
-
Patent number: 11886952Abstract: Systems and methods for age verification are disclosed. According to one disclosed embodiment, a system includes: a scanner configured to scan a passive data source on an identification card; and a processor coupled to the scanner, the processor configured to: receive a scanner signal from the scanner; verify an age of a user based on the scanner signal; and transmit verification information to a point of sale device, the point of sale device configured to authorize a sale of age-restricted material based on the verification information. According to another disclosed embodiment, a system includes: a scanner configured to scan a passive data source on an identification card; and a processor coupled to the scanner, the processor configured to: receive a scanner signal from the scanner; verify an age of a user based on the scanner signal; and transmit a verification signal to an age-restricted device.Type: GrantFiled: April 8, 2021Date of Patent: January 30, 2024Assignee: Integrated Solutions International, LLCInventors: Michael F. Sweeney, Thomas J. Stopyra
-
Patent number: 11887192Abstract: A computer system and method is provided for financial management and estate planning. The system provides data aggregation for both financial and non-financial assets to create a “virtual vault” from which the owner can view all information about his/her portfolio. In some embodiments, the system provides a tree visualization of the portfolio, which allows a structured organization that provides both a high level view and the ability to drill down to an in-depth analysis. In some cases, the system provides segmented permissions in which restricted access could be granted based on module and/or asset in the tree visualization.Type: GrantFiled: January 11, 2021Date of Patent: January 30, 2024Assignee: Masttro Holding AGInventors: Domingo Viesca Decanini, Javier Manuel Gutierrez Rodriguez
-
Patent number: 11887424Abstract: A method of controlling access through a door may include storing a user's digital identity and a user's access policy in a memory of the user's mobile device, which may use the stored user's digital identity and the stored user's access policy to determine whether the user is authorized for access through the door and to make an access decision of YES or NO. The access decision may be communicated to the reader, which controls operation of a door lock in accordance with whether the access decision was YES or NO.Type: GrantFiled: May 10, 2022Date of Patent: January 30, 2024Assignee: HONEYWELL INTERNATIONAL INC.Inventors: Jayaprakash Meruva, Chaithanya Holla, KamalaKannan Balraj
-
Patent number: 11887129Abstract: A networked data processing system that provides an application programming interface (API) for consumer-permissioned data, such as academic data, employment data and income data. In some implementations, the data processing system enables application developers to integrate consumer-permissioned data (such as academic data) into their applications. In some implementations, the API enables a developer to focus on other aspects of a given application, while leveraging the data processing system to handle aspects of gathering and processing the source data, such as authenticating the provenance of the source data, handling user permissions, extracting the source data, reviewing the source data, verifying the source data, generating one or more scores from the source data, analyzing the source data relative to a defined purpose, providing the information sought from the analyzed data, and the like.Type: GrantFiled: February 25, 2021Date of Patent: January 30, 2024Assignee: MeasureOne, Inc.Inventors: Elan Amir, Sapan Tushar Shah, Unni Krishnan Kamatchi Pillai
-
Patent number: 11886917Abstract: Resources in an Infrastructure-as-a-Service (IaaS) system are upgraded in an iterative process. In response to an upgrade request indicating requested changes to a current configuration of the system, one or more graph representations of the current configuration and the requested changes are created. The graph representations include a control graph which has vertices representing resource groups, and edges representing dependences among the resource groups. A batch of resource groups is identified to be upgraded in a current iteration based on the dependencies and Service Level Agreement (SLA) requirements including availability and elasticity of the system. Upgrade operations are executed on the identified batch using selected upgrade methods which handle potential incompatibilties during transition of system configurations. The graph representations are updated to include any new requested changes and recovery operations in response to feedback of failed upgrade operations.Type: GrantFiled: July 24, 2019Date of Patent: January 30, 2024Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Mina Nabi, Maria Toeroe, Ferhat Khendek
-
Patent number: 11888840Abstract: To include a storage unit to store a plurality of server certificates different in subjects; and a communication unit to receive a connection request for communication established by using any one of the plurality of server certificates and to transmit a single server certificate selected out of the plurality of server certificates to a source of the connection request according to a source internet protocol (IP) address of the connection request.Type: GrantFiled: November 9, 2017Date of Patent: January 30, 2024Assignee: Mitsubishi Electric CorporationInventor: Masanori Imagawa
-
