Particular Node (e.g., Gateway, Bridge, Router, Etc.) For Directing Data And Applying Cryptography Patents (Class 713/153)
  • Patent number: 11689421
    Abstract: Examples described herein relate to the selection of virtual private network profiles. A device obtains VPN metrics associated with a plurality of VPN server nodes and monitors device usage metrics. The device is configured with a first VPN profile, which indicates that a first VPN tunnel connection is associated with a first VPN server node from the plurality of VPN server nodes. The device determines a latency associated with each of the plurality of VPN server nodes based on the VPN metrics and the device usage metrics. A second VPN server node associated with a least latency among the plurality of VPN server nodes is selected. A second VPN tunnel connection associated with the second VPN server node is determined based on the device usage metrics. A second VPN profile indicating that the second VPN tunnel connection is associated with the second VPN server node is displayed as a recommendation to a user.
    Type: Grant
    Filed: August 19, 2021
    Date of Patent: June 27, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Brundha Srinivasa Vanajakshi, Avanika Agarwal
  • Patent number: 11689517
    Abstract: Methods and supporting systems for managing secure communications and establishing authenticated communications between processes of a computer application operating across network domains are provided. Authentication agents operate on servers hosting application processes, wherein each authentication agent has access to policies related to each of the application processes. An authentication agent operating on an originating server intercepts transmissions from an originating application processes and appends a trust profile associated with the originating application process. The transmission is released to a receiving server, where it is intercepted and validated at the receiving server by a second authentication agent on the receiving server.
    Type: Grant
    Filed: May 17, 2021
    Date of Patent: June 27, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Dimitri Styliadis, Satyam Sinha
  • Patent number: 11687633
    Abstract: Access authentication in an artificial intelligence system includes perceiving electronically with a first user's artificial intelligence voice response system (AIVRS) a physical presence of a second user. A voice request is generated by the first user's AIVRS and conveyed to a second user requesting access to a knowledge corpus stored by an AIVRS of the second user. Based on a voice response of the second user, the first user's AIVRS instantiates an electronic communications session with the second user's AIVRS. The session is initiated via an electronic communications connection with a portable device of the second user. Selected portions of the knowledge corpus are retrieved by the first user's AIVRS from the second user's AIVRS, the portions selected based on the voice response. An action by one or more IoT devices is initiated in response to a voice prompt interpreted by the first user's AIVRS based on the selected portions.
    Type: Grant
    Filed: November 5, 2020
    Date of Patent: June 27, 2023
    Inventors: Shikhar Kwatra, Christopher J. Hardee, Sarbajit K. Rakshit, Gurneet Kaur
  • Patent number: 11681568
    Abstract: Some embodiments provide a method for authorizing application programming interface (API) calls on a host computer in a local cluster of computers. The method is performed in some embodiments by an API-authorizing agent executing on the host computer in the local computer cluster. From a remote cluster of computers, the method receives (1) a set of API-authorizing policies to evaluate in order to determine whether API calls to an application executing on the host computer are authorized, and (2) a set of parameters needed for evaluating the policies. With the remote cluster of computers, the method registers for notifications regarding updates to the set of parameters. The method then receives notifications, from the remote cluster, regarding an update to the set of parameters, and modifies the set of parameters based on the update.
    Type: Grant
    Filed: March 30, 2020
    Date of Patent: June 20, 2023
    Assignee: STYRA, INC.
    Inventors: Timothy L. Hinrichs, Teemu Koponen, Torin Sandall
  • Patent number: 11681470
    Abstract: An embodiment may involve non-volatile memory configured to store chunks of data packets, wherein the chunks are associated with sequence numbers; a shared producer queue; one or more processors configured to transfer the chunks to the shared producer queue in order of the sequence numbers; an array of n sets of processors configured to: (i) read the chunks from the shared producer queue, (ii) re-write network addresses within the data packets to create modified chunks, and (iii) write the modified chunks to queues; and a field programmable gate array based network interface containing the queues and m physical ports, and configured to: (i) read the modified chunks in order of their sequence numbers, (ii) unpack the modified chunks into data packets, (iii) write updated checksums to the data packets, (iv) respectively select output ports for the data packets, and (v) transmit the data packets from the selected output ports.
    Type: Grant
    Filed: March 29, 2021
    Date of Patent: June 20, 2023
    Assignee: fmad engineering kabushiki gaisha
    Inventor: Aaron Foo
  • Patent number: 11681591
    Abstract: Disclosed herein are systems and method for restoring a clean backup after a malware attack. In one aspect, a method forms a list of files that are of a plurality of designated file types that can be infected by malicious software. The method performs one or more snapshots of the files according to a predetermined schedule over a predetermined period of time and performs one or more backups. The method determines that a malware attack is being carried out on the computing device and generates a list of dangerous objects that spread the malware attack. The method compares the list of dangerous objects with the one or more snapshots to determine when the malware attack occurred. The method identifies a clean backup that was created most recently before the malware attack as compared to other backups and recovers data for the computing device from the clean backup.
