Particular Node (e.g., Gateway, Bridge, Router, Etc.) For Directing Data And Applying Cryptography Patents (Class 713/153)
-
Patent number: 11503079Abstract: Apparatus to enforce network policy based on identity authentication at a network endpoint device by offloading the authentication to a network attached authentication devices is disclosed. The authentication device may use Statistical Object Identification to perform the authentication. The present disclosure greatly reduces the resources needed by the network endpoint device to perform the authentication and eliminates the topological restrictions found in traditional network appliance based approaches.Type: GrantFiled: June 21, 2021Date of Patent: November 15, 2022Assignee: Blue Armor Technologies, LLCInventors: John William Hayes, Charles Andrew Gram
-
Patent number: 11496504Abstract: A network device may receive a first data packet. The network device may determine that a level of available computing resources satisfies a threshold level. The network device may perform a secure socket layer (SSL) proxy function based on the level of available computing resources satisfying the threshold level. The network device may receive a second data packet. The network device may determine that the level of available computing resources fails to satisfy the threshold level. The network device may determine a security characteristic associated with the second data packet. The network device may determine a security rating associated with the second data packet based on the security characteristic. The network device may selectively perform the SSL proxy function based on the security rating.Type: GrantFiled: May 27, 2020Date of Patent: November 8, 2022Assignee: Juniper Networks, Inc.Inventors: Sarvesh K. Batta, Thyagarajan S. Pasupathy, Mohan Thangavel
-
Patent number: 11489821Abstract: Aspects of the invention include receiving a request from a responder channel on a responder node to initiate a secure communication with an initiator channel on an initiator node. The request includes an identifier of a shared key, and a nonce and security parameter index generated by the initiator node for the secure communication. The receiving is at a local key manager (LKM) executing on the responder node. A security association is created at the LKM between the initiator node and the responder node. The shared key is obtained based at least in part on the identifier of the shared key. Based on obtaining the shared key, a message requesting initialization of the secure communication between the responder channel and the initiator channel is built. The message includes an initiator nonce and an initiator security parameter index generated by the LKM for the secure communication.Type: GrantFiled: February 26, 2020Date of Patent: November 1, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mooheng Zee, Richard Mark Sczepczenski
-
Patent number: 11487251Abstract: A system for detecting and responding to an anomaly in a chaotic environment, comprising one or more autonomous agent devices and a central server comprising a processor and non-transitory memory.Type: GrantFiled: December 16, 2020Date of Patent: November 1, 2022Assignee: Morgan Stanley Services Group Inc.Inventors: Kesavanand Muraleedhara, Ahmed Jedda, Paulo Pinto
-
Patent number: 11481282Abstract: A method of fault-tolerant process control includes providing a network process control system in an industrial processing facility (IPF) including a plant-wide network coupling a server to computing platforms each including computing hardware and memory hosting a software application for simultaneously supporting a process controller and another process controller or an I/O gateway. The computing platforms are coupled together by a private path redundancy network for providing a hardware resource pool. At least some of the computing platforms are directly coupled by an I/O mesh network to a plurality of I/O devices to field devices that are coupled to processing equipment. Upon detecting at least one failing device in the hardware resource pool, over the private path redundancy network a backup is placed into service for the failing device from the another process controller or I/O gateway that is at another of the computing platforms in the hardware resource pool.Type: GrantFiled: July 3, 2019Date of Patent: October 25, 2022Assignee: Honeywell International Inc.Inventors: Paul Francis McLaughlin, Jason Thomas Urso, James Michael Schreder, John Rosa-Bian, Norman Swanson, Jethro F. Steinman
-
Patent number: 11483296Abstract: A hardware security accelerator includes a configurable parser that is configured to receive a packet and to extract from the packet headers associated with a set of protocols. The security accelerator also includes a packet type detection unit to determine a type of the packet in response to the set of protocols and to generate a packet type identifier indicative of the type of the packet. A configurable security unit includes a configuration unit and a configurable security engine. The configuration unit configures the configurable security engine according to the type of the packet and to content of at least one of the headers extracted from the packet. The configurable security engine performs security processing of the packet to provide at least one security result.Type: GrantFiled: June 30, 2020Date of Patent: October 25, 2022Assignee: Amazon Technologies, Inc.Inventors: Ron Diamant, Nafea Bshara, Leah Shalev, Erez Izenberg