Patent number: 11882106Abstract: Techniques of dynamic authentication scheme selection in distributed computing systems are disclosed herein. One example technique includes analyzing a received authentication request for an indicator of an authentication scheme that is supported by a computing service submitting the authentication request. The example technique can also include determining whether the authentication scheme associated with the indicator is also supported by the authentication service and in response to determining that the authentication scheme associated with the indicator is also supported by the authentication service, initiating an authentication process with the computing service according to the authentication scheme that is supported by both the computing service and the authentication service. As such, the authentication scheme can be dynamically selected at the authentication service for the received authentication request.Type: GrantFiled: November 21, 2022Date of Patent: January 23, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventor: Paranthaman Saravanan
-
Patent number: 11880785Abstract: An information processing apparatus includes a processor configured to execute a process of renting a place where a business is conducted as a place used for purposes other than the business, in a case where a specific condition is satisfied.Type: GrantFiled: January 21, 2021Date of Patent: January 23, 2024Assignee: FUJIFILM Business Innovation Corp.Inventors: Kengo Tokuchi, Yoshikazu Kawai, Nobuyuki Yamazoe
-
Patent number: 11881993Abstract: An Internet of Things (IoT) system is disclosed which includes: a network; a plurality of IoT servers coupled together and serviced by the network; a plurality of IoT agents coupled to each other and to the plurality of IoT servers; and a plurality of IoT devices electrically coupled to the plurality of IoT agents, wherein the IoT servers and the IoT agents further includes a deep reinforcement neural network operative to generate an action map {at} so as to satisfy an arg ? ? max ? a t ? Q ? ( s , a , ? ) wherein Q(s,a)=E[Rt|(s, a)].Type: GrantFiled: December 31, 2021Date of Patent: January 23, 2024Assignee: EOH LIMITED LIABILITY COMPANYInventors: Bang Tran Dao, Long Hong Le, Hau Van Huynh, Canh Huu Nguyen, Son Giang Lam
-
Patent number: 11882239Abstract: There is disclosed in one example a mobile telephone, including: a hardware platform including a processor and a memory; a telecommunication transceiver; and instructions encoded within the memory to instruct the processor to: identify a call made via the telecommunication transceiver; analyze the call and assign the call a predicted local reputation according to the analysis, including a legitimacy confidence score; if the legitimacy confidence score is less than a first threshold, terminate the call; if the legitimacy confidence score is greater than a second threshold, cease analysis of the call; and if the legitimacy confidence score is between the first and second thresholds, continue analysis of the call.Type: GrantFiled: July 23, 2021Date of Patent: January 23, 2024Assignee: McAfee, LLCInventors: Harsha Ramamurthy Joshi, Purnima Tammireddy, Pavan Kumar Podila
-
Patent number: 11882181Abstract: Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for data storage. The method includes determining, based on attribute information of each of a set of nodes in a distributed storage system, a hash value of each of the set of nodes; determining a node identifier of each of the set of nodes based on geographic location information of each of the set of nodes and the hash value, with the node identifier being used to indicate a logical location of a node in the distributed storage system; and determining, in response to a processing request from a first node in the set of nodes for first data, a target node in the set of nodes based on the node identifier of each of the set of nodes. The target node is used to process the processing request for the first data.Type: GrantFiled: February 16, 2022Date of Patent: January 23, 2024Assignee: Dell Products L.P.Inventors: Si Chen, Zhenzhen Lin, Anzhou Hou
-
Patent number: 11880437Abstract: A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.Type: GrantFiled: December 5, 2022Date of Patent: January 23, 2024Assignee: QUICKVAULT, INC.Inventor: Steven V. Bacastow
-
Patent number: 11876896Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.Type: GrantFiled: February 28, 2023Date of Patent: January 16, 2024Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Jin-Meng Ho, Eric Peeters
-
Patent number: 11876808Abstract: A method, system, and computer-implemented method to manage threats to a protected network having a plurality of internal production systems is provided. The method includes monitoring network traffic from the plurality of internal production systems of a protected network for domain names. For each internal production system, a first collection of each unique domain name that is output by the internal production system is determined over the course of a long time interval. For each internal production system, a second collection of each unique domain name that is output by the internal production system is determined over the course of a short time interval. Domain names in the first and second collections associated with the plurality of internal production systems are compared to determine suspicious domain names that meet a predetermined condition. A request is output to treat the suspicious the suspicious domain names as being suspicious.Type: GrantFiled: February 13, 2020Date of Patent: January 16, 2024Assignee: ARBOR NETWORKS, INC.Inventor: Bhargav Pendse
