System Access Control Based On User Identification By Cryptography Patents (Class 713/182)
-
Patent number: 12058114Abstract: Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.Type: GrantFiled: September 30, 2021Date of Patent: August 6, 2024Assignee: ESW Holdings, Inc.Inventors: Michael Sprague, Steven Sprague, Robert Thibadeau
-
Patent number: 12051055Abstract: This application relates to a financial payment method using biometric information, in which biometric information of an individual collected in a mobile device of an affiliated member is transmitted to a mobile device of the individual to allow the biometric information to be authenticated in the mobile device of the individual. After the authentication of the biometric information, a substitute key that corresponds to a card password preset by the individual is inputted, and a financial payment is requested based on the payment content.Type: GrantFiled: November 9, 2021Date of Patent: July 30, 2024Assignee: Ghost Pass Inc.Inventors: Seon Gwan Lee, Jun Young Kwon
-
Patent number: 12052366Abstract: A client device determines that a telephony outage is occurring. The client device connects to an on-premises telephony node using an encrypted password at the client device. The client device accesses a set of telephony services via the on-premises telephony node.Type: GrantFiled: October 29, 2021Date of Patent: July 30, 2024Assignee: Zoom Video Communications, Inc.Inventor: George Thomas
-
Patent number: 12052224Abstract: A system, method, and computer-readable medium are disclosed for performing a data center connectivity management operation. The connectivity management operation includes: providing a data center asset with a data center asset client module; establishing a connection between an end user device browser and a connectivity management system, the connectivity management system comprising a connectivity management system aggregator; submitting a request to the connectivity management system via the end user device browser to establish connectivity with the data center asset client module; establishing a connection between the data center asset client module and the connectivity management system based upon the request; and, exchanging information between the data center asset client module and the data connectivity management system via the secure communication channel between the data center asset client module and the connectivity management system aggregator.Type: GrantFiled: April 26, 2022Date of Patent: July 30, 2024Assignee: Dell Products L.P.Inventors: Christopher Atkinson, Elie A. Jreij, Dominique Prunier, Eric Williams, Michael E. Brown
-
Patent number: 12052384Abstract: A multiple dwelling house interphone system includes a collective entrance machine and a dwelling room master device. Each automatic door requires an unlock operation to pass through for proceeding to each area, and a part of the areas are occupied by facilities other than dwelling units. The collective entrance machine includes a card information input section, and the automatic doors each include an unlock operation section for unlocking using the card medium. The collective entrance machine further includes a card authentication section, an unlocking door storage section, and a card information storage section. The card authentication section permits the unlocking by the card medium when the information input to the card information input section matches the information registered in the card information storage section. The permitted card medium enables unlocking the automatic door stored in the unlocking door storage section in association with the information of the card medium.Type: GrantFiled: March 23, 2022Date of Patent: July 30, 2024Assignee: Aiphone Co., Ltd.Inventors: Yuta Shimomura, Masashi Hattori, Ryoji Uno, Kimiaki Fujishima
-
Patent number: 12038984Abstract: Aspects of the disclosure relate to using a machine learning system to process a corpus of documents associated with a user to determine a user-specific consequence index. A computing platform may load a corpus of documents associated with a user. Subsequently, the computing platform may create a first plurality of smart groups based on the corpus of documents, and then may generate a first user interface comprising a representation of the first plurality of smart groups. Next, the computing platform may receive user input applying one or more labels to a plurality of documents associated with at least one smart group. Subsequently, the computing platform may create a second plurality of smart groups based on the corpus of documents and the received user input. Then, the computing platform may generate a second user interface comprising a representation of the second plurality of smart groups.Type: GrantFiled: November 17, 2022Date of Patent: July 16, 2024Assignee: Proofpoint, Inc.Inventors: Daniel Wallace Rapp, Brian Sanford Jones, Spencer Bror Koehler
-
Patent number: 12001530Abstract: In an example embodiment, an efficient, automated method to generate password guesses is provided by leveraging online text sources along with natural language processing techniques. Specifically, semantic structures in passwords are exploited to aid system in generating better guesses. This not only helps cover instances where traditional password meters would indicate a password is safe when it is not, but also makes the solution robust against fast-evolving domains such as new slang in natural languages or new vocabulary arising from new products, product updates, and services.Type: GrantFiled: February 9, 2022Date of Patent: June 4, 2024Assignee: SAP SEInventors: Rocio Cabrera Lozoya, Slim Trabelsi, Carlos Rafael Ocanto Davila
-