-
Patent number: 11477644Abstract: Aspects of the subject disclosure may include, for example, a network API service makes multiple APIs available for guidance and control. The network API service may collect low-level network data related to network elements in access networks and core networks and analyze the low-level network data to create application-level metrics in response to API requests. Other embodiments are disclosed.Type: GrantFiled: November 30, 2020Date of Patent: October 18, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Abhigyan Sharma Abhigyan, Gnanavelkandan Kathirvel, John Craig, Paul Carver
-
Patent number: 11477128Abstract: Apparatus and methods are disclosed for implementing bandwidth throttling to regulate network traffic as can be used in, for example, vulnerability scanning and detection applications in a computer network environment. According to one embodiment, a method of routing network packets in a networked device having plural network interfaces combines applying traffic class and network interface throttling for marking network packets with a differentiated service code based on input received from a profiler application, throttling the bandwidth of network packets based on a threshold for a designated network interface for the packet, throttling the bandwidth of the bandwidth-throttled packets based on a threshold for its respective differentiated service code, and emitting network packets on each respective designated network interface.Type: GrantFiled: April 10, 2020Date of Patent: October 18, 2022Assignee: Tripwire, Inc.Inventors: Chris Pawlukowsky, Ian Turner, Mike Appleby
-
Patent number: 11477182Abstract: A key management protocol (such as KMIP) is extended to provide an extended credential type that enables an initiating (first) client device to create a credential dynamically and that can then be selectively shared with and used by other (second) client devices. Using a dynamically-created credential of this type, the other (second) devices are able to fetch the same key configured by the initiating (first) device. In this manner, multiple devices are able to create and share one or more keys among themselves dynamically, and on as-needed basis without requiring a human administrator to create a credential for a device group in advance of its usage.Type: GrantFiled: May 7, 2019Date of Patent: October 18, 2022Assignee: International Business Machines CorporationInventors: Rinkesh I. Bansal, Mohit Niranjan Agrawal, Prashant V. Mestri
-
Patent number: 11477010Abstract: The present embodiments relate to systems and methods for using a blockchain to record information related to the lifecycle of a vehicle associated with a Vehicle Identification Number (VIN). For example, the VIN lifecycle process may be used to develop safety-feature based insurance models. The systems and methods may include calculating a safety rating for a safety feature based upon data accessed at a blockchain. The safety rating may be used to generate a product associated with a new vehicle type, such as an insurance product covering the new vehicle type. The systems and methods described herein may allow for using a blockchain which gives the option for private information, and permissioned participants in the blockchain. In particular, the systems and methods may allow for a distributed consensus amongst businesses, consumers, and authorities, as to the validity of information and transactions stored on the blockchain.Type: GrantFiled: September 11, 2020Date of Patent: October 18, 2022Assignee: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANYInventors: William J. Leise, Douglas A. Graff, Stacie A. McCullough, Shawn M. Call, Eric Bellas, Jaime Skaggs, Jacob J. Alt, Eric R. Moore, Vicki King
-
Patent number: 11477261Abstract: A method and system for rendering electronic content is provided. The method includes: receiving a request for electronic content; retrieving browser data associated with a browser configured to render the electronic content; determining a nature of the electronic content; reviewing the browser data in relation to the nature of the electronic content to determine whether the browser supports the electronic content; and if the browser supports the electronic content, transmitting the electronic content supported by the browser. The system includes: a connection module configured to receive a request for electronic content; a browser module configured to retrieve browser data; a content module configured to determine a nature associated with the electronic content; a rendering module configured to review the browser data in relation to the nature of the electronic content to determine whether the browser supports the electronic content.Type: GrantFiled: December 3, 2014Date of Patent: October 18, 2022Assignee: D2L CorporationInventors: David Lockhart, Nicholas Dingle, Pablo Lleras
-