    Type: Grant
    Filed: April 2, 2020
    Date of Patent: June 20, 2023
    Assignee: Acronis International GmbH
    Inventors: Andrey Kulaga, Oleg Ishanov, Vladimir Strogov, Serguei Beloussov, Stanislav Protasov
  • Patent number: 11683370
    Abstract: A backend computing system may receive first data from a first computing system, where the first data may be an encrypted version of second data that has been generated at the first computing system based on a command at the first computing system. The backend computing system may identify a second computing system different than the first computing system based on a status of the second computing system, and may send the first data to the second computing system to enable the second computing system to decrypt the first data and perform a function with respect to the second data. In some embodiments, the first computing system may generate padded data by adding data to the second data, and send the padded data to the backend computing system. In some embodiments, the first computing system may send random data to the backend computing system.
    Type: Grant
    Filed: March 26, 2021
    Date of Patent: June 20, 2023
    Inventors: Joseph Nord, Chris Mayers
  • Patent number: 11683189
    Abstract: With the popularity of Blockchain comes grave security-related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject to specific scenarios. The present disclosure proposes a method, a system, and a device for maintaining privacy and traceability of a Blockchain-based system. The method includes: registering in a Blockchain-based system; transmitting a message from a transmitter T to a receiver R via an anonymous network, after a registration request of the transmitter T has been approved and storing message transmission data generated during a message transmission process in a Blockchain; and performing an identity disclosure by using the message transmission data when the message is detected to be false. The anonymous network may transmit the message by onion routing. The solution proposed by the present disclosure can achieve traceability and privacy for a Blockchain-based system simultaneously.
    Type: Grant
    Filed: March 19, 2020
    Date of Patent: June 20, 2023
    Assignee: Jinan University
    Inventors: Jian Weng, Yue Zhang, Jiasi Weng, Ming Li, Weiqi Luo
  • Patent number: 11683160
    Abstract: Secure data transfers between communication nodes is performed using a group encryption key supplied by a remote management system. A first node transmits a request for secure communications with a second node to the remote management system using a control channel. The remote management system generates and encrypts a group encryption key usable by the first and second nodes and forwards the encrypted group encryption key to the first and second nodes using one or more control channels. The first and second communication nodes decrypt the group encryption key and use it to encrypt data transmitted between the nodes using a data transport network. In some implementations the securely communicating nodes may use encryption keys and/or techniques that prevent the remote management system from eavesdropping on the nodes' communications.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: June 20, 2023
    Assignee: Orion Labs, Inc.
    Inventors: Greg Albrecht, Andy Isaacson, Nelson Carpentier, Dan Phung, Schuyler Erle
  • Patent number: 11677719
    Abstract: Example methods are provided for a destination host to implement a firewall in a virtualized computing environment that includes the destination host and a source host. The method may comprise receiving, via a physical network interface controller (PNIC) of the destination host, an ingress packet sent by the source host. The ingress packet may be destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC). The method may further comprise retrieving a PNIC-level firewall rule associated with the destination virtualized computing instance, the PNIC-level firewall rule being applicable at the PNIC and generated by based on a VNIC-level firewall rule applicable at the destination VNIC. In response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, the ingress packet may be dropped such that the ingress packet is not sent to the destination VNIC.
    Type: Grant
    Filed: February 19, 2021
    Date of Patent: June 13, 2023
    Assignee: NICIRA, INC.
    Inventor: Donghai Han
  • Patent number: 11677787
    Abstract: A user tracking method includes collecting cookies in a log according to a user action on the Internet and collecting chain information by Internet communication as third information different from the cookie, and grouping cookies based on the chain information.
    Type: Grant
    Filed: February 5, 2021
    Date of Patent: June 13, 2023
    Inventors: Youngjin Kim, Moweon Lee
  • Patent number: 11676316
    Abstract: A system for sharing settings for modifying images is described. In an example embodiment, an image-modification application may display an image and editing elements in a user interface programed to edit image-adjustment settings that affect aspects of the image on the user interface. The image-modification application may receive user inputs modifying the editing elements and, in response, modify image-adjustment settings and apply the modified image-adjustment settings to the visual aspects of the image. In some embodiments, the image-modification application may receive a first user input requesting to export a settings file including the modified image-adjustment settings, generate the settings file based on the modified image-adjustment settings, and export the settings file.