Patent number: 11995197Abstract: In a method for encryption of sensitive data, an encrypted user private key is received in a Trusted Execution Environment (TEE) in a worker node in a container management system, the encrypted user private key being an encrypted version of a user private key for decrypting a message from a user in the container management system. The user private key is obtained in the TEE, and the encrypted user private key being decrypted into the user private key with a provider private key that is received from an encryption manager for managing the container management system. With these embodiments, the user private key may be transmitted to the worker node safely, such that the worker node may use the user private key to decrypt messages from the user. Therefore, the security level of the container management system may be increased.Type: GrantFiled: July 27, 2021Date of Patent: May 28, 2024Assignee: International Business Machines CorporationInventors: Qi Feng Huo, Yan Song Liu, Da Li Liu, Lei Li, Yuan Yuan Wang
-
Patent number: 11992753Abstract: A server device is connected through a network to a plurality of clients configured to participate in a virtual space, a synchronization target object in the virtual space being synchronized between clients of a synchronization group including a client that has ownership of the object and a client that does not have ownership of the object, and the server device includes: data reception means configured to receive a difference of the synchronization target object from the client that has ownership of the object; data update means configured to update replicas obtained by replicating the synchronization target object by using the difference; and data transmission means configured to transmit the difference to a client other than the client that has ownership among the plurality of clients.Type: GrantFiled: August 16, 2023Date of Patent: May 28, 2024Assignee: SOFTGEAR CO., LTD.Inventors: Kengo Aoki, Naoki Miyanaga
-
Patent number: 11995650Abstract: Provided is a method and system for verifying a virtual code based on a sphere. A method for verifying a virtual code based on a sphere includes: a virtual code reception operation of receiving, by a virtual code verifying means, a virtual code from a virtual code generating means, wherein the virtual code includes a fixed code and a plurality of detailed codes; a storage location search algorithm selection operation of determining, by the virtual code verifying means, a group, to which the virtual code generating means belongs, through the fixed code and selecting a storage location search algorithm for the group; a detailed code extraction operation of extracting, by the virtual code verifying means, the plurality of detailed codes included in the virtual code.Type: GrantFiled: February 8, 2021Date of Patent: May 28, 2024Assignee: SSENSTONE INC.Inventor: Chang Hun Yoo
-
Patent number: 11983974Abstract: Systems, computer program products, and methods are described herein for secure location and device access utilizing an ultra-wideband signal of a user device and a system device. The invention generally comprises determining that a user has entered a secure environment, wherein the secure environment comprises a safe-deposit box associated with the user, automatically generating a digital authentication key in response determining that the user has entered the secure environment, verifying the digital authentication key as being linked to the user, and transmitting instructions to a safe-deposit box to unlock and provide access during the scheduled session.Type: GrantFiled: May 13, 2022Date of Patent: May 14, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Puneetha Polasa, Hope Barus, Sandeep Kumar Chauhan, Ana Morales, Sandra Ogden, Lee Ann Proud
-
Patent number: 11971968Abstract: Electronic communication methods and systems for determining biometric events and annotating recorded information with indicia of the biometric events are disclosed. Exemplary methods and systems can further determine contexts within the recorded information and further annotate the recorded information with indicia of the context.Type: GrantFiled: June 10, 2021Date of Patent: April 30, 2024Assignee: Mitel Networks CorporationInventors: Tantri Tanisha, Logendra Naidoo, Hanumanthu Susmitha
-
Patent number: 11966747Abstract: A secure start system for an autonomous vehicle can include a communications router comprising an input interface to receive a boot-loader to enable network communications with a backend system. The secure start system utilizes a tunnel key from the backend system to establish a private communications session with a backend data vault. The secure start system then retrieves a set of decryption keys from the backend data vault, via the private communications session, to decrypt a plurality of encrypted drives of the autonomous vehicle, which enables one or more functions of the autonomous vehicle.Type: GrantFiled: January 11, 2021Date of Patent: April 23, 2024Assignee: UATC, LLCInventors: Christopher Valasek, Charles Miller
-
Patent number: 11961129Abstract: Systems and methods disclosed herein provide a geo-targeted online reservation system that ensures authenticity of customer devices requesting reservations by generating reservations only if threshold authentication conditions are satisfied. For example, a computing device registered with a server system receives inputs for requesting a reservation of a limited release product and for configuring the product. To authenticate the computing device, the server device transmits an electronic message to the computing device requesting the computing device to respond. A response to the message is one threshold authentication condition for generating the reservation. Upon determining that one or more threshold authentication conditions are satisfied, the server device generates a reservation for the product.Type: GrantFiled: March 30, 2022Date of Patent: April 16, 2024Assignee: adidas AGInventors: Gordon Gibson Lanpher, Roger Brandon Beaty, Jonathan Matthew Shaw, Katharine Reinhold, Ryan Robert O. Malia, Megan Murphy Millard, Simon Atkins, Todd Ames