Patent number: 11467885Abstract: Technologies for processing network packets a compute device with a network interface controller (NIC) that includes a host interface, a packet processor, and a network interface. The host interface is configured to receive a transaction from the compute engine, wherein the transaction includes latency-sensitive data, determine a context of the latency-sensitive data, and verify the latency-sensitive data against one or more server policies as a function of the determined context. The packet processor is configured to identify a trust associated with the latency-sensitive data, determine whether to verify the latency-sensitive data against one or more network policies as a function of the identified trust, apply the one or more network policies, and encapsulate the latency-sensitive data into a network packet. The network interface is configured to transmit the network packet via an associated Ethernet port of the NIC. Other embodiments are described herein.Type: GrantFiled: December 30, 2017Date of Patent: October 11, 2022Assignee: Intel CorporationInventors: Ronen Hyatt, Mark Debbage
-
Patent number: 11469915Abstract: Technologies include a network switch configured to perform packet replication. The network switch includes a network communicator, an entity manager, and a tag manager. The network communicator is to receive a data packet, and the entity manger is to identify an entity associated with the data packet and determine a tag associated with the entity. Additionally, the tag manager is to determine a packet replication configuration associated with the tag, and perform one or more per-port forwarding actions based on the packet replication configuration. The packet replication configuration includes one or more destination ports to be masked and a number of copies to be replicated to be sent out on of at least one destination port.Type: GrantFiled: June 12, 2018Date of Patent: October 11, 2022Assignee: Intel CorporationInventors: Grzegorz Jereczek, Amruth Gouda Parameshwarappa, Christopher Edmiston, Maciej Andrzej Koprowski
-
Patent number: 11461475Abstract: An electronic device including a secure Integrated Circuit (IC) is provided. The electronic device includes a secure IC configured as a System-on-Chip (SoC) and configured to provide a general environment and a security environment, wherein the secure IC includes a main processor configured to operate in the general environment, a secure processor configured to operate in the security environment and control security of data using a first security key, and a secure memory configured to be operatively connected to the secure processor and store a second security key corresponding to the first security key. Various other embodiments are possible.Type: GrantFiled: March 11, 2020Date of Patent: October 4, 2022Assignee: Samsung Electronics Co., Ltd.Inventors: Bumhan Kim, Sunjune Kong, Seongjin Cho
-
Patent number: 11461477Abstract: An example method includes initializing, by an obfuscation computing system, communications with nodes in a distributed computing platform, the nodes including one or more compute nodes and a controller node, and performing at least one of: (a) code-level obfuscation for the distributed computing platform to obfuscate interactions between an external user computing system and the nodes, wherein performing the code-level obfuscation comprises obfuscating data associated with one or more commands provided by the user computing system and sending one or more obfuscated commands to at least one of the nodes in the distributed computing platform; or (b) system-level obfuscation for the distributed computing platform, wherein performing the system-level obfuscation comprises at least one of obfuscating system management tasks that are performed to manage the nodes or obfuscating network traffic data that is exchanged between the nodes.Type: GrantFiled: April 2, 2020Date of Patent: October 4, 2022Assignee: Architecture Technology CorporationInventors: Judson Powers, Robert A. Joyce, Scott Aloisio, Matthew A. Stillerman
-
Patent number: 11455412Abstract: This disclosure provides enhanced management of access rights for dynamic groups of users sharing secret data. Instead of relying on traditional administrative techniques for modifying access rights for stored data, the techniques disclosed herein allow a storage service to communicate with a group management system to verify membership of user groups, e.g., channels, chat session, or meetings, and automatically change access rights to stored data as users leave or join a group. Encrypted data can be stored within a storage vault. The storage vault can be dedicated to storing encrypted data shared between a user group, e.g. a channel. A server managing the storage vault can receive membership data from a group management service. As users join the group or leave a group managed by the group management service, each user's access permissions to the storage vault can be added, removed or modified.Type: GrantFiled: December 3, 2019Date of Patent: September 27, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Alexander Weiss, Eric Scott Albright, Dustyn J. Tubbs, Paresh Lukka, Andrew V. Spiziri, Lawrence Fubini Waldman
-
Patent number: 11456861Abstract: A computing system may include a client device configured to remotely access virtual computing sessions, and a virtual delivery appliance configured to connect the client device to the virtual computing sessions. The client device and the virtual delivery appliance may share a symmetric encryption key and encrypt data communications exchanged therebetween with the symmetric encryption key. The system may further include a gateway appliance configured to relay the encrypted communications between the client device and the virtual delivery appliance, the gateway appliance not having the symmetric key and being unable to decrypt the encrypted communications relayed between the virtual delivery appliance and the client device.Type: GrantFiled: May 20, 2020Date of Patent: September 27, 2022Assignee: CITRIX SYSTEMS, INC.Inventors: Georgy Momchilov, Hubert Divoux, Roberto Valdes
