Computer Program Modification Detection By Cryptography Patents (Class 713/187)
  • Patent number: 11190358
    Abstract: An acceptance hash code is disclosed herein. An acceptance hash code is a value generated by a device using a hash function. The acceptance hash code itself may represent a legally enforceable document. The acceptance hash code may be structured in a manner such that a device operated by a user can transmit a legally enforceable document over a network using a smaller file size than is possible with conventional secure transaction techniques. In addition, the manner in which the acceptance hash code is generated allows a receiving device to verify that the document elements of the document are as expected and to verify an identity of a user that allegedly executed the document. Thus, even if a malicious user attempts to alter document elements or perform other fraudulent activity, the receiving device can use the acceptance hash code to identify such activity and prevent a transaction from being completed.
    Type: Grant
    Filed: August 9, 2018
    Date of Patent: November 30, 2021
    Assignee: Secure Open Systems, Inc.
    Inventor: David Duane Bettger
  • Patent number: 11189164
    Abstract: The present disclosure is directed to methods and apparatus that manage the flow of traffic. Methods and systems consistent with the present disclosure may allow biometric information of individuals to be collected when access privileges associated with particular individuals are validated or updated. These methods may allow a supervisor to temporarily or permanently authorize certain employees to access components that are located within a traffic control cabinet and these methods may allow changes in traffic signal light timing to be authorized according to a set of rules. Such authorization rules may require proposed signal light timing changes to be approved by a supervisor before a proposed change is implemented. Methods and systems consistent with the present disclosure may also cause components within a control cabinet to be disabled or disconnected when a signal light control cabinet is accessed by unauthorized persons.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: November 30, 2021
    Assignee: Cubic Corporation
    Inventor: William S. Overstreet
  • Patent number: 11151256
    Abstract: Systems and methods for detecting IHS attacks by monitoring chains of configuration changes made to Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI) attributes are described. In some embodiments, an IHS may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: monitor a chain of BIOS/UEFI configuration changes; compare the chain of BIOS/UEFI configuration changes against an Indication of Attack (IoA); and report an alert in response to the chain of BIOS/UEFI configuration changes matching the IoA.
    Type: Grant
    Filed: May 13, 2019
    Date of Patent: October 19, 2021
    Assignee: Dell Products, L.P.
    Inventors: Ricardo L. Martinez, Girish S. Dhoble, Nicholas D. Grobelny
  • Patent number: 11138108
    Abstract: Devices and techniques for logical-to-physical (L2P) map (e.g., table) synchronization in a managed memory device are described herein. For example, a plaintext portion of an L2P map may be updated in a managed memory device. In response to updating the plaintext portion of the L2P map, the updated portion can be obfuscated to create an obfuscated version of the updated portion of the L2P map. Both the updated portion and the obfuscated version of the updated portion can be saved in storage of the memory device. When a request from a host for the updated portion of the L2P map is received, the memory device can provide the obfuscated version of the portion from the storage.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: October 5, 2021
    Assignee: Micron Technology, Inc.
    Inventors: Jonathan Scott Parry, Nadav Grosz
  • Patent number: 11109231
    Abstract: The present invention provides an approach for granting access and respectively denying access to an instruction set of a device. The technical teaching provides the advantage that unauthorized access can be effectively prevented. Hence, maintenance work can be performed by specialized staff and security sensitive parts of the instruction sets are secured.
    Type: Grant
    Filed: March 21, 2016
    Date of Patent: August 31, 2021
    Assignee: ABB Schweiz AG
    Inventors: Matus Harvan, Roman Schlegel, Sebastian Obermeier, Thomas Locher
  • Patent number: 11108753
    Abstract: A computer system and methods for securing files in a file system with storage resources accessible to an authenticable user using an untrusted client device in a semi-trusted client threat model. Each file is secured in the file system in one or more ciphertext blocks along with the file metadata. Each file is assigned a unique file key FK to encrypt the file. A wrapping key WK assigned to the file is used for encrypting the file key FK to produce a wrapped file key WFK. A key manager is in charge of generating and storing keys. The file is encrypted block by block to produce corresponding ciphertext blocks and corresponding authentication tags. The authentication tags are stored in the file metadata, along with an ID of the wrapping key WK, wrapped file key WFK, last key rotation time, an Access Control List (ACL), etc. The integrity of ciphertext blocks is ensured by authentication tags and the integrity of the metadata is ensured by a message authentication code (MAC).
