Stand-alone Patents (Class 726/16)
-
Patent number: 12101349Abstract: A method for evaluating security of third-party application is disclosed. The method includes: in an automated test environment: launching a test instance of a first application; and obtaining a data access signature of the first application based on identifying at least one application state of the first application and account data retrieved by the first application from a user account at a protected data resource in the at least one application state; receiving, from a client device associated with the user account, an indication of access permissions for the first application to access the user account for retrieving account data; detecting a change in the data access signature of the first application; and in response to detecting the change in the data access signature of the first application, notifying the user of the detected change.Type: GrantFiled: September 16, 2019Date of Patent: September 24, 2024Assignee: The Toronto-Dominion BankInventors: Milos Dunjic, Arthur Carroll Chow, David Samuel Tax, Gregory Albert Kliewer, Anthony Haituyen Nguyen
-
Patent number: 12101321Abstract: Responsive to a start-up of an instance of a cloud-based computing environment, metadata that is stored in a virtual trusted platform module (vTPM) is accessed. The metadata represents configuration parameters for the instance, and the configuration parameters include a security credential. The instance is configured based on the metadata. The configuration includes configuring an access control of the instance with the security credential.Type: GrantFiled: January 31, 2022Date of Patent: September 24, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Toshimitsu Kani, Benjamin D. Lytle, Clark T. Laughlin, Robert C. Elliot
-
Patent number: 12093999Abstract: A method for cryptocurrency conversion includes: determining conversion information; sending the cryptocurrency to a settlement address; determining conversion orders; determining transaction completion; and executing the conversion orders.Type: GrantFiled: June 17, 2021Date of Patent: September 17, 2024Assignee: Coinbase, Inc.Inventors: Jeevan Maathur, Sahil Amoli, Bojan Joveski, John Zettler
-
Patent number: 12086244Abstract: A processor is configured to determine whether or not target data, this being data that a first application is attempting to access, is permitted data based on a correspondence relationship list, and to permit the first application to access the target data in cases in which the processor has determined the target data to be the permitted data, and not to permit the first application to access the target data in cases in which the processor has determined the target data not to be the permitted data.Type: GrantFiled: December 21, 2021Date of Patent: September 10, 2024Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHAInventor: Tomokazu Moriya
-
Patent number: 12063307Abstract: Disclosed are blockchain type contract terminal and method using position information. There are provided: an input module that is inputted with a contract term regarding an object of contract; a position information collection module that collects, in real time, position information of the object at the time of contract; a contract creation module that creates a contract by using the contract term inputted by the input module and the position information at the time of contract collected in real time by the position information collection module; a blockchain creation module that encrypts the contract created by the contract creation module to create a blockchain; and a blockchain distributed storage control module that transmits the blockchain created at the blockchain creation module to another terminal in a P2P manner for storing on a network in a distributed manner.Type: GrantFiled: October 16, 2019Date of Patent: August 13, 2024Assignee: CY2CODE CO. LTDInventors: Sang Yub Lee, So Dam Song, Do Kyung Rhee, Byeong Yong Rhee
-
Patent number: 12051271Abstract: To provide a technology of more accurately detecting spoofing in face authentication, without increasing a scale of a device configuration and a burden on a user. A spoofing detection device includes a facial image sequence acquisition unit, a line-of-sight change detection unit, a presentation information display unit, and a spoofing determination unit. The facial image sequence acquisition unit acquires a facial image sequence indicating the face of a user. The line-of-sight change detection unit detects information about a temporal change in the line-of-sight from the facial image sequence. The presentation information display unit displays presentation information presented to the user as part of an authentication process. The spoofing determination unit determines the likelihood of the face indicated by the facial image sequence being spoofing on the basis of the information about the temporal change in the line-of-sight with respect to the presentation information.Type: GrantFiled: May 23, 2023Date of Patent: July 30, 2024Assignee: NEC CORPORATIONInventor: Yusuke Morishita
-
Patent number: 12049382Abstract: A method includes creating an account with an elevator system; assigning a primary user to the account; assigning a secondary user to the account; associating elevator access privileges to the secondary user, the elevator access privileges including floors of a building that the secondary user can access via the elevator system.Type: GrantFiled: April 11, 2019Date of Patent: July 30, 2024Assignee: OTIS ELEVATOR COMPANYInventors: Paul A. Simcik, Pradeep Miriyala, Ranjith Vushakola