-
Patent number: 11961048Abstract: A system and method for home security, and in particular to notifying residents of a home of a visitor's presence and providing an automatic assessment of the visitor's legitimacy, is disclosed. In one example, the system can be configured to automatically identify a logo worn by the visitor using optical recognition and generate a notification for the resident that identifies the company. In another example, the system can request presentation of an encrypted key that should be stored on the visitor's computing device. In another example, the system can query a database of scheduled services and determine if a person was requested or scheduled for a visit. In some embodiments, the system can assign a security token to the merchant which will be required at the time of the appointment.Type: GrantFiled: October 19, 2021Date of Patent: April 16, 2024Assignee: United Services Automobile Association (USAA)Inventor: Bradly Jay Billman
-
Patent number: 11962592Abstract: Novel tools and techniques might provide for implementing application, service, and/or content access control. Based at least in part on a consumer's choice of applications, services, content, and/or content providers—particular in exchange for a subsidy on content and/or network access fees provided to the consumer by chosen content providers—, a computing system may determine whether access to applications, services, and/or content not associated with the chosen content providers (“other content”) should be allowed or restricted. If restricted, the computing system might utilize various network access techniques and/or technologies to block the consumer's access to the other content, to allow access to the other content on a charge per access basis, or to allow access to the other content at reduced network access speeds. In some embodiments, an access provider (e.g., an Internet service provider, etc.) might perform both determination and implementation of content access and restriction.Type: GrantFiled: January 31, 2021Date of Patent: April 16, 2024Assignee: TIVO CORPORATIONInventors: Michael J. Fargano, Charles I. Cook, Kevin M. McBride, John T. Pugaczewski
-
Patent number: 11960579Abstract: Aspects of the disclosure relate to using smart glass and distributed ledger technology to provide secure authentication for digitally hand signing documents. Smart glasses worn by a customer may be activated via an application on a mobile device. The smart glasses may then scan the document and a biometric feature of the customer. The captured biometric feature and document content may be stored on a distributed ledger system. Based on the information stored on the distributed ledger, a unique binary code may be generated. The binary code may be converted into an image and shared with the mobile application. The image may then be embedded into the document as a digital hand signature. The document and the embedded image may be submitted to nodes of the distributed ledger for authentication of the digital hand signature.Type: GrantFiled: February 17, 2022Date of Patent: April 16, 2024Assignee: Bank of America CorporationInventors: Nimish Ravindra Deshpande, Jyoti Kumar, Kumari Priya
-
Patent number: 11956231Abstract: Various implementations disclosed herein include devices, systems, and methods that provide authority transfer of a virtual object in a shared CGR environment. In some implementations, at a first electronic device associated with a first owner having authority to transmit state updates of a virtual object, a state update is transmitted to one or more peers participating in the shared CGR environment associated with the current state of the virtual object by the first electronic device. In some implementations, a handoff message is transmitted to indicate that ownership of the virtual object is being handed off. Then, an acquisition message transmitted by a second electronic device associated with a second owner indicates ownership acquisition of the virtual object by the second owner. The first electronic device accepts state updates of the virtual object transmitted from the second owner based on receiving the acquisition message.Type: GrantFiled: May 21, 2020Date of Patent: April 9, 2024Assignee: Apple Inc.Inventors: Igor L. Gorelik, Courtland M. Idstrom, Pablo P. Cheng, Yasser Rihan
-
Patent number: 11947635Abstract: An objective of the present invention is to achieve greater efficiency in searches for illegal (illegitimate) content. The illegitimate content relates to content posted by an unauthorized user without a legitimate ownership of the content. An illegitimate content search device according to the present invention comprises: a content profile acquisition part for acquiring a profile including a posting history of illegitimate content posted by a user having posted candidate content being potentially illegitimate content; and a matching priority calculation part for calculating, on the basis of the profile, the priority of the candidate content with regard to determining whether a plurality of pieces of content is illegitimate content, and elevating the priority of the illegitimate content with a history of having posted the illegitimate content higher than if content without the history.Type: GrantFiled: February 27, 2019Date of Patent: April 2, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Hiroko Muto, Takahito Kawanishi, Osamu Yoshioka, Ryo Kitahara
-