-
Patent number: 11456860Abstract: A method may include establishing a transport layer session between a gateway appliance and at least one virtual delivery appliance, establishing a presentation layer session between the gateway appliance and the at least one virtual delivery appliance via the transport layer session, and establishing a connection lease exchange tunnel between the gateway appliance and the at least one virtual delivery appliance via the presentation layer session. The method further include receiving, at the at least one virtual delivery appliance, a connection lease from a client device via the gateway appliance through the connection lease exchange tunnel and validating the connection lease, and issuing a resource connection ticket at the at least one virtual delivery appliance to the client device through the connection lease exchange tunnel responsive to the validation.Type: GrantFiled: May 19, 2020Date of Patent: September 27, 2022Assignee: CITRIX SYSTEMS, INC.Inventors: Georgy Momchilov, Hubert Divoux, Roberto Valdes
-
Patent number: 11449333Abstract: An apparatus, and a method, performed by one or more processors are disclosed. The method may comprise receiving a build request associated with performing an external data processing task on a first data set, the first data set being stored in memory associated with a data processing platform to be performed at a system external to the data processing platform. The method may also comprise generating a task identifier for the data processing task, and providing, in association with the task identifier, the first data set to an agent associated with the external system with an indication of the data processing task, the agent being arranged to cause performance of the task at the external system, to receive a second data set resulting from performance of the task, and to provide the second data set and associated metadata indicative of the transformation.Type: GrantFiled: June 12, 2020Date of Patent: September 20, 2022Assignee: Palantir Technologies Inc.Inventors: Audrey Kuan, Andrew Kaier, Eric Lee, Jasjit Grewal, Mark Elliot, Nitish Kulkarni, Robert Fink, Samuel Rogerson, Thomas Pearson, Thomas Powell, Lawrence Manning, Corey Garvey
-
Patent number: 11451640Abstract: A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both.Type: GrantFiled: May 3, 2020Date of Patent: September 20, 2022Assignee: BRIGHT DATA LTD.Inventors: Derry Shribman, Ofer Vilenski
-
Patent number: 11449915Abstract: Provided herein are system, apparatus, device, method and/or computer program product embodiments, and/or combinations and sub-combinations thereof, for identifying second products in an inventory of a second ecommerce site that are at least similar to a first product currently being displayed to an user by a first ecommerce site, and displaying the second products for viewing and purchase by the user at the first ecommerce site.Type: GrantFiled: March 19, 2019Date of Patent: September 20, 2022Assignee: MERCARI, INC.Inventors: Dani Arnaout, Jihad Kawas
-
Patent number: 11451385Abstract: A device generates a biometric public key for an individual based on both the individual's biometric data and a secret S, in a manner that verifiably characterizes both while tending to prevent recovery of either. The biometric data has a Sparse Representation and is encoded in a manner to include a component of noise, such that it is challenging to identify which locations are actually encoded features. Accordingly, the biometric data are encoded as a vector by choosing marker at locations where features are present and, where features are not present, choosing noisy data. The noisy data may be chaff bit values selected collectively from a group of (a) random values and (b) independent and identically distributed values. The biometric public key may be later used to authenticate a subject purporting to be the individual, using a computing facility that need not rely on a hardware root of trust.Type: GrantFiled: January 29, 2020Date of Patent: September 20, 2022Assignee: Badge Inc.Inventors: Charles H. Herder, III, Tina P. Srivastava
-
Patent number: 11451846Abstract: A method of transmitting entitlement messages to content consumption devices in a access control system, the method comprising periodically transmitting entitlement messages to content consumption devices in a access control system and periodically extending an expiry time comprised in the entitlement messages. The entitlement messages comprise indicator data indicating to the content consumption devices that subsequent entitlement messages loaded into a content consumption device after a first entitlement message is loaded into the content consumption device shall not be used by the content consumption device to access protected media content.Type: GrantFiled: June 25, 2021Date of Patent: September 20, 2022Assignee: NAGRAVISION S.A.Inventors: Didier Hunacek, Jean-Bernard Fischer
-