-
Patent number: 12026315Abstract: Methods and apparatus to identify haptic vibrations of touchscreens are disclosed. Example apparatus disclosed herein include means for generating a haptic control signal that is to cause vibrations of a haptic display means, the vibrations to simulate a texture corresponding to visual subject matter to be displayed on the haptic display means, the vibrations of the haptic display means to produce an acoustically detectable signal. Disclosed example apparatus also include means for encoding a watermark into the haptic control signal to generate a watermarked haptic control signal, the watermark including identification information to identify at least one of the subject matter or the texture, the watermark to modify the acoustically detectable signal.Type: GrantFiled: February 3, 2023Date of Patent: July 2, 2024Assignee: The Nielsen Company (US), LLCInventors: Alexander Pavlovich Topchy, Jeremey M. Davis
-
Patent number: 12021980Abstract: A processor includes a processor core. A register of the core is to store: a bit range for a number of address bits of physical memory addresses used for key identifiers (IDs), and a first key ID to identify a boundary between non-restricted key IDs and restricted key IDs of the key identifiers. A memory controller is to: determine, via access to bit range and the first key ID in the register, a key ID range of the restricted key IDs within the physical memory addresses; access a processor state that a first logical processor of the processor core executes in an untrusted domain mode; receive a memory transaction, from the first logical processor, including an address associated with a second key ID; and generate a fault in response to a determination that the second key ID is within a key ID range of the restricted key IDs.Type: GrantFiled: September 2, 2021Date of Patent: June 25, 2024Assignee: Intel CorporationInventors: Ido Ouziel, Arie Aharon, Dror Caspi, Baruch Chaikin, Jacob Doweck, Gideon Gerzon, Barry E. Huntley, Francis X. McKeen, Gilbert Neiger, Carlos V. Rozas, Ravi L. Sahita, Vedvyas Shanbhogue, Assaf Zaltsman
-
Patent number: 12019725Abstract: A system may be configured to perform edge device based multi-factor authentication. In some aspects, the system may capture a plurality of video frames, detect a first face within a first video frame, detect a second face within a second video frame, generate a first signature based on the first face and a second signature based on the second face, determine that the first signature matches the second signature, determine that a third video frame corresponds to a human, and verify that the first signature and second signature correspond to a first authentication credential of a known user. Further, the system may capture audio information, verify that the audio information corresponds to a second authentication credential of the known user, and provide physical access to a controlled area.Type: GrantFiled: February 3, 2022Date of Patent: June 25, 2024Assignee: Johnson Controls Tyco IP Holdings LLPInventors: Walter A. Wallach, Roman Solodov
-
Patent number: 12013939Abstract: Provided is an analysis system including: an operation analysis unit that analyzes operation of an analysis target program that is a target program to be analyzed, by executing the analysis target program in a second execution environment that is a computing environment for analysis, the second execution environment being configured to emulate at least a partial configuration of a first execution environment that is a computing environment for real operation where the analysis target program is able to be executed; and a configuration unit that builds the second execution environment capable of emulating a specific configuration of the first execution environment, the specific configuration relevant to an operation of the analysis target program, by modifying at least a partial configuration of the second execution environment in accordance with the operation of the analysis target program analyzed by the operation analysis unit.Type: GrantFiled: August 11, 2020Date of Patent: June 18, 2024Assignee: NEC CORPORATIONInventor: Masaru Kawakita
-
Patent number: 11983964Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.Type: GrantFiled: February 13, 2023Date of Patent: May 14, 2024Inventors: Laurence Hamid, Stephen Borza
-
Patent number: 11979410Abstract: Methods and systems provide for multi-factor authentication (MFA) of a user to a device or network in which a criteria for maintaining the authentication is based on the presence of the user before a device. After the user is authenticated and provided with access, a continuity criteria (i.e., a measure of the presence of the user before the device) must be fulfilled for that access to be maintained. When it is determined that the continuity requirement is not fulfilled, an aspect of the access is denied. A continuity criteria may be based on the location of a second computing device with respect to a first computing device. And multiple methods of determining continuity may be employed simultaneously, with access being denied when continuity is fulfilled by none of the methods.Type: GrantFiled: January 27, 2023Date of Patent: May 7, 2024Assignee: Lookout, Inc.Inventors: Tyler Croak, Brian James Buck, Pritesh Kasliwal