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: August 31, 2021
    Assignee: ZETTASET, INC.
    Inventor: Eric A. Murray
  • Patent number: 11082483
    Abstract: Sharing data in a data exchange across multiple cloud computing platforms and/or cloud computing platform regions is described. An example computer-implemented method can include receiving data sharing information from a data provider for sharing a data set in a data exchange from a first cloud computing entity to a set of second cloud computing entities. In response to receiving the data sharing information, the method may also include creating an account with each of the set of second cloud computing entities. The method may also further include sharing the data set from the first cloud computing entity with the set of second cloud computing entities using at least the corresponding account of that second cloud computing entity.
    Type: Grant
    Filed: April 1, 2021
    Date of Patent: August 3, 2021
    Assignee: Snowflake Inc.
    Inventors: Pui Kei Johnston Chu, Benoit Dageville, Matthew Glickman, Christian Kleinerman, Prasanna Krishnan, Justin Langseth
  • Patent number: 11062037
    Abstract: A shared networked storage may be separated from a key vault system. A storage request with data to be stored and the storage request with a confidentiality rating may be received. The confidentiality rating may indicate a level of confidentiality the data is associated with. The storage request with the data and the confidentiality rating may be received via a shared networked storage access interface by a security layer. The data to be stored by the key vault system and the confidentiality rating may be encrypted on request of the security layer and into a data container. The shared networked storage may be categorized into Cloud zones. Each Cloud zone may be assigned a trust level. The data container may be stored in one of the Cloud zones of the shared networked storage. The trust level of the one of the Cloud zones may correspond to the confidentiality rating.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: July 13, 2021
    Assignee: International Business Machines Corporation
    Inventors: Marcus Breuer, Itzhack Goldberg, Thorsten Muehge, Erik Rueger, Matthias Seul
  • Patent number: 11055387
    Abstract: Techniques for electronic signature process management are described. Some embodiments provide an electronic signature service (“ESS”) configured to manage electronic identity cards. In some embodiments, the ESS generates and manages an electronic identity card for a user, based on personal information of the user, activity information related to the user's actions with respect to the ESS, and/or social networking information related to the user. The electronic identity card of a signer may be associated with an electronic document signed via the ESS, so that users may obtain information about the signer of the document. The ESS may also generate a trust score for the user based on activity information related to the user's actions with respect to the ESS and/or other factors. The trust score may be used to recommend authentication mechanisms to use with respect to electronic signature transactions.
    Type: Grant
    Filed: September 28, 2019
    Date of Patent: July 6, 2021
    Assignee: DOCUSIGN, INC.
    Inventors: Thomas H. Gonser, Donald G. Peterson, Douglas P. Rybacki, Ashley Carroll, Michael Strickland
  • Patent number: 11023579
    Abstract: A method and apparatus for monitoring a volatile memory in a computer system. Samples of compressed data from locations in the volatile memory in the computer system are read. Data in the volatile memory is reconstructed using the samples of compressed data. The data is an image of the volatile memory. The image enables determining whether an undesired process is present in the volatile memory.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: June 1, 2021
    Assignee: National Technology & Engineering Solutions of Sandia, LLC
    Inventors: Jason W. Wheeler, Tu-Thach Quach, Conrad D. James, James Bradley Aimone, Arun F. Rodrigues
  • Patent number: 11005845
    Abstract: A second device seeking to access a network can be detected using a first device communicatively coupled to the network. Responsive to detecting the second device seeking to access the network, the first device can be caused to communicatively uncouple from the network and whether the second device poses a risk of corrupting the network's intended functioning if the second device accesses the network can be determined by the first device.
    Type: Grant
    Filed: October 18, 2018
    Date of Patent: May 11, 2021
    Inventors: Jeremy R. Fox, Kelley Anders, Gregory J. Boss, Sarbajit K. Rakshit
  • Patent number: 11003757
    Abstract: Techniques are provided for client application authentication and include receiving a request to authenticate an application and, based on the received request to authenticate the application, sending a request to perform a push communication, including a short-term shared key, to a digital distribution system, wherein the digital distribution system is a distribution source of the application. The digital distribution system attempts to send the push communication including the short-term shared key to the application. The techniques may proceed by receiving a request for resources from the provider client application and determining whether the application has the short-term shared key. When it is determined that the application has provided the short-term shared key, the requested resources to the application may be provided, otherwise, the requested resources may be denied.