    Type: Grant
    Filed: June 30, 2020
    Date of Patent: June 13, 2023
    Assignee: Instasize, Inc.
    Inventors: Hector Lopez, Eddy Homez-Devroom, Omar Arambula
  • Patent number: 11677826
    Abstract: Efficient data transfer is disclosed. A server provides an endpoint for a client. The client can communicate with a cloud storage system through the server rather than connect directly to the cloud storage system. The server is configured to perform requests in a manner that reduces the amount of data transferred to and from the cloud storage system.
    Type: Grant
    Filed: July 16, 2021
    Date of Patent: June 13, 2023
    Inventors: Kimberly R. Lu, Nicholas A. Noto, Philip N. Shilane
  • Patent number: 11671447
    Abstract: In one embodiment, a device in a network receives traffic sent from a first endpoint. The device sends a padding request to the second endpoint indicative of a number of padding bytes. The device receives a padding response from the second endpoint, after sending the padding request to the second endpoint. The device adjusts the received traffic based on the received padding response by adding one or more frames to the received traffic. The device sends the adjusted traffic to the second endpoint.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: June 6, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Blake Harrell Anderson, David McGrew
  • Patent number: 11669554
    Abstract: This disclosure relates to personalized and dynamic server-side searching techniques for encrypted data. Current so-called ‘zero-knowledge’ privacy systems (i.e., systems where the server has ‘zero-knowledge’ about the client data that it is storing) utilize servers that hold encrypted data without the decryption keys necessary to decrypt, index, and/or re-encrypt the data. As such, the servers are not able to perform any kind of meaningful server-side search process, as it would require access to the underlying decrypted data. Therefore, such prior art ‘zero-knowledge’ privacy systems provide a limited ability for a user to search through a large dataset of encrypted documents to find critical information.
    Type: Grant
    Filed: October 14, 2022
    Date of Patent: June 6, 2023
    Assignee: Entefy Inc.
    Inventors: Alston Ghafourifar, Philip Nathan Greenberg, Mehdi Ghafourifar
  • Patent number: 11671433
    Abstract: A cloud-based security system includes a plurality of enforcement nodes connected to one another; a central authority connected to the plurality of enforcement nodes; and a Data Loss Prevention (DLP) service executed between the plurality of enforcement nodes, wherein the DLP service includes one or more DLP rules based on one or more DLP engines for a tenant, and wherein, for the DLP service, a first enforcement node is configured to monitor traffic of a user of the tenant, detect a DLP rule violation based on the one or more DLP rules, and forward DLP incident information to a second enforcement node, and the second enforcement node is configured to transmit the DLP incident information to a server for the tenant, including both DLP triggering content that cause the DLP rule violation and DLP scan metadata.
    Type: Grant
    Filed: April 21, 2020
    Date of Patent: June 6, 2023
    Assignee: Zscaler, Inc.
    Inventors: Narinder Paul, Arun Bhallamudi, James Tan, Frank Zhang, Pooja Deshmukh
  • Patent number: 11671453
    Abstract: A Secure/Multipurpose Internet Mail Extensions (S/MIME) key material publication system that converts cryptographic material extracted from digitally signed and validated S/MIME messages it receives into key material formats suitable for populating email address books. Publication of the address book contents both internal and external to an organization is done using the standard address book lightweight database access protocol (LDAP). The wide availability and coordination of such automated address books distributing key material across the Internet allows the large installed base of S/MIME email clients to immediately send secure encrypted email across organizational boundaries. The system serves the role of public key server thus removing a barrier to ubiquitous secure encrypted email by simplifying global key management.
    Type: Grant
    Filed: June 17, 2021
    Date of Patent: June 6, 2023
    Inventors: Richard Lamb, Fredrik Ljunggren
  • Patent number: 11671403
    Abstract: A relay device includes a communicator configured to transmit and receive a message to and from the communication device, and a processor configures to acquire a public key of a communication device that is a transmission source of the message from the node and authenticates a signature included in the message with the acquired public key, wherein the processor causes, when receiving a communication message including communication data to be transmitted to a second communication device by a first communication device, the processor to perform authentication on the communication message, and the communicator transmits the communication message to the second communication device when the authentication is successful.
    Type: Grant
    Filed: August 20, 2020
    Date of Patent: June 6, 2023
    Inventor: Dai Suzuki
  • Patent number: 11664983
    Abstract: Embodiments are disclosed for a quantum key distribution enabled intra-datacenter network. An example system includes a first vertical cavity surface emitting laser (VCSEL), a second VCSEL and a network interface controller. The first VCSEL is configured to emit a first optical signal associated with data. The second VCSEL is configured to emit a second optical signal associated with quantum key distribution (QKD). Furthermore, the network interface controller is configured to manage transmission of the first optical signal associated with the first VCSEL and the second optical signal associated with the second VCSEL via an optical communication channel coupled to a network interface module.