Patent number: 11943619Abstract: The presently claimed disclosure is directed to methods that may be implemented at a computer. Methods and systems consistent with the present disclosure may include extending protocols associated with authenticating client (i.e. supplicant) devices and with authorizing those supplicant devices to access a wireless network. These methods may include sending data relating to the failure of an authentication and/or an authorization process to a supplicant device attempting to access a wireless network. Methods discussed within may include securely sending failure codes or reasons to a supplicant device that identify why an authentication or authorization process failed. These methods may include sending messages between a supplicant device, an authenticator device, and an authentication and authorization server. After a first failure, the supplicant device may be able to access the wireless network after a reason or code of that failure has been reported to the supplicant device.Type: GrantFiled: July 29, 2021Date of Patent: March 26, 2024Assignee: Cisco Technology, Inc.Inventors: Jerome Henry, Bart Brinckman, Mark Grayson
-
Patent number: 11936528Abstract: A server of a distributed computing system that is at least partially hosted on a particular access network receives a plurality of messages from a plurality of devices over a network, each of the messages associated with a corresponding source address. For each of the plurality of devices, a current access network is determined for the device. For each of the devices with a current access network being the particular access network, a first network policy is applied to the device. For each of the devices with a current access network being other than the particular access network, a second network policy is applied to the device, the second network policy defining a second encryption requirement.Type: GrantFiled: February 24, 2023Date of Patent: March 19, 2024Assignee: iboss, Inc.Inventors: Paul Michael Martini, Peter Anthony Martini
-
Patent number: 11937080Abstract: A method for updating network access application authentication information applicable to a terminal having an embedded universal integrated circuit card (eUICC) that has at least one profile. The method includes receiving, by the terminal, a first message from a remote server, where the first message includes network access application (NAA) authentication parameter update information and a first identifier, updating, by the terminal, authentication information of a profile corresponding to the first identifier based on the NAA authentication parameter update information, and detaching, by the terminal, from a network and re-attaching to the network based on updated authentication information of the profile.Type: GrantFiled: July 28, 2017Date of Patent: March 19, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Xiaobo Yu, Shuiping Long, Linyi Gao
-
Patent number: 11928311Abstract: The present application discloses a communication method, a terminal, a server, a communication system, a computer device and a medium. The communication method includes that a server establishes a connection and feeds back a display control in response to requests of a first terminal and a second terminal; then, the server feeds back function feedback information in response to a function request of the first terminal, and feeds back function feedback information in response to a menu request of the second terminal; and the servers presents multiple interface components and maintains and updates each interface component in response to management operation of a third user.Type: GrantFiled: June 24, 2021Date of Patent: March 12, 2024Assignees: Beijing Zhongxiangying Technology Co., Ltd., BOE Technology Group Co., Ltd.Inventors: Ming Ding, Li Ma, Yang Wu, Wanwan Tang, Dachuan Wang, Hong Wang, Guangyu Shao, Chaozheng Liu
-
Patent number: 11928368Abstract: A control method for controlling a second server apparatus configured to communicate with a first server apparatus and store a program is provided. The first server apparatus is configured to provide a file sharing service. The program provides a function for printing a file having been uploaded to the first server apparatus. The control method includes: acquiring network information of an information processing apparatus accessing the first server apparatus; selecting, based on the acquired network information, a piece of printer information from among pieces of printer information; and performing control for causing the information processing apparatus to display an object displaying the selected piece of printer information and configured for receiving a selection of printer information from among the pieces of printer information.Type: GrantFiled: December 7, 2022Date of Patent: March 12, 2024Assignee: Canon Kabushiki KaishaInventor: Hiroaki Hanai
-
Patent number: 11916906Abstract: A system includes an identity authentication system interface operatively coupled to a computerized network for receiving identity information over the computerized network. An identity authentication tool operatively coupled to the identity authentication system interface that receives, from the identity authentication system interface, a request to authenticate an identity; information pertaining to the user; information pertaining to the user; a collected electronic signature representation of a user; and a private information indicator from the user device. The identity authentication tool determines an indication of whether the user information matches user information stored by the identity authentication tool; and the private information indicator from the user device indicates that the user's private information was verified. An indication that the identity was verified or not verified is output by the identity authentication tool.Type: GrantFiled: March 9, 2021Date of Patent: February 27, 2024Assignee: Acuant, Inc.Inventors: Jose Caldera, Kieran Gerard Sherlock
-