    Type: Grant
    Filed: October 17, 2017
    Date of Patent: May 11, 2021
    Assignee: ATLASSIAN PTY LTD.
    Inventor: Jerry Cheng
  • Patent number: 10999355
    Abstract: Sharing data in a data exchange across multiple cloud computing platforms and/or cloud computing platform regions is described. An example computer-implemented method can include receiving data sharing information from a data provider for sharing a data set in a data exchange from a first cloud computing entity to a set of second cloud computing entities. In response to receiving the data sharing information, the method may also include creating an account with each of the set of second cloud computing entities. The method may also further include sharing the data set from the first cloud computing entity with the set of second cloud computing entities using at least the corresponding account of that second cloud computing entity.
    Type: Grant
    Filed: March 10, 2020
    Date of Patent: May 4, 2021
    Assignee: Snowflake Inc.
    Inventors: Pui Kei Johnston Chu, Benoit Dageville, Matthew Glickman, Christian Kleinerman, Prasanna Krishnan, Justin Langseth
  • Patent number: 10997008
    Abstract: A controller controls a control target device and includes: a storage unit to record event history data of an event occurring during operation of the controller; a hash value calculation unit to calculate a hash value on the basis of the event history data; and a communication unit to transmit the hash value to another controller external to the controller.
    Type: Grant
    Filed: September 25, 2017
    Date of Patent: May 4, 2021
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventor: Eietsu Domeki
  • Patent number: 10990993
    Abstract: A multi-lender architecture is configured to provide a loan applicant with automated pre-qualification and automobile loan eligibility evaluation for multiple candidate lenders. Lender output data may include sensitive data. The lender output data is stored in a data object of a first format and one or more fields of the data object are encrypted at the field level. The encrypted data object may be transmitted through multiple application layers or terminals. The encrypted data object may be reformatted at one or more application layers or terminals without decryption. A reformatted encrypted data object containing the lender output data may be decrypted at the last layer before forwarding the lender output data to the loan applicant.
    Type: Grant
    Filed: May 22, 2020
    Date of Patent: April 27, 2021
    Assignee: Capital One Services, LLC
    Inventors: Dinesh Sundaram, Trent Jones
  • Patent number: 10970413
    Abstract: Provided is a process including: receiving one or more write requests; selecting a first subset of the values as corresponding to higher-security fields; segmenting a first value in the first subset; instructing a first computing device to store a first subset of segments among the plurality of segments in memory; and instructing a second computing device to store a second subset of segments among the plurality of segments in memory.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: April 6, 2021
    Assignee: ALTR Solutions, Inc.
    Inventor: Christopher Edward Struttmann
  • Patent number: 10956576
    Abstract: A variety of applications can include apparatus and/or methods of controlling a secure boot mode for a memory system. In an embodiment, a system includes a memory component and a processing device, where the processing device is configured to control a boot process for the system to operate the memory component and perform a cryptographic verification with a host to conduct an authentication of the host. The processing device can interact with the host, in response to the authentication, to receive a setting to control the boot process in a secure boot mode. The processing can interact with another processing device of the system to store the setting and to receive a secure boot signal from the other processing device, where the secure boot signal is a signal to assert or de-assert the secure boot mode depending on a value of the setting. Additional apparatus, systems, and methods are disclosed.
    Type: Grant
    Filed: September 6, 2018
    Date of Patent: March 23, 2021
    Assignee: Micron Technology, Inc.
    Inventors: Robert W. Strong, Dustin J. Carter, Neil Levine
  • Patent number: 10956575
    Abstract: Examples disclosed herein relate to determining malware using firmware of a computing device. Firmware can be used to determine that an indication is present that malware is present on the computing device. The firmware can be executed to perform a security action in response to the indication that malware is present on the computing device.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: March 23, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: John Scott Harsany, Suhas Shivanna, Luis E Luciani, Jr.
  • Patent number: 10951790
    Abstract: An image capturing device may capture image data for processing to form an image. The image capturing device may perform a hashing procedure on the image data, wherein performing the hashing procedure generates a hash value of the image data. The image capturing device may provide, to an image authentication device, the hash value of the image data, wherein the hash value of the image data is to be used by the image authentication device to validate the image based on a request to authenticate the image received from a receiving device. The image capturing device may process the image data to form the image for display to a user. The image capturing device may provide, after providing the hash value of the image data to the image authentication device, the image for display to the user.