Patent number: 11451564Abstract: A method for disrupting a detected cyberthreat can include receiving a request, the request identifying suspected malicious content; identifying one or more indicators of compromise (IOCs) associated with the content; enriching the request with the IOCs; verifying the request; and reporting the verified request and the one or more IOCs to a disruption network.Type: GrantFiled: September 21, 2021Date of Patent: September 20, 2022Assignee: ZeroFOX, Inc.Inventors: Samuel Kevin Small, Michael Morgan Price, Jason Emile Sumpter, James Christopher Foster
-
Patent number: 11444911Abstract: Domain name system (DNS) configuration during virtual private network (VPN) connection includes establishing a VPN tunnel between a client device and a VPN system entry server, which includes configuring a first DNS server as an operative DNS server for the VPN tunnel, and obtaining first content by transmitting to the VPN entry server, a first request that identifies a first external source for the first content, receiving from the VPN entry server a DNS configuration message indicating a second DNS server, configuring the second DNS server as the operative DNS server, and receiving from the VPN entry server, via the VPN tunnel, the first content, wherein the VPN entry server obtained the first content from the first VPN system exit server identified by the VPN entry server using the second DNS server, and the first VPN system exit server obtained the first content from the first external source.Type: GrantFiled: February 22, 2022Date of Patent: September 13, 2022Assignee: Oversec, UABInventor: Lukas Baltrenas
-
Patent number: 11445022Abstract: A system and method is provided for service level agreement (SLA) based data storage and verification. According to one exemplary aspect, a method includes receiving, from a client device, a request to perform data verification of data relating to a file stored on a remote storage computer; accessing, by a processor, at least one SLA to determine a fault tolerance for the file stored on the remote storage computer; sending, by the processor to the remote storage computer, a request to store k derivatives of the file in the remote storage computer; and transmitting, to the client device, an indication of a location of the k derivatives of the file in the remote storage computer.Type: GrantFiled: December 18, 2019Date of Patent: September 13, 2022Assignee: Acronis International GmbHInventors: Alexander Tormasov, Stanislav S. Protasov, Serguei M. Beloussov
-
Patent number: 11444753Abstract: In some aspects, a cryptography method includes executing, by operation of a first computing device associated with a first entity, a first handshake process with a second entity according to a first handshake protocol to establish a first symmetric encryption key for a first encryption protocol; executing, by operation of the first computing device, a second handshake process with the second entity to establish a second symmetric encryption key for a second encryption protocol. Executing the second handshake process includes: generating second handshake data according to a second handshake protocol; encrypting the second handshake data using the first symmetric encryption key with the first encryption protocol; and sending the encrypted second handshake data to a second computing device associated with the second entity; and using the second symmetric encryption key and the second encryption protocol for single-encrypted communication over a communication channel between the first and second entities.Type: GrantFiled: March 9, 2022Date of Patent: September 13, 2022Assignee: ISARA CorporationInventors: Robert Williams, Alexander Truskovsky
-
Patent number: 11438325Abstract: One example method includes contacting, by a client, a service, receiving a credential from the service, obtaining trust information from a trust broker, comparing the credential with the trust information, and either connecting to the service if the credential and trust information match, or declining to connect to the service if the credential and the trust information do not match. Other than by way of the trust information obtained from the trust broker, the client may have no way to verify whether or not the service can be trusted.Type: GrantFiled: February 28, 2020Date of Patent: September 6, 2022Assignee: EMC IP Holding Company LLCInventors: Ido Begun, Jehuda Shemer
-
Patent number: 11431485Abstract: A system includes at least one processor to receive a second public key, a first random number, and a second random number, and store the second public key, the first random number, and the second random number in an installation record, perform key agreement with a first private key and the second public key to determine a MasterSecret, perform key expansion with the MasterSecret, the first random number, and the second random number to generate a client authentication key, a server authentication key, a client encryption key, and a server encryption key, and store the client authentication key, the server authentication key, the client encryption key, and the server encryption key and delete the MasterSecret.Type: GrantFiled: April 14, 2020Date of Patent: August 30, 2022Assignee: Aclara Technologies LLCInventor: Timothy Dierking
-