-
Patent number: 11977618Abstract: An electronic device having a cable includes a storage unit and a communication unit. The storage unit stores first authentication information used for an authentication communication directed to the electronic device and second authentication information used for an authentication communication directed to the cable. The communication unit is capable of responding to an authentication communication directed to the electronic device and is also capable of responding to an authentication communication directed to the cable.Type: GrantFiled: November 19, 2021Date of Patent: May 7, 2024Assignee: CANON KABUSHIKI KAISHAInventor: Hiroshi Moritomo
-
Patent number: 11954549Abstract: A point-of-sale system is a dual-screen stand assembly that includes a merchant terminal and a consumer terminal. The merchant terminal and the consumer terminal can be mated together in a fixed position to form a single unitary stand, or can be separated from each other in a separated position with each terminal serving as its own separate stand. The merchant terminal supports a merchant computing device and is oriented in a merchant-facing direction. The consumer terminal is detachably mated to the merchant terminal and supports a consumer computing device that is oriented in a consumer-facing direction. The point-of-sale system also includes a card reader as part of the customer terminal to perform a payment. The card reader is configured to accepting swipe cards, chip cards or contactless (EMV or NFC) payments.Type: GrantFiled: June 25, 2021Date of Patent: April 9, 2024Assignee: Block, Inc.Inventors: Yenliang Chen, Isreal Blagdan, Michael C. Lamfalusi, Kartik Lamba, Jeremy Wade
-
Patent number: 11947642Abstract: A method, apparatus, and computer program product for proactive offline authentication are provided. An example method includes determining a current offline condition of a computing device at a first time and determining a prior online condition of the computing device at a second time that is earlier than the first time at which the computing device generated second authentication credentials based upon one or more user attributes obtained from a digital identity construct database associated with a first user at the second time. The method further includes obtaining, at the first time, first authentication credentials associated with the first user and determining a discrepancy between the first and the second authentication credentials. In response to the determined discrepancy, the method includes generating an authentication token based upon the second authentication credentials for authenticating a first user device of the first user with the computing device.Type: GrantFiled: August 17, 2021Date of Patent: April 2, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Peter Bordow, Jeff J. Stapleton, Ramesh Yarlagadda
-
Patent number: 11948364Abstract: An electronic apparatus operated by a sales clerk includes a display, a camera configured to capture an image of a code displayed on a screen of a portable registration apparatus operated by a customer in a store, the code corresponding to one or more commodities to be purchased and check data indicating whether each of said one or more commodities needs to be checked by the sales clerk before being checked out, and a processor configured to, when the image of the code is captured by the camera, acquire information indicating said one or more commodities to be purchased and the check data using the code, and control the display to display a screen showing one or more commodities that need to be checked by the sales clerk based on the acquired information.Type: GrantFiled: December 12, 2022Date of Patent: April 2, 2024Assignee: Toshiba Tec Kabushiki KaishaInventors: Kenya Hiramatsu, Akiko Susaki, Tsuyoshi Gotanda, Takashi Nakajima
-
Patent number: 11943228Abstract: Disclosed embodiments relate to iteratively developing profiles for network entities. Operations may include accessing a set of permissions associated with a network entity; obtaining a set of permission vectors for the network entity based on the set of permissions; evaluating each permission vector within the set of permission vectors for iteratively developing a profile for the network entity, the evaluation being based on at least: whether each permission vector within the set of permission vectors provides sufficient privileges for the network entity to perform an action, and a predefined rule; creating a new set of permission vectors for the network entity based on at least the selected group of the set of permission vectors; iterating the evaluation for the new set of permission vectors; determining whether an iteration termination condition has been met; and terminating the iteration based on the iteration termination condition being met.Type: GrantFiled: October 27, 2021Date of Patent: March 26, 2024Assignee: CYBERARK SOFTWARE LTD.Inventor: Michael Balber
-
Patent number: 11936787Abstract: A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.Type: GrantFiled: May 6, 2020Date of Patent: March 19, 2024Assignee: Winkk, Inc.Inventor: Robert O. Keith, Jr.