    Type: Grant
    Filed: November 22, 2019
    Date of Patent: March 16, 2021
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Ashish Sardesai, Dante J. Pacella
  • Patent number: 10936300
    Abstract: Various embodiments provide for the live updating of system software or firmware, such as BIOS information, without the need for a reboot. A payload containing BIOS update information can be generated and signed with an encryption key. The information in the payload is able to be updated through a live update, and can be selected in part based on the configuration and BIOS version of the computing device to be updated. Upon an update being triggered, a target device is placed into a management mode wherein normal work is suspended and the device is isolated. The payload is verified and decrypted, and appropriate functions called in order to update the relevant BIOS information. After the update is verified, the device exits management mode and resumes a typical workflow. If the update is not successful, or unable to be performed via live update, a conventional update can be performed that includes a reboot.
    Type: Grant
    Filed: June 6, 2019
    Date of Patent: March 2, 2021
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Jiming Sun, Tsung Ho Wu, Bradshaw Darrow Austin
  • Patent number: 10924554
    Abstract: Methods and systems for customizing applications in enterprise mobility management systems are described herein. A client agent software application on a mobile device may be customized to embed or make available enterprise server URLs, a session cookie for authentication, and various other data during the device enrollment process. The customization of the client agent may be based on the device, user, and/or enrollment session. After the device is enrolled in the enterprise system, the embedded data may be accessed by the client agent application to support seamless single-sign-on during first-time use. Additional customized applications based on device, user, and/or enrollment session, may be generated and provided to mobile devices during or after device enrollment. Customized applications may be based on application templates, such as packaged web applications or specific implementations of hosted applications.
    Type: Grant
    Filed: September 18, 2014
    Date of Patent: February 16, 2021
    Assignee: Citrix Systems, Inc.
    Inventors: Georgy Momchilov, Gary Barton
  • Patent number: 10924468
    Abstract: Described embodiments provide systems and methods for launching a connection to a resource link from a client device. A device can authenticate the client device for access to a plurality of resource links accessible via one or more servers. The device can provide a list of the plurality of resource links responsive to the authentication, and receive a request from the client device, identifying a first resource link to access. The device can cause first authenticated credentials for the first resource link to be stored on the client device responsive to the request. The first authenticated credentials can correspond to the client device and provide access the first resource link. The client device can be configured to launch a connection to the first resource link from the client device using the first authenticated credentials stored on the client device.
    Type: Grant
    Filed: July 27, 2018
    Date of Patent: February 16, 2021
    Assignee: Citrix Systems, Inc.
    Inventors: Viswanath Yarangatta Suresh, Arkesh Kumar, Dileep Reddem, Anil Kumar Gavini
  • Patent number: 10909409
    Abstract: The present disclosure relates to a system and method for codebook construction and use thereof in image quality assessment. A codebook including a plurality of code words may be provided. Each one of the plurality of code words may have a reference score relating to image quality. A test image may be acquired. One or more feature vectors may be extracted from the test image based on statistical independence between neighboring divisive normalization transform coefficients of the test image. A score may be generated based on a comparison between the extracted feature vectors of the test image and at least some of the plurality of code words in the codebook and the corresponding reference scores of the code words.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: February 2, 2021
    Assignee: SHENZHEN UNIVERSITY
    Inventor: Ying Chu
  • Patent number: 10904273
    Abstract: In various embodiments, a name server transmits a canonical name as resolution to another canonical name. In operation, when a resource name is requested for resolution, a determination is made that the resource name corresponds to a trap resource name. A first canonical name is transmitted as resolution to the trap resource name. The first canonical name is requested for resolution, and a second canonical name is transmitted as resolution. By providing trap canonical names as resolutions to trap canonical names, unauthorized software making the resolution requests is kept occupied with requesting resolution of canonical name after canonical name, impeding the ability of the unauthorized software from traversing a network.
    Type: Grant
    Filed: November 22, 2017
    Date of Patent: January 26, 2021
    Assignee: VERISIGN, INC.
    Inventors: Benjamin Mccarty, James Graham
  • Patent number: 10896266
    Abstract: Provided are systems and methods for hardware attestation. Hardware attestation can ensure that only trusted hardware components are being used in a computing system. In various implementations, the computing system can include a hardware component coupled to the motherboard, where the hardware component is independent of the main processor of the computing system. The hardware component can determine whether a particular component connected to the motherboard includes an identification code, where the identification code can be used to attest to an identity of the particular component. The hardware component can further determining whether the identification code matches an expected value. The hardware component can further configure the particular component based on whether the identification code matches the expected value.
