Policy Patents (Class 726/1)
  • Patent number: 11906322
    Abstract: Provided are an environment map management device, an environment map management system, an environment map management method, and a program that are capable of generating a common environment map that takes into consideration privacy of each of users simultaneously with securing a space covered by an environment map available to the each of users. A processing data transmitting section accesses an individual environment map available to a user of interest. The processing data transmitting section accesses a common environment map available to a plurality of users including the user of interest. A SLAM processing execution section adds, to the individual environment map, environment information generated on the basis of sensing data acquired by a tracker used by the user of interest. A transmitting control section controls whether or not to add the environment information to the common environment map, according to a privacy attribute corresponding to the environment information.
    Type: Grant
    Filed: March 1, 2019
    Date of Patent: February 20, 2024
    Assignee: Sony Interactive Entertainment Inc.
    Inventor: Yoshinori Ohashi
  • Patent number: 11909773
    Abstract: Systems and methods disclosed can evaluate security detection rules in a network security computing environment. Results for a processed log of security events can be retrieved. The results can identify determined outcomes for instances triggering security detection rules. The security detection rules can detect specific behavior on a network by being processed against a log of security events. Scores for the security detection rules can be determined based on the results of the processed log of security events and the determined outcomes. The security detection rules can be ranked based on the scores, from highest to lowest score. The highest score can indicate that a corresponding rule is performing worst among the security detection rules and the lowest score can indicate that a corresponding rule is performing best among the security detection rules. A rules score report can be generated based on the ranked rules.
    Type: Grant
    Filed: January 28, 2022
    Date of Patent: February 20, 2024
    Assignee: Target Brands, Inc.
    Inventors: Paul Hutelmyer, Adam Blake
  • Patent number: 11907366
    Abstract: The technology disclosed teaches incident-driven and user-targeted data loss prevention that includes a CASB controlling infiltration via cloud-based services storing documents in use by organization users, by monitoring manipulation of the documents. The CASB identifies the cloud-based services that the particular user has access to and at least one document location on the cloud-based services to inspect for sensitive documents, in response to receiving an indication that user credentials have been compromised. The CASB performs deep inspection of documents identified as stored at the location and detects at least some sensitive documents. Based on the detected sensitive documents, the CASB determines an exposure for the organization due to the particular user.
    Type: Grant
    Filed: July 22, 2022
    Date of Patent: February 20, 2024
    Assignee: Netskope, Inc.
    Inventor: Krishna Narayanaswamy
  • Patent number: 11907399
    Abstract: A highly secure networked system and methods for storage, processing, and transmission of sensitive information are described. Sensitive, e.g. personal/private, information is cleansed, salted, and hashed by data contributor computing environments. Cleansing, salting, and hashing by multiple data contributor computing environments occurs using the same processes to ensure output hashed values are consistent across multiple sources. The hashed sensitive information is hashed a second time by a secure facility computing environment. The second hashing of the data involves a private salt inaccessible to third parties. The second hashed data is linked to previously hashed data (when possible) and assigned a unique ID. Data dictionaries are created for particular individuals provided access to the highly secure information, e.g. researchers.
    Type: Grant
    Filed: April 13, 2023
    Date of Patent: February 20, 2024
    Assignee: Optum, Inc.
    Inventor: Robin Edison
  • Patent number: 11907943
    Abstract: Embodiments disclosed are directed to ensuring resource compliance within a cloud-based environment using a compliance system. The embodiments include steps for performing pre-provisioning checks of resources, such as network protocols, prior to their deployment within the cloud-based environment. The compliance system may include a number of components for performing the pre-provisioning check including a maintenance module, a collection module, and an evaluation module, which are used to evaluate the resource prior to deployment in the cloud-based environment.
    Type: Grant
    Filed: November 1, 2021
    Date of Patent: February 20, 2024
    Assignee: Capital One Services, LLC
    Inventors: Brian Lee Wong, Virendra K. Abelak, Steven Lott, Philip Austin Kedy
  • Patent number: 11909723
    Abstract: Techniques for auto-starting a VPN in a MAM environment are disclosed. A MAM-controlled application is launched on a computer system. Policy is queried and a determination is made as to whether to auto-start a VPN application based on the policy. Based on the policy, the VPN application is auto-started, and the VPN application initiates a VPN tunnel that is usable by at least the MAM-controlled application. Network communications transmitted to or from the MAM-controlled application then pass through the VPN tunnel.
    Type: Grant
    Filed: June 15, 2021
    Date of Patent: February 20, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: James Matthew Hamilton Oakley, Neil Adam Jacobson
  • Patent number: 11909765
    Abstract: Established user habits in carrying multiple wirelessly detectable devices are used to provide or substantiate authentication. In some embodiments, simply detecting that expected devices are co-located within a limited spatial region is sufficient to establish that the devices are being carried by a single individual. In other embodiments, particularly where the potential for spoofing by multiple individuals is a concern, single-user possession of the devices may be confirmed by various corroborative techniques. This approach affords convenience to users, who may be working at a device that lacks the necessary modality (e.g., a fingerprint or vein reader) for strong authentication.
    Type: Grant
    Filed: May 10, 2019
    Date of Patent: February 20, 2024
    Assignee: Imprivata, Inc.
    Inventors: David M. T. Ting, Alain Slak, Kyle Vernest
  • Patent number: 11907314
    Abstract: Methods and systems for generating an integrated structure for the data from disparate data domains that may be used to aggregate, compare, and/or provide recommendations based on the data available from the disparate domains. The integrated structure may further be accessible to users to perform functions (e.g., searches, filtering operations, etc.) in real-time and receive outputs (e.g., in a user interface).