-
Patent number: 11929997Abstract: A system, apparatus, method, and machine readable medium are described for performing advanced authentication techniques and associated applications. For example, one embodiment of a method comprises: receiving a policy identifying a set of acceptable authentication capabilities; determining a set of client authentication capabilities; and filtering the set of acceptable authentication capabilities based on the determined set of client authentication capabilities to arrive at a filtered set of one or more authentication capabilities for authenticating a user of the client.Type: GrantFiled: April 23, 2019Date of Patent: March 12, 2024Assignee: Nok Nok Labs, Inc.Inventors: Marc Briceno, Brendon Wilson, Ramesh Kesanupalli, Davit Baghdasaryan, Rajiv Dholakia, William J. Blanke, Rolf Lindemann, Igor Polivanyi, Avinash Umap
-
Patent number: 11914718Abstract: The present disclosure relates to a method for booting a processing device, the method including: generating, by a monotonic counter and during a first boot phase, a first count value; transmitting, by the monotonic counter, the first count value to an access control circuit of a memory; reading, on the basis of the first count value, first data stored in the memory; and generating, by the monotonic counter and during a second boot phase, a second count value greater than the first count value. The access control circuit of the memory is configured so that the reading of the first data is not authorized on the basis of the second count value.Type: GrantFiled: March 29, 2022Date of Patent: February 27, 2024Assignees: STMicroelectronics (Alps) SAS, STMicroelectronics (Grand Ouest) SASInventors: Franck Albesa, Nicolas Anquet
-
Patent number: 11916611Abstract: Aspects presented herein may enable a base station to share trained neural network from one UE to other UE(s) to improve the efficiency of a neural network training. In one aspect, a base station receives, from a first UE, one or more ML model parameters based on a first zone ID that identifies a first geographical zone, the one or more ML model parameters being associated with the first zone ID or the first geographical zone or both. The base station provides the one or more ML model parameters to a second UE based on at least one of the zone ID or the first geographical zone.Type: GrantFiled: March 15, 2021Date of Patent: February 27, 2024Assignee: QUALCOMM IncorporatedInventors: Hamed Pezeshki, Tao Luo, Sony Akkarakaran
-
Patent number: 11909869Abstract: Communication methods and apparatus are described. One communication method includes that user equipment (UE) sends an N1 message to a security anchor function (SEAF), where the N1 message carries a Diffie-Hellman (DH) public parameter or a DH public parameter index, the N1 message further carries an encrypted identifier of the UE, and the encrypted identifier is obtained by encrypting a permanent identifier of the UE and a first DH public key. The UE receives an authentication request that carries a random number and that is sent by the SEAF. The UE sends, to the SEAF, an authentication response used to respond to the authentication request, where the authentication response carries an authentication result calculated based on a root key and the random number.Type: GrantFiled: June 23, 2021Date of Patent: February 20, 2024Assignee: Huawei Technologies Co., Ltd.Inventors: Xin Kang, Haiguang Wang, Zhongding Lei, Bo Zhang
-
Patent number: 11899855Abstract: The disclosure herein describes changing a mode of operation of a computing device using signals from a pen device. The pen device obtains gesture input data from at least one sensor of the pen device and the obtained gesture input data is compared to at least one gesture pattern. Based on the gesture input data matching the at least one gesture pattern, the pen device transitions to an active state. The pen device detects, via an electrostatic communication channel, an uplink signal from the computing device and sends a signal to change a mode of operation of the computing device by at least one of a network interface or a communication channel, other than the electrostatic communication channel. Changing modes of operation of a computing device provides a flexible, stream-lined way to enhance the user experience of using a computing device with a pen device (e.g., performing an initial pairing process).Type: GrantFiled: February 1, 2022Date of Patent: February 13, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Ilan Geller, Nadav Linenberg, Eran Arbel, Uri Ron, Amir Zyskind
-
Patent number: 11893119Abstract: A vehicle control apparatus may include a host including a driving application of a vehicle controller and a hardware security module that determines whether to transmit a message for allowing booting of the host to the host, according to a result of a secure boot at an n-th cycle, and determines whether to perform the secure boot at a (n+1)-th cycle, depending on whether the message is transmitted to the host.Type: GrantFiled: September 24, 2021Date of Patent: February 6, 2024Assignees: HYUNDAI MOTOR COMPANY, KIA CORPORATIONInventor: Ho Jin Jung
-
Patent number: 11876803Abstract: A method of authorizing a client device to a service includes, by a customer electronic device associated with a customer: defining an access control list that includes permissions for authorized clients of the customer, creating authorization tokens and encoding the ACL into each of the authorization tokens, and distributing the authorization tokens to the authorized clients. The method includes, by a data center that provides a service to one or more of the authorized clients: receiving a service request for the service from a requesting client that includes a submitted authorization token, decoding the submitted authorization token to identify a received ACL in the submitted authorization token, analyzing the received ACL to determine whether the requesting client is an authorized client and the permissions in the received ACL grant the requesting client permission to access the service, and if so, providing the service to the requesting client.Type: GrantFiled: August 3, 2020Date of Patent: January 16, 2024Assignee: PubNub, Inc.Inventor: Jason Oster