    Type: Grant
    Filed: July 12, 2018
    Date of Patent: January 19, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Christopher James BeSerra, Gavin Akira Ebisuzaki, Ahmed Mohammed Shihab
  • Patent number: 10893031
    Abstract: A server receives a request from a client to establish a secure session. The server analyzes the request to determine a set of one or more properties of the request. The server selects, based at least in part on the determined set of properties, one of multiple certificates for a hostname of the server, where each of the certificates is signed using a different signature and hash algorithm pair. The server returns the selected certificate to the client.
    Type: Grant
    Filed: May 24, 2019
    Date of Patent: January 12, 2021
    Assignee: CLOUDFLARE, INC.
    Inventors: Nicholas Thomas Sullivan, Lee Hahn Holloway, Piotr Sikora, Ryan Lackey, John Graham-Cumming, Dane Orion Knecht, Patrick Donahue, Zi Lin
  • Patent number: 10885196
    Abstract: In some examples, in response to a reset of an electronic device, a method disables hardware write locking of a first region in a non-volatile memory, and executes a first boot code portion from the first region to begin a boot procedure. The executed first boot code portion checks whether an update code for the first boot code portion exists. In response to determining that no update code for the first boot code portion exists, the executed first boot code portion causes hardware write locking of the first region. After causing the hardware write locking of the first region, the boot procedure continues, the boot procedure comprising verifying an integrity of a second boot code portion.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: January 5, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventor: Thomas M. Laffey
  • Patent number: 10878048
    Abstract: The present disclosure is directed to generating search results, recommendations, and/or the like. In particular, the methods and systems of the present disclosure can: receive data describing one or more aspects of an entity; determine, based at least in part on the aspect(s) of the entity, one or more additional aspects of the entity; determine, based at least in part on the aspect(s) of the entity and the additional aspect(s) of the entity, a metric indicating a reputational prominence of the entity relative to multiple other entities of similar type; generate, based on the metric, one or more search results, recommendations, and/or the like; and communicate, to a computing device (e.g., for display, and/or the like), data indicating the search result(s), recommendation(s), and/or the like.
    Type: Grant
    Filed: February 10, 2018
    Date of Patent: December 29, 2020
    Assignee: Google LLC
    Inventors: Jennifer Su, Christian Posse
  • Patent number: 10867079
    Abstract: An Initialization Unit (IU) initiates an initial secure connection with an Intrinsic Use Control (IUC) Chip based on very large random numbers (VLRNs). The IUC Chip in turn initiates a secondary secure connection between it and one or more Use Controlled Components (UCCs). Polling by the IU allows confirmation of an ongoing secure connection, and also allows the IUC Chip to confirm the secondary secure connection to the UCCs. Removal or improper polling response from one of the UCCs results in a response from the IUC Chip that may include notification of tampering, or temporary or permanent discontinued operation of the offending UCC. Permanent discontinued operation may include destruction of the offending UCC, and cascaded discontinued operation of all other UCCs secured by the IUC Chip. A UCC may in turn be another nested layer of IUC Chips, controlling a corresponding layer of UCCs, ad infinitum.
    Type: Grant
    Filed: July 12, 2018
    Date of Patent: December 15, 2020
    Assignee: LAWRENCE LIVERMORE NATIONAL SECURITY, LLC
    Inventor: Mark Miles Hart
  • Patent number: 10853492
    Abstract: There is provided a computer implemented method of generating a vaccination profile of malicious code for vaccination against other instances of the malicious code, comprising: providing malicious code, analyzing the malicious code to identify at least one vaccination artifact system call indicative of an attempt to identify malicious code executing on a client computing device prior to another instance of the malicious code infecting the client computing device, generating according to the analysis of the malicious code, a vaccination profile including the at least one vaccination artifact system call, and providing the vaccination profile to a plurality of client computing devices for vaccination of the plurality of client computing devices uninfected by the malicious code, wherein an existing infection by the malicious code is emulated based on the vaccination profile for prevention of infection of the plurality of computing devices by another instance of the malicious code.
    Type: Grant
    Filed: July 22, 2018
    Date of Patent: December 1, 2020
    Assignee: Minerva Labs Ltd.