Patent number: 11431592Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.Type: GrantFiled: October 21, 2019Date of Patent: August 30, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Khawar Deen, Navindra Yadav, Anubhav Gupta, Shashidhar Gandham, Rohit Chandra Prasad, Abhishek Ranjan Singh, Shih-Chun Chang
-
Patent number: 11425061Abstract: Disclosed are a messaging system, apparatuses circuits and methods of operation thereof. A messaging client device is adapted to receive an impermanent message and to manage the received message in accordance with a message management policy associated with the message. An impermanent messaging server is adapted to validate said messaging client device as complying with message management policies prior to authorizing transmission of the message to said messaging client device.Type: GrantFiled: March 16, 2021Date of Patent: August 23, 2022Assignee: TigerConnect, Inc.Inventors: Andrew Brooks, Brad Brooks, Sumeet Bhatia, Jeffrey Evans
-
Patent number: 11416771Abstract: Mechanisms are provided for identifying risky user entitlements in an identity and access management (IAM) computing system. A self-learning peer group analysis (SLPGA) engine receives an IAM data set which specifies user attributes of users of computing resources and entitlements allocated to the users for accessing the computing resources. The SLPGA engine generates a user-entitlement matrix, performs a machine learning matrix decomposition operation on the user-entitlement matrix to identify excessive entitlement allocations, and performs a conditional entropy analysis of the user attributes and entitlements in the IAM data set to identify a set of user attributes for defining peer groups. The SLPGA engine performs a commonality analysis of user attributes and entitlements for each of one or more peer groups defined based on the set of user attributes, and identifies outlier entitlements based on the identification of the excessive entitlement allocations and results of the commonality analysis.Type: GrantFiled: November 11, 2019Date of Patent: August 16, 2022Assignee: International Business Machines CorporationInventors: Priti P. Patil, Kushaal Veijay, Ian M. Molloy
-
Patent number: 11418951Abstract: A method for identifying an encrypted data stream, a device, a readable storage medium and a system are provided.Type: GrantFiled: April 15, 2020Date of Patent: August 16, 2022Assignee: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.Inventor: Hai Tang
-
Patent number: 11416417Abstract: A method is provided that includes reading data in a storage medium, detecting, during the reading of the data in the storage medium, by a controller a change in an encryption/decryption scheme used to read and write the data in the storage medium, in response to detecting the change in encryption/decryption scheme in the data, causing, by the controller, a logical block address to return an indication of being written in zeros when a physical block address associated with the logical block address encrypted using an first encryption/decryption scheme, and causing, by the controller, a write channel to write zeroes using a second encryption/decryption scheme to the physical block address.Type: GrantFiled: May 18, 2020Date of Patent: August 16, 2022Assignee: Western Digital Technologies, Inc.Inventors: Darin Edward Gerhart, Cory Lappi, Daniel Robert Lipps, William Jared Walker
-
Patent number: 11418542Abstract: A system for providing network data processing, comprising a processor operating one of more algorithms that are configured to interface with one or more clients to receive a client hello data message. A transport layer security extension extraction system operating on the processor and configured to extract an extension from the client hello data message. A transport layer security extension identification system operating on the processor and configured to process the extension from the client hello data message and to identify a data networking session using the extension.Type: GrantFiled: January 23, 2020Date of Patent: August 16, 2022Assignee: FORCEPOINT LLCInventors: Jenny Anniina Heino, Tuomo Syvanne, Welf Christian Jalio, Olli-Pekka Niemi
-
Patent number: 11411953Abstract: In some embodiments, a secure local connection between a network node of a network and an edge device attached to the network node is provided by extending the security of the network to this local connection. The edge device attached to the network node communicates with a network manager of the network to obtain security keys and security credentials for the edge device. Using the security keys and the security credentials, the edge device can establish a secure channel between the network node and the edge device over the local connection. The edge device further communicates with the network manager to exchange routing information and to obtain a network address for the edge device. The edge device can then communicate, through the network node, with other network nodes in the network using the security keys, the security credentials, and the network address.Type: GrantFiled: May 5, 2020Date of Patent: August 9, 2022Assignee: LANDIS+GYR INNOVATIONS, INC.Inventor: Stephen John Chasko
-
Patent number: 11412066Abstract: A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both.Type: GrantFiled: May 3, 2020Date of Patent: August 9, 2022Assignee: BRIGHT DATA LTD.Inventors: Derry Shribman, Ofer Vilenski
-