-
Patent number: 11870786Abstract: The present disclosure involves systems, software, and computer implemented methods for access control for object instances. A method includes receiving, at a cloud application, a user request associated with a user. The user request corresponds to an instance of a first application artifact type. Role assignments for the user are retrieved from a cloud platform and a determination is made that the role assignments grant permission to the first application artifact type to the user. A determination is made that a first instance-based access policy exists for the first application artifact type. A determination is made regarding whether the first instance-based access policy grants permission for the user to access the instance. The user request is serviced in response to determining that the first instance-based access policy grants permission for the user to access the instance.Type: GrantFiled: August 15, 2022Date of Patent: January 9, 2024Assignee: SAP SEInventors: Marco Koch, Stefan Boller, Manfred Schmid
-
Patent number: 11863674Abstract: Systems and methods of Exact Data Matching (EDM) for identifying related tokens in data content using structured signature data implemented in a cloud-based system receiving data sets and customer configuration from a customer, wherein the data sets include customer specific sensitive data from a structured data source with each token represented by a hash value and the customer configuration includes one or more primary keys for a plurality of records in the data sets; distributing the data sets and the customer configuration to a plurality of nodes in the cloud-based system; performing monitoring of content between a client of the customer and an external network; detecting a presence of a plurality of tokens associated with a record in the customer specific sensitive data based on the monitoring; and performing a policy-based action in the cloud-based system based on the detecting.Type: GrantFiled: December 23, 2020Date of Patent: January 2, 2024Assignee: Zscaler, Inc.Inventors: Balakrishna Bayar, Arun Bhallamudi, Srikanth Devarajan, Siva Udupa, Pooja Deshmukh
-
Patent number: 11860987Abstract: The purpose of the present invention is to provide a portable terminal and an application software start-up system whereby the application software that is started up is limited depending on the state of a user, thereby providing an improved ease of use. For this purpose, an application software start-up method for an information processing device comprises: performing identity authentication based on static biological information; determining the state of the user by comparing dynamic biological information acquired from the body of the user with previously measured dynamic biological information; and limiting the application software that is started up in accordance with the determined state of the user and on the basis of a permission level that is set in advance for each application software item.Type: GrantFiled: September 28, 2022Date of Patent: January 2, 2024Assignee: Maxell, Ltd.Inventors: Masayuki Hirabayashi, Yasunobu Hashimoto, Kazuhiko Yoshizawa
-
Patent number: 11862174Abstract: Techniques for processing voice commands from a locked device are described. A voice command received by a locked device is stored, a prompt requesting that the device be unlocked is generated, and the voice command is processed automatically after the device is unlocked. Thus, the system processes the voice command without the user repeating the voice command. In addition, the system may process certain voice commands even when the device is locked. For example, a whitelist filter compares an intent associated with the voice command to whitelisted intents from a whitelist database before the intent is dispatched to a speechlet, and intents included in the whitelist database are processed normally. Thus, the system performs certain voice commands while the device is locked, while other voice commands may be automatically processed after the device is unlocked without the user repeating the voice command.Type: GrantFiled: March 23, 2021Date of Patent: January 2, 2024Assignee: Amazon Technologies, Inc.Inventors: Haitang Wang, Ankur Narendra Bhai Vachhani
-
Patent number: 11842071Abstract: A data transfer device includes: a plurality of masters each having a buffer and configured to calculate a remaining-time counter based on an amount of data in the buffer; a memory system configured to perform data transfer with the plurality of masters and having a memory access prohibition period during which access from the plurality of masters is intermittently prohibited; a bus arbiter configured to arbitrate the plurality of masters based on the remaining-time counter; and a remaining-time counter-adjusting part configured to add a remaining-time counter offset, which adjusts the remaining-time counter until the start of the memory access prohibition period, to at least one of the plurality of masters.Type: GrantFiled: May 3, 2022Date of Patent: December 12, 2023Assignee: OLYMPUS CORPORATIONInventors: Yutaka Murata, Ryusuke Tsuchida
-
Patent number: 11836246Abstract: A computer-implemented method of making secure computer products is described, including a computer-implemented method of configuring a computer system configured to run an operating system, wherein the method of to enable the computer system to resist the execution of unauthorised software, the method comprising: instantiating an application programming interface to enable an application running on the computer system to access the functionality of the operating system; and applying a transform to the application programming interface to modify the application programming interface.Type: GrantFiled: November 14, 2019Date of Patent: December 5, 2023Assignee: Secure Micro LTDInventors: Ali Rohafza, Martin Serpell