    Inventors: Omri Moyal, Erez Breiman, Eduard Bobritsky
  • Patent number: 10853432
    Abstract: The present disclosure is directed to generating search results, recommendations, and/or the like. In particular, the methods and systems of the present disclosure can: receive data describing one or more aspects of entities of different types; determine, based at least in part on the aspect(s) of the entities, one or more additional aspects of the entities; determine, based at least in part on the additional aspect(s) of the entities, a metric indicating an extent to which the entities correspond to one another; generate, based on the metric, one or more search results, recommendations, and/or the like; and communicate, to a computing device (e.g., for display, and/or the like), data indicating the search result(s), recommendation(s), and/or the like.
    Type: Grant
    Filed: February 10, 2018
    Date of Patent: December 1, 2020
    Assignee: Google LLC
    Inventors: Jennifer Su, Christian Posse
  • Patent number: 10831484
    Abstract: In an embodiment, a processor includes hardware circuitry and/or supports instructions which may be used to detect that a return address or jump address has been modified since it was written to memory. In response to detecting the modification, the processor may be configured to signal an exception or otherwise initiate error handling to prevent execution at the modified address. In an embodiment, the processor may perform a cryptographic sign operation on the return address/jump address before writing the signed return address/jump address to memory and the signature may be verified before the address is used as a return target or jump target. Security of the system may be improved by foiling ROP/JOP attacks.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: November 10, 2020
    Assignee: Apple Inc.
    Inventors: Yannick L. Sierra, Jeffry E. Gonion, Thomas Roche, Jerrold V. Hauck
  • Patent number: 10824719
    Abstract: A method of preventing execution of malware programming in a computing environment, by modifying the portion(s) of computer file names and/or headers and/or file content recognized by the computer for executing said programming. Accordingly, the computer will not recognize the malware file (having standard executable program files) as an executable file, so that the malware program will never be activated.
    Type: Grant
    Filed: August 1, 2018
    Date of Patent: November 3, 2020
    Inventor: Rodney E. Otts
  • Patent number: 10810303
    Abstract: Apparatus and methods are provided for performing a digital forensic investigation. Aspects of the apparatus and methods select data on a data source and mark and/or copy this selected data to a storage device in a forensically sound manner. Information related to the location of the selected data may also be stored on the storage device.
    Type: Grant
    Filed: August 9, 2015
    Date of Patent: October 20, 2020
    Inventor: Jonathan Grier
  • Patent number: 10805437
    Abstract: A method of configuring a forwarding element that includes several data plane message processing stages. The method stores a set of action codes in an instruction memory in the data plane of the forwarding element. Each action code identifies an operation to perform on a field of a message received at the data plane. The method determines action codes required to process each field of the message in each message processing stage. The method configures a data-plane processing unit of the forwarding element to concurrently perform a group of the action codes in the same data plane processing stage when (i) the action codes are the same and (ii) operate on the same field of the message.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: October 13, 2020
    Assignee: Barefoot Networks, Inc.
    Inventors: Patrick Bosshart, Michael Gregory Ferrara, Michael E. Attig, Jay Evan Scott Peterson
  • Patent number: 10795798
    Abstract: An information processing apparatus includes a memory and a processor coupled to the memory. The processor is configured to acquire identification information of a process executed on a virtual machine and information indicating a behavior of the process at a time when the process is executed, and sequentially store the information in the memory. The processor is configured to refer to the information stored in the memory when a deployment of software in the virtual machine is detected, identify first identification information of a first process such that a change of the behavior at the time when the first process is executed before and after the deployment exceeds a predetermined first criterion. The processor is configured to notify the first identification information to a monitoring process that monitors an operation of the software.
    Type: Grant
    Filed: June 5, 2019
    Date of Patent: October 6, 2020
    Assignee: FUJITSU LIMITED
    Inventor: Nao Sekine
  • Patent number: 10798109
    Abstract: A system, method, and computer-readable medium are disclosed for generating an adaptive trust profile via an adaptive trust profile operation. In various embodiments the adaptive trust profile operation includes: monitoring a plurality of electronically-observable actions of an entity, the plurality of electronically-observable actions of the entity corresponding to a respective plurality of events enacted by the entity; converting the plurality of electronically-observable actions of the entity to electronic information representing the plurality of actions of the entity; and generating the adaptive trust profile based upon the plurality of actions of the entity, the adaptive trust profile being generated by an adaptive trust profile system.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: October 6, 2020
    Assignee: Forcepoint LLC
    Inventor: Richard A. Ford
  • Patent number: 10791128
    Abstract: A process to detect intrusions with an intrusion detection system is disclosed. The intrusion detection system identifies instance types, and each instance type includes an instance. A know compromised instance is identified from the plurality of instances. A link between the plurality instance types is traversed from the compromised instance to discover an additional compromised instance.