    Type: Grant
    Filed: December 15, 2020
    Date of Patent: May 30, 2023
    Assignee: Mellanox Technologies, Ltd.
    Inventors: Elad Mentovich, Itshak Kalifa, Ioannis (Giannis) Patronas, Paraskevas Bakopoulos, Eyal Waldman
  • Patent number: 11664999
    Abstract: Systems and methods related to ensuring the integrity of data stored in a memory by using a watermark are described. An example method in a system including a processor and a memory may include receiving data for storage at an address in the memory. The method may further include after encoding the data with an error correction code to generate intermediate data having a first number of bits, reversibly altering the intermediate data with a watermark to generate watermarked data for storage in the memory, where the watermark is generated by applying a cryptographic function to a user key and the address, and where the watermarked data has a second number of bits equal to the first number of bits.
    Type: Grant
    Filed: October 16, 2020
    Date of Patent: May 30, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: John Grant Bennett, Greg Zaverucha
  • Patent number: 11658969
    Abstract: Aspects of the subject disclosure may include, for example, receiving, by a processing system including a processor that is operative in a first communication network, a certificate from a communication device that is operative in a second communication network, extracting, by the processing system, an identifier of the communication device from the certificate, authenticating, by the processing system, the communication device in accordance with the identifier, comparing, by the processing system, the identifier with a plurality of identifiers to determine that the communication device is authorized to access data, resulting in an authorization determination, and transmitting, by the processing system, the data to the communication device based on the authorization determination. Other embodiments are disclosed.
    Type: Grant
    Filed: November 20, 2020
    Date of Patent: May 23, 2023
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Timothy Yao, Christopher Bryant, Qun Wei
  • Patent number: 11658820
    Abstract: A distributed system, such as a distributed storage system in a virtualized computing environment and having storage nodes arranged in a cluster, is provided by management server with a transition period between non-encryption and encryption modes of operation. The transition period enables all of the nodes to complete a transition from the non-encryption mode of operation to the encryption mode of operation, without loss of data-in-transit (DIT). An auto-remediation feature is provided by the management server to the cluster, so as to fix inconsistent state(s) of one or more nodes in the cluster.
    Type: Grant
    Filed: November 23, 2020
    Date of Patent: May 23, 2023
    Assignee: VMWARE, INC.
    Inventors: Wei Fang, Haoran Zheng, Tao Xie, Yun Zhou, YangYang Zhang
  • Patent number: 11651099
    Abstract: A remote browsing session is initiated between a remote browser client executing on a client device and a remote browser host executing on a remote browser server. The remote browser host receives from the client device, encrypted remote browser data of remote browser data that affects the remote browser session. The remote browser client does not have access to a decryption key for the encrypted remote browser data. The encrypted remote browser data is decrypted to reveal the remote browser data including data for one or more cookies. The remote browser host is configured with the remote browser data. The remote browser host manages updates to the remote browser data during the remote browsing session including updates to one or more cookies. Periodically, updates to the remote browser data are encrypted and transmitted to the remote browser client for storage.
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: May 16, 2023
    Assignee: CLOUDFLARE, INC.
    Inventors: Joshua Thomas Claeys, Benjamin Buzbee, Pierre Cauchois, Killian Koenig, Trevor Sundberg
  • Patent number: 11647041
    Abstract: A system and method enabling enterprises to engage in cyber threat information sharing in a privacy-enhanced fashion. The invention reduces the enterprise's risk to sensitive information leakage by inducing a state in the information it shares such that, when an enterprise's shared data attributes are interdependent, the sensitive features (those to be kept private to the enterprise) are not deducible by another enterprise. This state is accomplished by employing rough set theory to undermine the deductive route to the data's sensitive features.
    Type: Grant
    Filed: September 19, 2019
    Date of Patent: May 9, 2023
    Assignee: United States of America as represented by the Secretary of the Air Force
    Inventors: Laurent Y Njilla, Celestin Wafo Soh
  • Patent number: 11645399
    Abstract: Disclosed are various embodiments for searching encrypted data. A search query containing a plaintext key can be received from a client device or other application. A request can then be sent to a storage engine for a ciphertext key of a node of a binary tree, the node representing an encrypted key-value pair that includes the ciphertext key. The ciphertext key can be decrypted using a cryptographic key to generate a decrypted ciphertext key. Then, the decrypted ciphertext key can be compared to the plaintext key. A determination can then be made as to whether the encrypted key-value pair represented by the node of the binary tree satisfies the search query based at least in part on a comparison of the decrypted ciphertext key to the plaintext key.