-
Patent number: 11822652Abstract: Described herein are systems and methods for prime and probe attack mitigation. For example, some methods include, responsive to a cache miss caused by a process, checking whether a priority level of the process satisfies a first priority requirement of a first cache block of a cache with multiple ways including cache blocks associated with respective priority requirements; responsive to the priority level satisfying the first priority requirement, loading the first cache block; and, responsive to the priority level satisfying the first priority requirement, updating the first priority requirement to be equal to the priority level of the process.Type: GrantFiled: September 29, 2022Date of Patent: November 21, 2023Assignee: Marvell Asia Pte, Ltd.Inventor: Shubhendu Sekhar Mukherjee
-
Patent number: 11818134Abstract: Techniques for performing application programming interface (API)-level validation of API requests to infrastructure resources in a cloud computing environment are provided. One technique includes receiving an API request from a user to access a cloud computing service in the cloud computing environment. A determination is made as to whether at least one action indicated in the API request is allowed to be performed, based at least in part on one or more parameters of the API request. Upon determining that the at least one action is allowed to be performed, the API request is forwarded to the cloud computing service.Type: GrantFiled: September 30, 2020Date of Patent: November 14, 2023Assignee: Amazon Technologies, Inc.Inventors: Alex Gibson, Md Maruful Hassan, Seongyeol Cho, Ethige Asin Kalmina Silva
-
Patent number: 11816209Abstract: A computer-implemented method for protecting data on devices may include (i) identifying a device that is operated by a user and that comprises private data pertaining to the user, (ii) determining that stalkerware on the device is sending the private data to an unauthorized device not operated by the user, (iii) requesting, in response to determining that the stalkerware is sending the private data to the unauthorized device, that the user select at least one safety plan step from a set of safety plan options, and (iv) modifying, at least in part based on the safety plan step selected by the user, outgoing data sent by the stalkerware to the unauthorized device. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: February 3, 2021Date of Patent: November 14, 2023Assignee: GEN DIGITAL INC.Inventors: Yufei Han, Kevin Roundy, Acar Tamersoy, Daniel Kats
-
Patent number: 11799853Abstract: Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect business enterprises, consumers, and other entities from fraud by combining biometric activity data with facial recognition data for end users. Risks associated with various entities can be analyzed and assessed based on a combination of user liveliness check data, facial image data, social network data, and/or professional network data, among other data sources. In various embodiments, the risk assessment may include calculating an authorization score or authenticity score based on different portions or combinations of the collected and processed data.Type: GrantFiled: December 14, 2020Date of Patent: October 24, 2023Assignee: Socure, Inc.Inventors: Sunil Madhu, Xinyu Li, Justin Kamerman
-
Patent number: 11799860Abstract: Systems and methods include providing a user interface to an administrator associated with a tenant of a cloud-based system, wherein the tenant has a plurality of users each having an associated user device; receiving a plurality of client forwarding policies for the plurality of users, wherein each client forwarding policy of the client forwarding policies define rules related to how application requests from the plurality of users are forwarded for zero trust access; and providing the rules to corresponding user devices of the plurality of users.Type: GrantFiled: November 24, 2020Date of Patent: October 24, 2023Assignee: Zscaler, Inc.Inventors: Kunal Shah, John A. Chanak, David Creedy
-
Patent number: 11792237Abstract: Embodiments of the present disclosure provide methods, apparatus, systems, computer program products for supporting communication functionality in an interactive electronic technical manual system (IETM) configured to provide electronic and credentialed access via an IETM viewer to technical documentation for an item. In one embodiment, a method is provided comprising: providing a window comprising a communication session option; receiving input of a selection of the communication session option; responsive to receiving the input: identifying active users who are signed into the IETM for a particular object of the item based on credentials for the user and the user being signed into the IETM for the particular object; and causing display of an identifier for each active user on the window as selectable; receiving input of a selection of an indicator for an active user; and responsive to receiving the input, initiating a communication session with the active user within the IETM.Type: GrantFiled: September 24, 2020Date of Patent: October 17, 2023Assignee: MBTE HOLDINGS SWEDEN ABInventors: Ran Meriaz, Yoram Meriaz, Alexander Tkachman
-
Patent number: 11790063Abstract: An information processing apparatus is provided. The apparatus performs operations comprising performing facial authentication of a second user in a state in which a first user is logged in, performing authentication of a user using a second scheme that is different from facial authentication if the facial authentication is successful, and switching a logged-in user from the first user to the second user if the authentication using the second scheme is successful and the authenticated user is the second user.Type: GrantFiled: September 3, 2020Date of Patent: October 17, 2023Assignee: CANON KABUSHIKI KAISHAInventor: Yuki Narita
-