Patent number: 11907356Abstract: A system, method, and computer-readable recording media for a user account secure with a single sign on (SSO) password hidden authentication. Receiving credential information (CI) and generating the SSO password through at least one client device (CD). Encrypting the SSO password. Storing the SSO password in the CD and an electronic device (ED). Transmit the SSO password and encrypted SSO password to a cloud services platform (CSP), where the CSP stores both. Storing the SSO password in a cloud server (CS). Accessing the user account, if SSO password is unavailable, through the CSP transmitting a one time passcode to a user email, the CD setting a temporary password transferred to the CSP. The CSP confirming a match and transmitting the encrypted SSO password to the CD, the CD decrypting the encrypted SSO password and resetting the temporary password to the SSO password.Type: GrantFiled: January 7, 2021Date of Patent: February 20, 2024Assignee: ARRIS ENTERPRISES LLCInventors: Jalagandeswari Ganapathy, Muralidharan Narayanan, David Brumbaugh
-
Patent number: 11907362Abstract: In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user, and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine it the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.Type: GrantFiled: May 1, 2020Date of Patent: February 20, 2024Assignee: MAfee, LLCInventors: Steve Grobman, Carl Woodward, James D. Beaney, Jr., Jimmy Scott Raynor
-
Patent number: 11900380Abstract: Described herein is a system in which an electronic record is stored within a distributed environment. In this system, a validation node may receive a transaction record from an acceptance node. The validation node may verify that the acceptance node is authorized 5 to participate in a blockchain network, identify a user associated with the transaction record, and append the transaction record to an electronic record. The transaction record may be associated with a digital signature formed by hashing multiple data elements, and then encrypting the hashed data elements using a private encryption key.Type: GrantFiled: August 7, 2017Date of Patent: February 13, 2024Assignee: Visa International Service AssociationInventors: Andrew Sierra, Chackan Lai
-
Patent number: 11895094Abstract: The example embodiments are directed to a system and method for managing blockchain transaction processing. In an example, the method includes one or more of receiving a message transmitted from a client device, the message including a predefined structural format for processing by a service providing computing system, determining a type of the message and detecting one or more sensitive fields within the message based on the determined type of the message, anonymizing values of the one or more sensitive fields within the message while leaving the predefined structural format intact, and transmitting the anonymized message including the one or more anonymized values with the predefined structural format remaining intact to the service providing computing system. The system can anonymize data from a private network before it is transmitted to a public service.Type: GrantFiled: November 18, 2019Date of Patent: February 6, 2024Assignee: International Business Machines CorporationInventors: David G. Druker, Matthew Elsner, Ariel Farkash, Igor Gokhman, Brian R. Matthiesen, Patrick R. Wardrop, Ilgen B. Yuceer
-
Patent number: 11886601Abstract: A method of securely processing data in a third party cloud environment is provided. Third party computer executable code is executed in a secure portion of the third party cloud environment. An external data request for external data to be received from an external data provider is then processed whereby the external data request comprises at least a portion of the secure data. The third party cloud environment determines whether to authorise the first external data request, and if the request is so authorised the request is sent to the external data provider and the external data is received from the external data provider.Type: GrantFiled: December 18, 2020Date of Patent: January 30, 2024Assignee: Barclays Execution Services LimitedInventors: Jeremy Goldstone, Joe O'Brien, Jeeban Panigrahi
-
Patent number: 11888868Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes monitoring login attempts associated with a plurality of websites and identifying a first login attempt at a first website associated with a set of user credentials. In response to determining that the set of user credentials do not correspond to a valid set of credentials, a count value associated with an entry in a failed credential log associated with the user credentials is incremented. If the count threshold associated with a compromised user credential rule is exceeded by the current count value, then the first set of credentials is identified as a set of compromised credentials and at least one protective action is initiated.Type: GrantFiled: July 14, 2021Date of Patent: January 30, 2024Assignee: SAP SEInventor: Eran Kutner
-
Patent number: 11882452Abstract: A system includes a database, a sensor, and a hardware processor communicatively coupled to the sensor. The database stores an identifier assigned to a mobile device. The presence of the identifier in the database indicates that a user of the mobile device is associated with a security breach. The mobile device is configured to transmit the identifier over a wireless network. The sensor has a range and is configured to obtain the identifier transmitted by the mobile device when the mobile device is located within the range. The hardware processor receives the identifier from the sensor. The processor also determines that the identifier is stored in the database. In response to determining that the identifier is stored in the database, the processor initiates a security protocol.Type: GrantFiled: November 20, 2020Date of Patent: January 23, 2024Assignee: Bank of America CorporationInventor: Kevin P. Thomsen
-