    Type: Grant
    Filed: September 28, 2017
    Date of Patent: September 29, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Svetlana Gaivoronski, Paul England, Mohamed Rouatbi, Mariusz H. Jakubowski, Marcus Peinado, Julian Federico Gonzalez, Jr.
  • Patent number: 10785244
    Abstract: An anomaly detection method includes: extracting, for each of a plurality of learning packets obtained, all possible combinations of N-grams in the payload included in the learning packet; counting a first number which is the number of occurrences of each combination in the payloads of the learning packets; calculating, as anomaly detection models, first probabilities by performing smoothing processing based on a plurality of the first numbers; and when the score calculated for each of a plurality of packets exceeds a predetermined threshold that is based on the anomaly detection models stored in a memory, outputting information indicating that the packet having the score has an anomaly.
    Type: Grant
    Filed: December 13, 2018
    Date of Patent: September 22, 2020
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Tatsumi Oba, Iku Ohama
  • Patent number: 10776179
    Abstract: Disclosed in the present invention are a multi-application-oriented user data management method and system. The method comprises a first application module receives an access instruction input by a first user, the first application module generates an authority request information according to the access instruction, wherein the authority request information includes information of the first application corresponding to the first application module, a platform server or an authority data storage server calls a user authority data of the first application according to the authority request information, and return the user authority data to the first application module, and the first application module obtains user data orienting to the first user of the first application according to the user authority data and user information of the first user.
    Type: Grant
    Filed: July 24, 2017
    Date of Patent: September 15, 2020
    Assignee: INTELLIGENT BUSINESS SOFTWARE (BEIJING) CO., LTD
    Inventor: Haining Wang
  • Patent number: 10771477
    Abstract: The profiling and fingerprinting of communication and control (C&C) infrastructure is disclosed herein. An initial C&C profile is transmitted to a first network monitoring system. The initial C&C profile includes a domain corresponding to a C&C channel, and a pattern corresponding to the C&C channel. At least in part in response to information received from a second network monitoring system, the initial C&C profile is revised. An updated C&C profile is transmitted to the first network monitoring system.
    Type: Grant
    Filed: April 16, 2019
    Date of Patent: September 8, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Zhi Xu, Cong Zheng
  • Patent number: 10769591
    Abstract: Systems, methods, and software are described herein for enhancing features within program applications. In an implementation, a user associated with a productivity application is identified and a service application associated with the user is identified. A service feature that corresponds to the service is enabled within the productivity application. The service feature allows the user to perform a function on content generated with the productivity application that is related to the service.
    Type: Grant
    Filed: January 28, 2019
    Date of Patent: September 8, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jennifer Hui-ni Hwang, Matthew Eckstein, Sam Franklin Williams, III
  • Patent number: 10769272
    Abstract: Systems, apparatuses and methods may provide for technology that associates a key domain of a plurality of key domains with a customer boot image, receives the customer boot image from the customer, and verifies the integrity of the customer boot image that is to be securely installed at memory locations determined from an untrusted privileged entity (e.g., a virtual machine manager).
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: September 8, 2020
    Assignee: Intel Corporation
    Inventors: David M. Durham, Karanvir S. Grewal, Sergej Deutsch, Michael Lemay
  • Patent number: 10764309
    Abstract: Analysis of samples for maliciousness is disclosed. A sample is executed and one or more network activities associated with executing the sample are recorded. The recorded network activities are compared to a malware profile. The malware profile comprises a set of network activities taken by a known malicious application during execution of the known malicious application. A verdict of “malicious” is assigned to the sample based at least in part on a determination that the recorded network activities match the malware profile.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: September 1, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Jun Wang, Wei Xu
  • Patent number: 10762179
    Abstract: Systems, methods, and storage media implemented by a computer for enabling tracking of software are disclosed. Exemplary implementations may: receive marking input code corresponding to a computer program; identify locations of the marking input code that can be modified in ways that preserve functionality of the computer program; choose at least one code transformation with associated intrinsic constants; derive derived constants from the specific intrinsic constants; apply the at least one chosen code transformation, including injecting the derived constants into the marking input code; saving the results of the above steps on computer readable media as marked code; and save metadata including a list of the derived constants on computer readable media in a file that is separate from the marked code.