Patent number: 11405179Abstract: This disclosure describes techniques that include performing cryptographic operations (encryption, decryption, generation of a message authentication code). Such techniques may involve the data processing unit performing any of multiple modes of encryption, decryption, and/or other cryptographic operation procedures or standards, including, Advanced Encryption Standard (AES) cryptographic operations. In some examples, the security block is implemented as a unified, multi-threaded, high-throughput encryption and decryption system for performing multiple modes of AES operations.Type: GrantFiled: March 15, 2021Date of Patent: August 2, 2022Assignee: Fungible, Inc.Inventors: Philip A. Thomas, Rajan Goyal, Eric Scot Swartzendruber
-
Patent number: 11397946Abstract: Systems and methods are provided for merchant mobile acceptance of user device data. For example, a method comprises receiving encrypted user device data and reader metadata from a merchant mobile device, determining a device reader API and device reader encryption scheme using the device reader metadata, parsing the encrypted user device data using the device reader API to determine encrypted personal information, and decrypting the encrypted personal information using the reader encryption scheme.Type: GrantFiled: May 30, 2018Date of Patent: July 26, 2022Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Avinash Kalgi, Qian Wang
-
Patent number: 11397805Abstract: A lateral movement path detector is disclosed. Data is gathered via programmatic access to a management service director through a REST API endpoint. The data is grouped into a graph having nodes of users, groups, and devices. The nodes coupled together via edges. A visualization of the graph is provided to illustrate lateral paths of the management service directory.Type: GrantFiled: May 9, 2019Date of Patent: July 26, 2022Assignee: Microsoft Technology Licensing, LLCInventor: Tal Joseph Maor
-
Patent number: 11398831Abstract: Temporal link encoding, including: identifying a data type of a data value to be transmitted; determining that the data type is included in one or more data types for temporal encoding; and transmitting the data value using temporal encoding.Type: GrantFiled: May 7, 2020Date of Patent: July 26, 2022Assignee: ADVANCED MICRO DEVICES, INC.Inventors: Onur Kayiran, Steven Raasch, Sergey Blagodurov, Jagadish B. Kotra
-
Patent number: 11394718Abstract: The resolving of a decentralized identifier to a corresponding data structure using multiple resolvers. This allows for the use of a consensus of resolvers to improve trust in the resolution process. In order to resolve, a decentralized identifier is sent to multiple resolvers. In response, each of at least some of those resolvers will return a data structure of a particular type (e.g., a decentralized identifier document) that is associated with the decentralized identifier. Then, it is determined whether the data structure for at least some number of resolvers matches each other. That is, it is determined whether at least some predetermined threshold of resolvers is returning the same data structure (e.g., the same decentralized identifier document). If so, then it is determined that the matching data structure is indeed associated with the decentralized identifier. Otherwise, the resolution process has failed.Type: GrantFiled: June 10, 2019Date of Patent: July 19, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Brandon Murdoch, Ankur Patel, Daniel James Buchner
-
Patent number: 11394764Abstract: Systems and methods for anonymously transmitting data in a network are provided, in which a request data structure is received by a network node from a client device. A first substructure containing personal data (PD) and a second substructure not containing PD are identified in the request data structure, by the network node. The first substructure is encrypted, by the network node, and is transmitted along with the second substructure to a server. A response data structure is received, by the network node, from the server. The first encrypted substructure and a third encrypted substructure are identified, by the network node, in the response data structure. The first encrypted substructure is decrypted, by the network node, and is transmitted along with the third encrypted substructure to the client device. The third encrypted substructure can be decrypted and viewed by the client device.Type: GrantFiled: September 17, 2020Date of Patent: July 19, 2022Assignee: AO Kaspersky LabInventors: Anton S. Lapushkin, Dmitry V. Shmoylov, Andrey V. Ladikov, Andrey A. Efremov
-
Patent number: 11394535Abstract: A computing system may include a plurality of Point of Presence computing devices (PoPs) configured to provide access to a computing network(s), and a plurality of gateway appliances. The gateway appliances may be configured to relay communications between client devices and virtual delivery appliances to provide the client devices with access to virtual sessions. The gateway appliances may route client device communications through the PoPs based upon gateway connection tickets, and may also generate the gateway connection tickets including a payload encrypted with a symmetric encryption key, and a plurality of different versions of the symmetric key encrypted with different public encryption keys of the PoPs. The PoPs may be further configured to use their private encryption keys to decrypt the encrypted symmetric key, use the decrypted symmetric key to decrypt the payload, and permit routing of the client communications based upon the decrypted payload of the gateway connection tickets.Type: GrantFiled: May 26, 2020Date of Patent: July 19, 2022Assignee: CITRIX SYSTEMS, INC.Inventors: Georgy Momchilov, Hubert Divoux, Roberto Valdes