Patent number: 11868466Abstract: An apparatus includes a processor coupled to a memory. The processor calls a second function from a first function by coloring with an inaccessible color value a first memory area associated with the first function, branching to the second function, coloring with a second color value a second memory area associated with the second function, operating on the second memory area, and coloring with the inaccessible color value the second memory area. The processor then returns control to the first function, and colors with a first color value the first memory area. The coloring step includes branching to a coloring routine that includes a basic block beginning with a single branch target instruction, identifying and authorizing the calling routine, coloring with a hardcoded color value a memory area associated with the calling routine, and returning to the calling routine.Type: GrantFiled: March 12, 2019Date of Patent: January 9, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Jan-Erik Ekberg
-
Patent number: 11870801Abstract: Techniques are disclosed for mitigating network-based attacks, brute-force attacks, enumeration account takeover type attacks, and generally attacks that might result in unauthorized access to user accounts, denial-of-service, loss of functionality to users, etc. Authenticating a user at an end-point of a network may occur using an activator. In some instances, an authentication module (e.g. on a server) receives and validates a key activator. If the key activator is valid, the authentication module is activated. After the authentication module is activated, the authentication module may receive and authenticate a security credential, such as a password, that is associated with the user. If the authentication module receives the security credential without being activated, the authentication module may not authenticate the security credential, even if the security credential is a valid credential.Type: GrantFiled: January 27, 2021Date of Patent: January 9, 2024Assignee: PayPal, Inc.Inventor: George Chen Kaidi
-
Patent number: 11869005Abstract: A system and method for linking to accounts using credential-less authentication that includes: within a first application context at an account-linking computing service: receiving a request to establish an account link, establishing the account link to a user account of an account service using user credentials, and receiving user identifying information of the first application context and storing the user identifying information in association with the account link; and within a second application context at the account-linking computing service: receiving user identifying information of the second application context, searching and identifying a candidate account link using the user identifying information of the second application context, verifying eligibility for access to the account link, and permitting access to the account link upon successful verification of eligibility.Type: GrantFiled: September 17, 2020Date of Patent: January 9, 2024Assignee: Plaid Inc.Inventors: William Hockey, Nick Agin, Baker Shogry, Samir Naik, Jonathan Chao
-
Patent number: 11861582Abstract: Embodiments include apparatuses, methods, and systems for performing security protection of association between a user device and a user. A computing system receives from a service provider a notification that an identifier of a user device has been activated in the user device to be associated with a user identifier to replace an existing identifier of the user device associated with the user identifier. The computing system further receives from the user device a request for information associated with the user identifier to be sent to the user device associated with the identifier of the user device. Before sending the requested information to the user device, the computing system verifies the identifier of the user device has been activated by the user by an additional authentication of the user through a communication path between the user and the computing system. Other embodiments may also be described and claimed.Type: GrantFiled: December 9, 2020Date of Patent: January 2, 2024Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Dhaval Gangar
-
Patent number: 11863661Abstract: The present disclosure includes apparatuses, methods, and systems for using a local ledger block chain for secure updates. An embodiment includes a memory, and circuitry configured to receive a global block to be added to a local ledger block chain for validating an update for data stored in the memory, where the global block to be added to the local ledger block chain includes a cryptographic hash of a current local block in the local ledger block chain, a cryptographic hash of the data stored in the memory to be updated, where the current local block in the local ledger block chain has a digital signature associated therewith that indicates the global block is from an authorized entity.Type: GrantFiled: July 12, 2021Date of Patent: January 2, 2024Assignee: Micron Technology, Inc.Inventors: Alberto Troia, Antonino Mondello
-
Patent number: 11863671Abstract: Embodiments described herein enable a user to bypass the use of one-time keys or account recovery codes by providing techniques for accessory assisted account recovery. In various embodiments, accessory assisted account recovery makes use of an accessory device of a user, where the accessory device can be any device having a secure processor, cryptographic engine, public key accelerator, or is otherwise able to accelerate cryptographic operations or perform cryptographic operations in a secure execution environment. An account recovery key can be split into multiple portions. At least one portion of the recovery key is then encrypted. The accessory device is then configured to be uniquely capable of decrypting the encrypted portion of an account recovery key.Type: GrantFiled: April 14, 2020Date of Patent: January 2, 2024Assignee: Apple Inc.Inventors: Yannick L. Sierra, Lucia E. Ballard, Kyle C. Brogle, DJ Capelis
-