-
Patent number: 11869126Abstract: Systems and methods for obscuring images and/or text during a screen sharing operation in a video conferencing session are described herein. In some embodiments, a client device detects a screen sharing operation. As part of the screen sharing operation, the client device captures an image of a display. The client device recognizes images and/or text in the image of the display and determines whether any of the images and/or text are restricted. If the images and/or text are determined to be restricted, the client device obscures the images and/or text prior to encoding of the image of the display for transmission.Type: GrantFiled: December 13, 2021Date of Patent: January 9, 2024Assignee: Rovi Guides, Inc.Inventor: Serhad Doken
-
Patent number: 11870605Abstract: Techniques for operating a network device are provided. In some embodiments, a method may comprise: forwarding multicast data packets from a source in a first customer network to a receiver in a second customer network; detecting that another PE device is forwarding the multicast data packets, wherein: Protocol Independent Multicast (PIM) is enabled on supplemental bridge domain (SBD) logical interfaces of the PE device and the another PE device, the PE device and the another PE device are PIM neighbors, and the PE device and the another PE device communicate with each other and with the receiver using the PIM protocol through an Ethernet virtual private network (EVPN). The method may further comprise: determining the another PE device is an assert winner from among the PE device and the another PE device based on at least one PIM assert message, the another PE device forwarding the multicast data packets.Type: GrantFiled: June 14, 2022Date of Patent: January 9, 2024Assignee: Arista Networks, Inc.Inventors: Suresh Nalagatla, Saravanan Balasubramanian, Prashant Srinivas, Bharathram Pattabhiraman
-
Patent number: 11868474Abstract: A method for securing a plurality of compute nodes includes authenticating a hardware architecture of each of a plurality of components of the compute nodes. The method also includes authenticating a firmware of each of the plurality of components. Further, the method includes generating an authentication database comprising a plurality of authentication descriptions that are based on the authenticated hardware architecture and the authenticated firmware. Additionally, a policy for securing a specified subset of the plurality of compute nodes is implemented by using the authentication database.Type: GrantFiled: January 8, 2019Date of Patent: January 9, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Nigel Edwards, Michael R. Krause, Melvin Benedict, Ludovic Emmanuel Paul Noel Jacquin, Luis Luciani, Thomas Laffey, Theofrastos Koulouris, Shiva Dasari
-
Patent number: 11870903Abstract: A method is disclosed. The method includes receiving, by a token service computer, a token request message, the token request message being originated from a token requestor computer. The method also includes determining, by the token service computer, two or more access tokens based upon a single credential, and then transmitting the two or more access tokens to the token requestor computer in a token response message.Type: GrantFiled: September 7, 2022Date of Patent: January 9, 2024Assignee: Visa International Service AssociationInventors: Ramesh Shankar, Sayeed Mohammed, Anjana Surin
-
Patent number: 11864223Abstract: Various methods, apparatuses/systems, and media for implementing a security value generation module are disclosed. A processor establishes a communication link between a registry and a plurality of service devices each configured to provide corresponding service. A receiver receives a request from a user device for generating a value of a security based on a requested quality level. The processor implements rules to determine which service to be used for generating the value of the security based on the requested quality level in response to the received request; generates the value of the security based on the implemented rules; and transmits an electronic package to the user device, the package including data related to the value of the security.Type: GrantFiled: June 9, 2021Date of Patent: January 2, 2024Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Alan Scully, Andrew Kilmartin Flynn, Rita Chan, Girish Asrani, Meng Feng
-
Patent number: 11861339Abstract: In order to automate some aspects of software development, an application catalogue is provided. The application catalog is associated with an application (e.g., a medical device) and includes a plurality of parameters that each define a desired state of the software application when the software application is deployed). These parameters may include service parameters, application parameters, environmental parameters, feature parameters, API parameters, and infrastructure parameters. Before a software application is deployed to an environment, the states of the parameters with respect to the environment are determined and compared to the states of the parameters of the application catalog. The system then automatically takes the necessary steps to correct the states of any parameters of the environment to match those of application catalog.Type: GrantFiled: September 16, 2021Date of Patent: January 2, 2024Assignee: Change Healthcare Holdings, LLCInventors: Rostislav Boguslavsky, Diana Chaytor, Abraham Chan, Andy YongHyuk Chung, Ravi Malleboina, Stephen Ying-Kei Cheok