-
Patent number: 11394532Abstract: According to one aspect, methods and systems are provided for modifying an encryption scheme in a database system. The methods and systems can include at least one internal database key; at least one database configured to be encrypted and decrypted using the at least one internal database key; a memory configured to store a master key; a key management server interface configured to communicate with a key management server; and a database application configured to receive, into the memory, the master key from the key management server via the key management server interface, and encrypt and decrypt the at least one internal database key using the master key.Type: GrantFiled: May 29, 2020Date of Patent: July 19, 2022Assignee: MongoDB, Inc.Inventors: Eliot Horowitz, Per Andreas Nilsson
-
Patent number: 11388594Abstract: A first wireless access device, associated with a wireless service provider, establishes a wireless local area network connection with a second wireless access device and receives a certificate including a unique identifier associated with the second wireless access device. The first wireless access device determines whether the second wireless access device is authorized to connect to the first wireless access device. For example, if the certificate is signed by a certificate authority associated with the wireless service provider and the unique identifier appears in a whitelist stored at the first wireless access device, the first wireless access device and the second wireless access device perform a mutual authentication procedure based on one or more ephemeral keys. The first wireless access device provides the second wireless access device with access to a wide area network based on successful completion of the mutual authentication procedure.Type: GrantFiled: November 14, 2018Date of Patent: July 12, 2022Assignee: Verizon Patent and Licensing Inc.Inventors: Warren Hojilla Uy, Young R. Choi, Samirkumar Patel
-
Patent number: 11388257Abstract: A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both.Type: GrantFiled: May 3, 2020Date of Patent: July 12, 2022Assignee: BRIGHT DATA LTD.Inventors: Derry Shribman, Ofer Vilenski
-
Patent number: 11388592Abstract: The present disclosure relates to methods and apparatus for flexible, security context management during AMF changes. One aspect of the disclosure is a mechanism for achieving backward security during AMF changes. Instead of passing the current NAS key to the target AMF, the source AMF derives a new NAS key, provides the new NAS key to the target AMF, and sends a key change indication to the UE, either directly or through some other network node. The UE can then derive the new NAS key from the old NAS key. In some embodiments, the AMF may provide a key generation parameter to the UE to use in deriving the new NAS key. In other embodiments, the target AMF may change one or more security algorithms.Type: GrantFiled: December 13, 2019Date of Patent: July 12, 2022Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Noamen Ben Henda, Christine Jost, Karl Norrman, Monica Wifvesson
-
Patent number: 11381548Abstract: A node system implements a method for node relay communication. A description of a flow entry including an address in a flow and a private key is received. The flow entry and the private key are stored in a database indexed to a flow ID. A packet comprising an authentication code and packet data including packet sequence information and a Flow ID is received. A look up in the database of a flow entry corresponding to the Flow ID of the packet is performed. The packet is either ignored or forwarded to the address in the flow, depending on the result of the look-up.Type: GrantFiled: December 28, 2020Date of Patent: July 5, 2022Assignee: NETWORK NEXT, INC.Inventor: Glenn Alexander Fiedler
-
Patent number: 11369869Abstract: A game controller includes a first handle body. The first handle body includes a first operation interface, a first connection portion, a first control circuit, a first battery, and a first communication module. The first operation interface is electrically connected to the first connection portion. The first communication module includes a first wireless communication circuit and a first wired communication circuit. The first control circuit is electrically connected to the first communication module, the first battery, the first operation interface and the first connection portion. The first mobile device is disposed at a side of the first handle body. When the first mobile device is electrically connected to the first connection portion of the first handle body, the first control circuit turns on the first wired communication circuit of the first communication module to communicate with the first mobile device by the first connection portion.Type: GrantFiled: May 5, 2021Date of Patent: June 28, 2022Assignee: DEXIN CORPORATIONInventor: Ho-Lung Lu