Patent number: 11830492Abstract: An apparatus includes: a hardware processor that executes, based on recognized information obtained by voice recognition, a process requiring an execution authority; and an authenticator that performs authentication to determine, using first confidential information that is preset, whether the execution authority has been given. Upon determining that the recognized information corresponds to the preset confidential information, the hardware processor provides a user with a predetermined notification regarding security of the preset confidential information.Type: GrantFiled: January 19, 2022Date of Patent: November 28, 2023Assignee: Konica Minolta, Inc.Inventor: Atsushi Tomita
-
Patent number: 11818265Abstract: A method for recovering data. Identity factors are collected at a device, wherein hashes of the identity factors are configured to be stored at a server. A dynamic password is generated at the device based on the identity factors and a Salt generated by the server and configured to be delivered to the device. A selfie is captured of a user. The device generates a symmetric key used to encrypt the selfie. The symmetric key is encrypted using the dynamic password. The encrypted symmetric key and the encrypted selfie are stored on the server. One or more data items are stored on the server. The dynamic password is recoverable by presenting the plurality of identity factors that are hashed to the server. The symmetric key is recoverable using the recovered dynamic password. The data items are recoverable by presenting the symmetric key and a second selfie of the user.Type: GrantFiled: July 28, 2021Date of Patent: November 14, 2023Assignee: Ping Identity CorporationInventors: Armin Ebrahimi, Gaurav Khot
-
Patent number: 11809565Abstract: Methods, systems, and devices for supporting security for private data inputs to artificial intelligence models are described. A device (e.g., an application server) may receive a request to run an artificial intelligence model. The device may run the artificial intelligence model on a public data set and an extended set of data that includes both the public data set and a private data set. The device may determine a first set of outcomes based on running the artificial intelligence model on the public data set and a second set of outcomes based on rerunning the model on the extended set of data. The device may then compare the two sets of outcomes to determine whether a private data value is identifiable based on the second set of outcomes. If a private data value is identifiable, the device may obfuscate the results prior to transmitting the results to the requestor.Type: GrantFiled: January 28, 2022Date of Patent: November 7, 2023Assignee: Salesforce Inc.Inventors: Abigail Reyes Knox, Daniel Thomas Harrison
-
Patent number: 11809917Abstract: Transactional Lock Elision allows hardware transactions to execute unmodified critical sections protected by the same lock concurrently, by subscribing to the lock and verifying that it is available before committing the transaction. A “lazy subscription” optimization, which delays lock subscription, can potentially cause behavior that cannot occur when the critical sections are executed under the lock. Hardware extensions may provide mechanisms to ensure that lazy subscriptions are safe (e.g., that they result in correct behavior). Prior to executing a critical section transactionally, its lock and subscription code may be identified (e.g., by writing their locations to special registers). Prior to committing the transaction, the thread executing the critical section may verify that the correct lock was correctly subscribed to. If not, or if locations identified by the special registers have been modified, the transaction may be aborted.Type: GrantFiled: December 20, 2019Date of Patent: November 7, 2023Assignee: Oracle International CorporationInventors: David Dice, Timothy L. Harris, Alex Kogan, Yosef Lev, Mark S. Moir
-
Patent number: 11811913Abstract: The present disclosure includes apparatuses, methods, and systems for using a local ledger block chain for secure updates. An embodiment includes a memory, and circuitry configured to receive a global block to be added to a local ledger block chain for validating an update for data stored in the memory, where the global block to be added to the local ledger block chain includes a cryptographic hash of a current local block in the local ledger block chain, a cryptographic hash of the data stored in the memory to be updated, where the current local block in the local ledger block chain has a digital signature associated therewith that indicates the global block is from an authorized entity.Type: GrantFiled: July 12, 2021Date of Patent: November 7, 2023Assignee: Micron Technology, Inc.Inventors: Alberto Troia, Antonino Mondello
-
Patent number: 11809541Abstract: Disclosed is a method for obtaining emergency device access for field devices in process automation technology by means of a security token. The method includes the field device receiving and storing a public key before an emergency occurs; connecting the security token to the field device; sending a challenge from the field device to the security token; calculating a response to the challenge by means of a private key on the security token and sending the response from the security token to the field device; and granting emergency access if the response is correct.Type: GrantFiled: September 22, 2021Date of Patent: November 7, 2023Assignee: Endress+Hauser Conducta GmbH+Co. KGInventors: Thomas Alber, Martin Lohmann
-