Patent number: 11785286Abstract: There is provided a display apparatus which includes an input device having a plurality of video signal terminals including a digital video signal terminal, a display configured to display an input signal which is input from the input device, and a controller configured to set a search time of a digital video signal in accordance with presence or absence of power supply to a power supply terminal of the digital video signal terminal, and a connection status in a case in which the power supply is present, and configured to execute a search of the digital video signal in the search time.Type: GrantFiled: March 17, 2022Date of Patent: October 10, 2023Assignee: CASIO COMPUTER CO., LTD.Inventor: Tomoya Makino
-
Patent number: 11784982Abstract: A secure content delivery or access method may include coordination among three devices such as servers—a content management server, a delivery server, and an authorization server. A request for content may originate from an authorization server application, and may involve the application obtaining two digitally signed tokens for the request. The first token may be from the authorization server, and may include a content management server identifier for the requested content. The second token may include two identifiers for the content: the first identifier being the content management server identifier, and the second being a delivery server identifier. The first and second tokens may be signed by the authorization server and content management server, respectively, and may be delivered to the delivery server for validation. Successful validation may result in the delivery server providing a content decryption key for the requested content to a device requesting the content.Type: GrantFiled: July 9, 2020Date of Patent: October 10, 2023Assignee: Comcast Cable Communications, LLCInventor: Jonathan Moore
-
Patent number: 11775627Abstract: The device outputs, to a display device, display information on a symbol which is to be moved and displayed; acquires a face image of a subject which has been captured by an image capturing device at a capturing timing while the display device displays the symbol; detects, from the face image, a line-of-sight position; determines that the subject of the face image is a living body when one or more prescribed conditions including a case in which the line-of-sight position matches a display position of the symbol at the image-capturing timing are all satisfied; and outputs an authentication result indicating success of the authentication when the subject is determined to be a living body and the biometric authentication is successful, and outputs an authentication result indicating failure of the authentication when the subject is determined not to be a living body or when the biometric authentication fails.Type: GrantFiled: December 16, 2022Date of Patent: October 3, 2023Assignee: NEC CORPORATIONInventor: Ikuko Sakai
-
Patent number: 11776306Abstract: Some embodiments of the present disclosure relate to biometric characteristic detection technology, which provide a method and chip for biometric characteristic acquisition, and a computer readable storage medium. The method for biometric characteristic acquisition includes: acquiring a plurality of configuration parameters, where the plurality of configuration parameters include a first exposure duration, parameters defining a first region and a target photosensitive value, where the first region is a local region in a photosensitive region of the chip for biometric characteristic acquisition; exposing the first region according to the first exposure duration, and acquiring a photosensitive value of the first region; determining a second exposure duration required to acquire the target photosensitive value in the photosensitive region according to the photosensitive value of the first region and the first exposure duration; and acquiring a biometric image according to the second exposure duration.Type: GrantFiled: June 23, 2022Date of Patent: October 3, 2023Assignee: SHENZHEN GOODIX TECHNOLOGY CO., LTD.Inventors: Xiaogang Qing, Meng Lv, Chao Yuan
-
Patent number: 11771059Abstract: A computer-implemented method and system for tracking near-field communication (NFC)-enabled animals with a portable computing device (PCD) (i.e. mobile phone) may include providing an NFC-tag comprising memory in which the memory contains a unique identifier. The NFC-tag may be coupled to an animal and then the NFC-tag may be scanned with the PCD. A tag identification server may determine if data from the NFC-tag exists in a database and then transmits an animal production facility identifier and one or more animal records associated with data from the NFC-tag from the tag identification server if the data from the NFC-tag exists in the database. Access to a secure memory area on the portable computing device containing a complete set of animal records for an entire animal facility may be granted if the software identifier matches the animal production facility identifier received from the tag identification server.Type: GrantFiled: August 31, 2018Date of Patent: October 3, 2023Assignee: BOEHRINGER INGELHEIM ANIMAL HEALTH USA INC.Inventor: Pierre-Emmanuel Deliou
-
Patent number: 11765163Abstract: An electronic device performs techniques related generally to implementing biometric authentication. In some examples, a device provides user interfaces for a biometric enrollment process tutorial. In some examples, a device provides user interfaces for aligning a biometric feature for enrollment. In some examples, a device provides user interfaces for enrolling a biometric feature. In some examples, a device provides user interfaces for providing hints during a biometric enrollment process. In some examples, a device provides user interfaces for application-based biometric authentication. In some examples, a device provides user interfaces for autofilling biometrically secured fields. In some examples, a device provides user interfaces for unlocking a device using biometric authentication. In some examples, a device provides user interfaces for retrying biometric authentication. In some examples, a device provides user interfaces for managing transfers using biometric authentication.Type: GrantFiled: July 13, 2022Date of Patent: September 19, 2023Assignee: Apple Inc.Inventors: Marcel Van Os, Peter D. Anton, Arian Behzadi, Jonathan R. Dascola, Lynne Devine, Alan C. Dye, Christopher Patrick Foss, Bradley W. Griffin, Jonathan P. Ive, Joseph A. Malia, Pedro Mari, Daamun Mohseni, Grant Paul, Daniel Trent Preston, William M. Tyler