    Type: Grant
    Filed: January 11, 2021
    Date of Patent: May 9, 2023
    Assignee: American Express Travel Related Services Company, INC.
    Inventor: John Orlando Keleshian Moxley
  • Patent number: 11641348
    Abstract: A method for encrypting data when a device is offline is disclosed. In the method, a determination is made as to whether a successful connection with a remote server computer can or cannot be made. If a connection cannot be made, then data can be encrypted with an ephemeral public key. Later, then a connection is available, the encrypted data can be transmitted to the remote server computer for processing.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: May 2, 2023
    Assignee: Visa International Service Association
    Inventors: Rhidian John, Bartlomiej Piotr Prokop, Michael Palmer
  • Patent number: 11641350
    Abstract: An information processing system includes: a service system, a plurality of agent machines, and a plurality of encryption machines. The plurality of agent machines and the plurality of encryption machines are divided into a plurality of groups, and each group includes at least two encryption machines and a plurality of agent machines communicatively connected to the at least two encryption machines. The encryption machine is configured to encrypt and decrypt data from the service system and to perform signature verification on the data when the service system performs a security call on the encryption machine via the agent machine in the group containing the encryption machine. The service system is configured to perform service processing and to perform the security call on the encryption machine via the agent machine in the group containing the encryption machine.
    Type: Grant
    Filed: May 13, 2019
    Date of Patent: May 2, 2023
    Inventors: Zhizhang Teng, Tong Zhao, Cunjing Shen, Chaoqun Li
  • Patent number: 11637828
    Abstract: Disclosed are hybrid authentication systems and methods that enable users to seamlessly sign-on between cloud-based services and on-premises systems. A cloud-based authentication service receives login credentials from a user and delegates authentication to an on-premises authentication service proxy. The login credentials can be passed by the cloud-based authentication service to the on-premises authentication service proxy, for instance, as an access token in an authentication header. The access token can be a JavaScript Object Notation (JSON) Web Token (JWT) token that is digitally signed using JSON Web Signature. Some embodiments utilize a tunnel connection through which the cloud-based authentication service communicates with the on-premises authentication service proxy. Some embodiments leverage an on-premises identity management system for user management and authentication.
    Type: Grant
    Filed: May 3, 2021
    Date of Patent: April 25, 2023
    Assignee: Open Text Corporation
    Inventors: Sachin Gopaldas Totale, Muneer Ahmed, Harish Rawat, Rajakumar Thiruvasagam, Lakshmi Narayana Prasad Kakumani
  • Patent number: 11632385
    Abstract: In one implementation, a system for the prevention of malicious attack on a computing resource includes one or more processor; computer memory storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including: observing traffic flow of a network; altering a SYN threshold value based on the observing of the traffic flow of the network; comparing a metric of SYN messages submitted to the network; and based on the comparison of the metric of SYN messages submitted, selectively engaging corrective action with the network.
    Type: Grant
    Filed: February 3, 2021
    Date of Patent: April 18, 2023
    Assignee: University of South Florida
    Inventors: Mohamed Rahouti, Kaiqi Xiong
  • Patent number: 11630896
    Abstract: Biometric keystroke measure data derived from a computer-implemented long form examination taken by an examinee is received. Features are the extracted from the biometric keystroke measure data for the examinee. A similarity value is then determined, using one or more of a direct distance approach or a machine learning approach, for the extracted features relative to features extracted from biometric keystroke measure data derived from each of a plurality of other examinees while taking the long form examination. At least one of the determined similarity values is then identified having a value above a pre-defined threshold. The pre-defined threshold indicates a likelihood of the examinee being the same as one of the other examinees. Data can then be provided that characterizes the identification. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: March 6, 2020
    Date of Patent: April 18, 2023
    Assignee: Educational Testing Service
    Inventors: Paul Douglas Deane, Ick Kyu Choi, Jiangang Hao, Mo Zhang
  • Patent number: 11626976
    Abstract: An information processing system capable of processing the encrypted data efficiently is provided. The information processing system of the present invention includes: a key management unit configured to manage a system key; a storage unit configured to store an encryption data encrypted by the system key; and a processing execution unit configured to temporarily construct a virtual execution environment protected from a standard execution environment and decrypt the encryption data in the virtual execution environment based on the system key acquired from the key management unit.
    Type: Grant
    Filed: August 3, 2022
    Date of Patent: April 11, 2023
    Assignee: EAGLYS Inc.