    Type: Grant
    Filed: August 8, 2018
    Date of Patent: September 1, 2020
    Assignee: IRDETO B.V.
    Inventors: Catherine Chambers, Philip Allan Eisen, Robert Durand, Grant Goodes
  • Patent number: 10754951
    Abstract: Executable files are evaluated for malware in one or more lightweight executors, such as lightweight executor processes. An executable file is loaded and executed in a lightweight executor. Instructions in an execution path of the executable file are executed. Instructions in another execution path of the executable file are executed in another lightweight executor when a conditional branch instruction in an execution path has a suspicious condition. A fake kernel that mimics a real operating system kernel receives system calls, and responds to the system calls without servicing them in a way the real operating system kernel would. Runtime behavior of the executable file is observed for malware behavior. A response action, such as preventing the executable file from subsequently executing in a computer, is performed when the executable file is detected to be malware.
    Type: Grant
    Filed: June 15, 2018
    Date of Patent: August 25, 2020
    Assignee: Trend Micro Incorporated
    Inventors: Jie Tang, Weimin Wu, Kai Yu, Chengguo Zhang
  • Patent number: 10757223
    Abstract: A processor of a client device attempts to load a service using a first application that is pre-configured to communicate with a provider of the service during an initial loading of the first application. The processor determines that the first application has failed to load the service and responsively re-attempts to load the service using the first application. In response to determining that the first application has again failed to load the service during the re-attempt, the processor launches a second application that is not pre-configured to communicate with the provider during an initial loading of the second application. The processor retrieves, using the second application, from the provider, parameters for loading the service, and loads the service, using the second application, based on the parameters.
    Type: Grant
    Filed: September 13, 2018
    Date of Patent: August 25, 2020
    Assignee: Uber Technologies, Inc.
    Inventors: Benjamin Andrew Hjerrild, Naveen Pilanku Narayanan, Bruce McLaren Stanley, Jr.
  • Patent number: 10742678
    Abstract: In one embodiment, a security device maintains a plurality of security enclaves for a computer network, each associated with a given level of security policies. After detecting a given device joining the computer network, the security device places the given device in a strictest security enclave of the plurality of security enclaves in response to joining the computer network. The security device then subjects the given device to joint adversarial training, where a control agent representing behavior of the given device is trained against an inciting agent, and where the inciting agent attempts to force the control agent to misbehave by applying destabilizing policies. Accordingly, the security device may determine control agent behavior during the joint adversarial training, and promotes the given device to a less strict security enclave of the plurality of enclaves in response to the control agent being robust against the attempts by the inciting agent.
    Type: Grant
    Filed: February 8, 2018
    Date of Patent: August 11, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Manikandan Kesavan, Plamen Nedeltchev, Hugo Latapie, Enzo Fenoglio
  • Patent number: 10728275
    Abstract: A system and method are disclosed wherein a risk score is generated by interrogating multiple sources of information across a network. The information is aggregated, such that every network action for individuals and organizations are turned into a unique behavioral model, which can be used as a unique identifier (“fingerprint”). This fingerprint is in turn used by a personalized Trust Guardian System to block, modify and/or allow network actions.
    Type: Grant
    Filed: March 15, 2018
    Date of Patent: July 28, 2020
    Assignee: Lyft Inc.
    Inventors: Mark Adams, Daniel Meacham, Simon Meacham
  • Patent number: 10719600
    Abstract: Techniques are provided for client application authentication and include receiving a request to authenticate an application and, based on the received request to authenticate the application, sending a request to perform a push communication, including a short-term shared key, to a digital distribution system, wherein the digital distribution system is a distribution source of the application. The digital distribution system attempts to send the push communication including the short-term shared key to the application. The techniques may proceed by receiving a request for resources from the provider client application and determining whether the application has the short-term shared key. When it is determined that the application has provided the short-term shared key, the requested resources to the application may be provided, otherwise, the requested resources may be denied.
    Type: Grant
    Filed: June 21, 2018
    Date of Patent: July 21, 2020
    Assignee: ATLASSIAN PTY LTD
    Inventor: Jerry Cheng