-
Patent number: 11755754Abstract: Techniques for automatically discovering relationships between data to enforce data security are disclosed. In some embodiments, a query analytic system receives a set of one or more queries that accesses data from a set of data objects and is generated by an application to accomplish an application-level function that is opaque to the query analytic system. The query analytic system detects a relationship between a first data object and a second data object based on access patterns associated with the set of one or more queries. The query analytic system further stores an indication that the first data object is related to the second data object. An operation that is performed against the first object may also be performed against the second object based on the stored indication. Additionally or alternatively, information about the second object may be displayed when information about related objects is requested for the first object.Type: GrantFiled: June 21, 2019Date of Patent: September 12, 2023Assignee: Oracle International CorporationInventors: Vijay Simha Joshi, Hozefa Yusuf Palitanawala, Pallab Rath, Bharat Shrikrishna Paliwal, John Chaitanya Kati
-
Patent number: 11755824Abstract: Systems and methods for predicting and moderating signature locations include an electronic document to be signed, a user of the electronic document, and a user communication device. The user provides free text inputs in the text input module of the system for the requirements of signatures in the document. A signature fields finder module analyses inputs of the user based on heuristic training patterns and screens and maps all the pages of the document for placing signature boxes. The system then places signature tags in the signature boxes. The user selects the signer parties present in the signature boxes and the system compiles signature tags for that party. The user. using the signature tag moderator module, can add, delete or adjust the signature tags and the user gets to see all the relevant pages of the document with compiled signature tags for moderation purposes by the user.Type: GrantFiled: February 28, 2022Date of Patent: September 12, 2023Assignee: Certinal Software Private LimitedInventors: Kanishka Ghosh, Krishnendu Chattopadhyaya
-
Patent number: 11734981Abstract: Disclosed herein are apparatuses and methods for granting entry through a checkpoint. The implementations include receiving a request for entry of a person through a checkpoint. The implementations include estimating, via a thermal sensor, a body surface temperature of the person, and generating, via a user interface, a notification that prompts the person to answer at least one verification question. The implementations include receiving, via the user interface, at least one user response to the at least one verification question. The implementations include determining whether the at least one user response and the body surface temperature match criteria for gaining entry through the checkpoint. Additionally, the implementations include granting the request for entry in response to determining that the at least one user response and the body surface temperature match the criteria.Type: GrantFiled: January 7, 2021Date of Patent: August 22, 2023Assignee: Johnson Controls Tyco IP Holdings LLPInventors: Jason M. Ouellette, Allen Houston, David S. Pinney, Lipphei Adam
-
Patent number: 11736344Abstract: Examples described herein relate to systems and methods for containing a faulty stimulus. A computer-implemented method may include listing in a suspect list every received stimulus including the faulty stimulus, and implicitly testing the stimuli by respectively acting upon those stimuli by a software application. Responsive to successfully acting upon each of the stimuli besides the faulty stimulus, each non-faulty stimulus is deleted from the suspect list and, responsive to such deletion, made available to a downstream node. Responsive to acting upon the faulty stimulus, the software application crashes which leaves the faulty stimulus listed in the suspect list. The software application then restarts and deems the faulty stimulus as being faulty based upon the faulty stimulus still being listed in the suspect list after the restart.Type: GrantFiled: March 29, 2022Date of Patent: August 22, 2023Assignee: Level 3 Communications, LLCInventor: William Crowder
-
Patent number: 11720333Abstract: The examples described herein extend application lifecycle management (ALM) processes (e.g., create, update, delete, retrieve, import, export, uninstall, publish) to user-created application platform components. First and second components are generated within an application platform. The first component is customized at least by indicating whether the first component is subject to localization, defining a layering of the first component, and indicating whether the first component is protected from downstream modification. The second component is customized in accordance with customizing the first component, and is further customized by defining a dependency of the second component on the first component. The components are deployed in a target environment with metadata representing the customizations and enabling the ALM processes.Type: GrantFiled: October 25, 2021Date of Patent: August 8, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Marcio Costa, Jr., Emma Chantal Oberstein, Vinay Singh, Shannon Ronald McArthur