    Inventor: Hiroki Imabayashi
  • Patent number: 11627074
    Abstract: A network device includes at least one port, a memory, data-path circuitry, and a processor. The at least one port is to exchange packets with a network. The data-path circuitry is to process the packets. The memory is to store signatures of traffic patterns according to a locality-sensitive signature function., and corresponding parameter settings for the data-path circuitry. The processor is to assess a current traffic pattern of the packets, to calculate a current signature over the current traffic pattern using the locality-sensitive signature function, to query the memory using the current signature, to configure the data-path circuitry, in response to finding a stored signature that is within a specified distance from the current signature, with a parameter setting that corresponds to the found signature, and take an alternative action in response to finding that no stored signature is within the specified distance from the current signature.
    Type: Grant
    Filed: January 24, 2022
    Date of Patent: April 11, 2023
    Inventors: Yair Chasdai, David Daniel Pilnik, Maty Golovaty, Liran Daniel, Ran Sandhaus
  • Patent number: 11622273
    Abstract: The technology includes a method performed by a security system of a 5G network. The security system is instantiated to sort incoming or outgoing network traffic at a perimeter of the 5G network into one of multiple groups that are each uniquely associated with one of multiple functions or applications and one of multiple security levels. The system can inspect portions of incoming network traffic that contain addressing information required for the network traffic to reach an intended application or function, sorting the incoming network traffic into the groups based in part on the inspection of the portions of the network traffic, and dynamically directing the network traffic for the 5G network based on a particular security level associated with a particular application or a particular function of each of the groups.
    Type: Grant
    Filed: July 6, 2020
    Date of Patent: April 4, 2023
    Assignee: T-Mobile USA, Inc.
    Inventor: Venson Shaw
  • Patent number: 11621947
    Abstract: In a messaging server, processing circuitry receives a network packet that encapsulates a user message from a wireless User Equipment (UE) over a wireless communication network. In response to the network packet, the processing circuitry transfers the user message to ledger circuitry in the messaging server. The ledger circuitry executes a distributed ledger transaction based on a source domain and a destination domain in the user message. The ledger circuitry transfers the user message to the processing circuitry after the distributed ledger transaction. The processing circuitry receives the user message from the ledger circuitry and generates a new network packet for delivery to the destination domain that encapsulates the user message. The ledger circuitry transfers the new network packet that encapsulates the user message for delivery to the destination domain.
    Type: Grant
    Filed: May 3, 2021
    Date of Patent: April 4, 2023
    Inventors: Lyle Walter Paczkowski, Ronald R. Marquardt, Ivo Rook
  • Patent number: 11616769
    Abstract: The present disclosure provides computing systems and techniques for providing a certificate to sue to securely connect to a server. More particularly, the present disclosure provides a computing device certificate rotation server arranged to provide certificates to the computing device for use by an application executing on the computing device to securely connect to a server.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: March 28, 2023
    Assignee: Capital One Services, LLC
    Inventors: Panayiotis Varvarezis, Mausam Gautam, Chad Alan Landis, Edward Han Lee, Reza Jaberi
  • Patent number: 11616758
    Abstract: A network address translation device or similarly situated network device can cooperate with endpoints on a subnet of an enterprise network to secure endpoints within the subnet. For example, the network address translation device may be configured, either alone or in cooperation with other network devices, to block traffic from a compromised endpoint to destinations outside the subnet, and to direct other endpoints within the subnet to stop network communications with the compromised endpoint.
    Type: Grant
    Filed: April 4, 2018
    Date of Patent: March 28, 2023
    Assignee: Sophos Limited
    Inventors: Moritz Daniel Grimm, Daniel Stutz, Andrew J. Thomas, Kenneth D. Ray
  • Patent number: 11611436
    Abstract: A technique provides cohesive and secure access to management services of a distributed storage architecture deployed on compute and storage nodes of a cluster. The management services are organized as a platform that encompasses a plurality of underlying individual services each having an applications programming interface (API) that are together securely accessible via an API gateway. The gateway is configured to support a “browsable” directory of the APIs that enables a client to identify various underlying services available within the cluster. In an embodiment, the underlying services “self-register” at the gateway to provide a single, unified location for the client to access the services. The API gateway includes a reverse-proxy server that is configured to provide a single point of entry for clients interacting with the individual services underlying the management services platform.
    Type: Grant
    Filed: April 24, 2020
    Date of Patent: March 21, 2023
    Assignee: NetApp, Inc.
    Inventors: Eric Ziegler, Adam Haid, Brian Macdonald
  • Patent number: 11606202
    Abstract: A method is disclosed of secure data transmission comprising sending a data request from a client device to a server device, the data request comprising a first share of a first encryption key, and a first location in the database at which is located desired double-encrypted data; receiving the sent data request at the server device; extracting, at the server device, the first share and the first location from the received data request; obtaining, at the server device, the desired double-encrypted data from the database using the extracted first location; generating, at the server device, the first encryption key using the extracted first share and one or more additional shares of the first encryption key held by the server device; and decrypting, at the server device, the obtained desired double-encrypted data using the generated first encryption key to form single-encrypted data.