Patent number: 11805180Abstract: Native activity tracking using credential and authentication management in scalable data networks is described, including detecting a request from an extension installed on a browser to access a data network, initiating another request from the extension to a server to retrieve authentication data to access the data network, transferring from the server to the extension the authentication data and an instruction to the extension to generate a further request, transmitting the further request to the data network from the browser, the request comprising the authentication data from the server without manual input of the authentication data, presenting an overlay on the browser, the overlay being configured to indicate a login status associated with the data network, and storing one or more portions of data transferred between the data network and the browser, the storing being performed by the extension if access to the data network has been provided to the browser in response to the request.Type: GrantFiled: June 30, 2022Date of Patent: October 31, 2023Assignee: Spredfast, Inc.Inventors: Michael Senftleber, Zachary Daniel Kloepping, Derek Joseph Wene, Blake T. Kobelan, Chad Walter Gowan
-
Patent number: 11805078Abstract: A first ingress interface on a switch receives a first control packet for establishing a Transmission Control Protocol (TCP) session and selects a first engine running on a first line card in the switch. A second ingress interface receives a second control packet and selects the same first engine. Data associated with the TCP session received by the first or second ingress interface subsequent to establishing the TCP session is to be forwarded to the first engine. The first ingress interface receives a third control packet and sends, to the selected first engine, a notification indicating the TCP session which is to be tracked. The first or second ingress interface receives a fourth packet with a payload associated with the TCP session and forwards, to the selected first engine, a copy of the fourth packet, thereby facilitating a plurality of engine instances to support application identification.Type: GrantFiled: December 7, 2021Date of Patent: October 31, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Saurabh Mohan, Vijeesh Erankotte Panayamthatta, Venkatavaradhan Devarajan
-
Patent number: 11799980Abstract: The present invention broadly comprises crowd-sourced computer-implemented methods and systems of collecting and transforming portable device data. One embodiment of the invention may be implemented as a system including an electronic device including a sensor configured to collect data, the device configured to begin collection of data based on a command from a user of the electronic device; and a server configured to issue a command to the electronic device to turn on the sensor and transmit data collected by the sensor to the server without any input by the user of the electronic device when a condition is met.Type: GrantFiled: June 17, 2022Date of Patent: October 24, 2023Assignee: KNOWMADICS, INC.Inventors: Paul Maguire, Lisa Cinnamon, Claire Ostrum, Brian O'Toole, Steven Edgett, Charles Corcoran
-
Patent number: 11797702Abstract: One example method includes extracting content metadata from data, storing the content metadata in a data catalogue, receiving at the data catalogue, from a user, a request to access the data, transmitting, by the data catalogue to a security service provider, an access request that includes the extracted content metadata and metadata relating to the access request, accessing, by the security service provider, identity metadata concerning an identity of the user, and a data access policy, and transmitting, by the security service provider to the data catalogue, a decision as to whether or not access can be granted to the data, and the decision is based on the data access policy, the identity metadata, and the metadata in the access request.Type: GrantFiled: March 11, 2021Date of Patent: October 24, 2023Assignee: EMC IP Holding Company LLCInventors: Nicole Reineke, Hanna Yehuda, Omar Abdul Aal, Farida Shafik, Joel Christner, Shary Beshara, Ahmad Refaat Abdel Fadeel Ahmad El Rouby
-
Patent number: 11799831Abstract: A method of separating identity IPs for identification of applications from the locator IPs for identifying the route is provided. A virtual service layer (VSL) protocol stack uses the IP addresses assigned by network administrators to the application endpoints to support the TCP/IP stack as the identity IP addresses that are not published to the underlay network for routing. On the other hand, the VSL stack uses the IP addresses assigned by the underlay network to the VSL enabled endpoints and VSL enabled routers as the locator IP addresses for routing packets. The VSL stack formats application flow packets with identity headers as identity packet and encapsulates identity packet with the locator header to route the packet. The separation of the identity and locator identifications are used to eliminate the network middleboxes and provide firewall, load balancing, connectivity, SD-WAN, and WAN-optimization, as a part of the communication protocol.Type: GrantFiled: October 4, 2022Date of Patent: October 24, 2023Inventor: Sri Ram Kishore Vemulpali
-
Patent number: 11799861Abstract: A method, system and computer program product for secure access management for tools within a secure environment. A virtual file system for a user in memory on a server side in the secure environment is accessed as part of an authenticated user session including a user command instigated by a user. At the virtual file system, an encrypted file stored in the secure environment is obtained, where the file is encrypted using a public key of a user. A read operation at the virtual file system of the encrypted file is intercepted and the encrypted file is sent to a client at a user system external to the secure environment over a secure connection for decryption by a remote cryptography device of the user system using the user's private key. The decrypted file is then received at the virtual file system enabling the user to run the required user command.Type: GrantFiled: December 19, 2020Date of Patent: October 24, 2023Assignee: International Business Machines CorporationInventors: Olgierd Pieczul, Jinhui Wang