    Type: Grant
    Filed: June 7, 2019
    Date of Patent: March 14, 2023
    Inventor: Neil Edward John Cooke
  • Patent number: 11604658
    Abstract: Many hybrid cloud topologies require virtual machines in a public cloud to use a router in a private cloud, even when the virtual machine is transmitting to another virtual machine in the public cloud. Routing data through an enterprise router on the private cloud via the internet is generally inefficient. This problem can be overcome by placing a router within the public cloud that mirrors much of the routing functionality of the enterprise router. A switch configured to intercept address resolution protocol (ARP) request for the enterprise router's address and fabricate a response using the MAC address of the router in the public cloud.
    Type: Grant
    Filed: June 11, 2021
    Date of Patent: March 14, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: David W. Chang, Abhijit Patra, Nagaraj Bagepalli, Dileep Kumar Devireddy, Ganesh Sadasivan
  • Patent number: 11606386
    Abstract: Disclosed herein are system, method, and computer program product embodiments for restoring an electronic device. An embodiment operates by receiving a request for restoring a portion of data from a point of time onto the electronic device. Thereafter, the portion of data is scanned for a virus. Based on the detection of the virus, a determination is made on whether to proceed with restoring the electronic device with the portion of data. If the determination is made to proceed with the restoring of the electronic device, the portion of data is subsequently transmitted to the electronic device. The portion of data is stored in a backup repository remote from the electronic device.
    Type: Grant
    Filed: March 4, 2022
    Date of Patent: March 14, 2023
    Inventors: Ratmir Timashev, Anton Gostev
  • Patent number: 11606213
    Abstract: A communication device stores a first secret key and a first public key, and the on-vehicle authentication device stores a second secret key, a second public key and a signature verification key. The on-vehicle authentication device acquires the first public key, verifies the authenticity of the electronic signature using a signature verification key, encrypts the second public key using the authentic first public key and transmits the encrypted second public key. The communication device receives the encrypted second public key, decrypts the encrypted second public key using the first secret key, encrypts the first public key using the decrypted second public key. The on-vehicle authentication device receives the encrypted first public key, decrypts the encrypted first public key using the second secret key, and authenticates that the communication device is an authentic device when the decrypted first public key has been determined to be authentic.
    Type: Grant
    Filed: June 19, 2018
    Date of Patent: March 14, 2023
    Assignees: National University Corporation Nagoya University, AutoNetworks Technologies, Ltd., Sumitomo Wiring Systems, Ltd., Sumitomo Electric Industries, Ltd.
    Inventors: Hiroaki Takada, Ryo Kurachi, Hiroshi Ueda
  • Patent number: 11601278
    Abstract: An intelligent electronic device (IED) includes memory and a processor operatively coupled to the memory. The processor is configured to establish, over a communication network of a power system, a communication link according to a media access control security (MACsec) Key Agreement (MKA). The TED receives a plurality of access control secure association keys (SAKs) via the communication link. The TED receives one or more checked-out SAKs indicating a request to access the TED The TED allows access based on the one or more checked-out access control SAKs matching at least one of the plurality of access control SAKs.
    Type: Grant
    Filed: March 25, 2021
    Date of Patent: March 7, 2023
    Assignee: Schweitzer Engineering Laboratories, Inc.
    Inventors: Colin Gordon, Timothy J. Watkins, Paul Stoaks, Duane C. Skelton, Dennis Gammel
  • Patent number: 11595369
    Abstract: Apparatus and method for local authentication of a collection of processing devices, such as but not limited to storage devices (e.g., SSDs, etc.). In some embodiments, an edge computing device is coupled between the collection of processing devices and an external network. The edge computing device performs a network authentication over the external network with a remote server using an edge token. The edge computing device further performs a local authentication of the collection using storage tokens of the respective processing devices, with the local authentication not utilizing the external network or the remote server. Both the edge token and the storage tokens may be generated from a client token of a client device.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: February 28, 2023
    Inventor: Christopher Nicholas Allo
  • Patent number: 11593308
    Abstract: In some examples, a system may determine a mountpoint included in a first filesystem for mounting a userspace filesystem. For instance, the userspace filesystem may be executable in a userspace provided by an operating system. The system may determine a bind mount path for a mount path corresponding to the mountpoint. The system may bind mount, to the determined bind mount path, at least a portion of a second filesystem associated with the mount path corresponding to the mountpoint. In addition, the system may mount the userspace filesystem at the mountpoint, and may incorporate data from the second filesystem into the userspace filesystem through the bind mount path.
    Type: Grant
    Filed: February 22, 2021
    Date of Patent: February 28, 2023
    Inventor: Scott Anthony Yaninas
  • Patent number: 11596027
    Abstract: A method, implemented in a cloud-based system, includes, responsive to a client device having a Subscriber Identity Module (SIM) card therein connecting to a mobile network from a mobile network operator, receiving authentication of the client device based on the SIM card; receiving forwarded traffic from the client device; and processing the forwarded traffic according to policy, wherein the policy is determined based on one of a user of the client device and a type of the client device, each being determined based on the SIM card.
    Type: Grant
    Filed: March 8, 2021
    Date of Patent: February 28, 2023
    Assignee: Zscaler, Inc.
    Inventor: Nathan Howe
  • Patent number: 11593084
    Abstract: A method includes receiving code for computer programming, analyzing the code and extracting a plurality of configuration properties from the code. In the method, one or more configuration files are generated from the extracted plurality of configuration properties, and microservice code is generated from the one or more configuration files. The microservice code is configured for deployment on one or more cloud computing platforms.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: February 28, 2023
    Assignee: Dell Products L.P.
    Inventors: Hung Dinh, Rajesh Krishnan, Pallavi Jaini, Puttaraju Chikkanna, Nikhil Reddy Kota, Madhu Chilipi, Venkat S. Ramachandran, Navin Kumar, Nithiyanandham Tamilselvan, Naga Kalyan Kambapu, Desai Yarlagadda, Lakshmi Prasad Banala, Shubham Gupta, Reddeppa Kollu, Sabu K. Syed, Anubhab Mohanty, Vibhor Sharma, Md Shadab Ali
  • Patent number: 11595352
    Abstract: The devices and methods relate to web categorization of web requests. The devices and methods may perform a two-step classification of the web requests. The first classification may provide potential web categories for web request based on a fully qualified domain name (FQDN) of the web request. The first classification may be used to determine whether transport layer security (TLS) termination may be performed on the web request. The second classification may provide a web category for a uniform resource locator (URL) of the web request after performing the TLS termination. The web category may be used by a firewall in filtering web traffic for the web request.
    Type: Grant
    Filed: December 21, 2020
    Date of Patent: February 28, 2023
    Inventors: Suren Jamiyanaa, Yair Tor, Sudharsan Balakrishnan Sripadham, Daniel Manesku, Andrey Terentyev, Murali Krishna Sangubhatla
  • Patent number: 11588828
    Abstract: Systems and methods are provided for automated retrieval, processing, and/or distribution of cyber-threat information using a cyber-threat device. Consistent with disclosed embodiments, the cyber-threat device may receive cyber-threat information in first formats from internal sources of cyber-threat information using an accessing component of the cyber-threat device. The cyber-threat device may receive cyber-threat information second formats from external sources of cyber-threat information using an accessing component of the cyber-threat device. The cyber-threat device may process the received cyber-threat information in the first formats and the second formats into a standard format using a processing component of the cyber-threat device. The cyber-threat device may provide the processed items of cyber-threat information to a distributor using a distributing component of the cyber-threat device.
    Type: Grant
    Filed: February 24, 2020
    Date of Patent: February 21, 2023
    Assignee: Capital One Services, LLC
    Inventor: Nathan Weilbacher
  • Patent number: 11588850
    Abstract: Malicious attacks by certain devices against a radio access network (RAN) can be detected and mitigated, while allowing communication of priority messages. A security management component (SMC) can determine whether a malicious attack against the RAN is occurring based on a defined baseline that indicates whether a malicious attack is occurring. The defined baseline is determined based on respective characteristics associated with respective devices that are determined based on analysis of information relating to the devices. In response to determining there is a malicious attack, SMC determines whether to block connections of devices to the RAN based on respective priority levels associated with respective messages being communicated by the devices.
    Type: Grant
    Filed: April 13, 2020
    Date of Patent: February 21, 2023
    Inventors: Deon Ogle, Yaron Koral, Cagatay Buyukkoc, Nicholas Arconati, Jitendra Patel, Bogdan Ungureanu
  • Patent number: 11586738
    Abstract: Systems and methods for evaluating security risks using a manufacturer-signed software identification manifest are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive a request to perform attestation of a client device; retrieve, from an agent executed by the client device, a manifest comprising: (i) a signature portion encrypted with a first key, and (ii) a software identification (SWID) portion encrypted with a second key; retrieve the first key from a manufacturer database; retrieve the second key from a customer database; decrypt the signature and the manifest with the first and second keys; and perform the attestation using the decrypted manifest.
    Type: Grant
    Filed: December 3, 2020
    Date of Patent: February 21, 2023
    Assignee: Dell Products, L.P.
    Inventors: Charles D. Robison, Nicholas D. Grobelny