    Type: Grant
    Filed: September 21, 2021
    Date of Patent: February 20, 2024
    Assignee: Snagajob.com, Inc.
    Inventors: John Moon, Keith Forshew, Ruhollah Farchtchi, Fabio Rosati
  • Patent number: 11909771
    Abstract: A Domain Name System (DNS) device stores data indicative of a user device and data indicative of a policy setting a level of access of the user device to a responding device. The DNS device receives, from the user device, a request for an Internet Protocol address of the responding device. The DNS device determines, based upon the request and the data indicative of the user device, that the policy applies to the request. The DNS device applies the policy in response to the determining.
    Type: Grant
    Filed: June 1, 2020
    Date of Patent: February 20, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Darrin Joseph Miller, Kevin Patrick Regan, Einar Nilsen-Nygaard
  • Patent number: 11907396
    Abstract: Described are methods and systems for using policies to comply with a person's request for data pertaining to the person, pursuant to applicable data privacy laws. A policy is retrieved responsive to receiving a query that includes data to identify records that store data pertaining to the person. The policy indicates first and second database objects, and respective first and second sets of fields, which store data that pertains to persons. The policy is applied. Applying the policy includes retrieving, as first values, data stored in the first set of fields of a first record associated with the data in the query, and retrieving, as second values, data stored in the second set of fields of a second record associated with the first record. The first and second values, and the names of the fields from which they were retrieved, are stored in a document.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: February 20, 2024
    Assignee: Salesforce, Inc.
    Inventors: Shivan Kaul Sahib, Marla Hay, Yvonne Zhou, Yu Chen
  • Patent number: 11902329
    Abstract: A system for managing security on a cloud management platform portal (CMPP (1)), the system comprising a set of routines (scripts) which are executed on a computing device or processor allowing the cloud management platform portal to contact a cloud automation service (CAS (4)) so as to provision services to a customer, and a ServiceNow (2) (SNOW) application comprising at least one of a set of routines comprising at least one of certain specified network Standard Service Requests and/or network activity Standard Service Requests.
    Type: Grant
    Filed: December 16, 2020
    Date of Patent: February 13, 2024
    Assignee: AGARIK SAS
    Inventors: Konrad Clapa, Olena Zhuk
  • Patent number: 11899719
    Abstract: The system determines whether content such as an image is suitable for content modification based on one or more criteria. The system includes decision engines or modules configured to evaluate one or more suitability metrics based on corresponding criteria such as publication status, restriction status, context, compatibility, and classification. If content is unsuitable for content modification because of entities or context depicted therein, privacy status, incompatibility with content modification, properties of the content file itself, or other aspects, the system generates a tag indicating the content is unsuitable for content modification. If content is suitable for content modification because of entities or context depicted therein, publication status, compatibility with content modification, properties of the content file itself, or other aspects, the system generates a content modification tag indicating the content is suitable for content modification.
    Type: Grant
    Filed: February 10, 2022
    Date of Patent: February 13, 2024
    Assignee: Rovi Guides, Inc.
    Inventor: Alejandro Sanchez Pulido
  • Patent number: 11902233
    Abstract: Disclosed herein is an example communication apparatus that includes processor circuitry to execute instructions to: determine a context of a message; perform a comparison of the context of the message with a target recipient emotional state; apply a rule to select an action for the message based on the comparison; cause performance of the action; determine an effect of the action on an emotional state of a user; and update the rule based on the effect.
    Type: Grant
    Filed: August 23, 2022
    Date of Patent: February 13, 2024
    Assignee: Intel Corporation
    Inventors: Daria A. Loi, Ramune Nagisetty, Glen J. Anderson, Pete A. Denman
  • Patent number: 11899761
    Abstract: The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.
    Type: Grant
    Filed: May 26, 2022
    Date of Patent: February 13, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Sunay Vaishnav, Merwan Vishnu Hade, Stephen Christopher Siciliano, David Nissimoff, Fnu Anubhav
  • Patent number: 11899760
    Abstract: An automated system tracks digital service providers (DSP) data management agreements, and user behavior, individually and in aggregate, to determine potential changes for a personal/corporate privacy charter. The personal/corporate privacy charter is thus dynamically adaptable to permit users to continue to engage seamlessly in accordance with user/corporate target goals with digital service providers (DSPs) and similar entities.
    Type: Grant
    Filed: December 19, 2020
    Date of Patent: February 13, 2024
    Assignee: CAMBRIAN DESIGNS, INC.
    Inventors: Olaf Jonny Groth, Mark Jay Nitzberg, Manu Kalia, Tobias Christopher Straube, Daniel A Zehr
  • Patent number: 11895579
    Abstract: A system and method for automatic offload in multi SIM devices. The system comprises a learning module [108] to learn the SIM slot ID of the inserted desired operator, the structure alignment and field information, wherein feedback of the learnt information is provided to the network server [114]. A method selection module [110] analyzes the structure alignment and field information for mapping unique connection methods to different devices. A WiFi configuration and connection module [112] uses appropriate WiFi configuration and attempts connection to desired Service Providers enterprise Wi-Fi AP using the determined connection method.
    Type: Grant
    Filed: December 31, 2021
    Date of Patent: February 6, 2024
    Assignee: JIO PLATFORMS LIMITED
    Inventors: Devesh Chauhan, Vinita Kaushik, Hiren Patel, Abhilash Shrivastava
  • Patent number: 11895125
    Abstract: The present invention relates to a method and system for tracking the movement of data elements as they are shared and moved between authorized and unauthorized devices and among authorized and unauthorized users.
    Type: Grant
    Filed: April 24, 2023
    Date of Patent: February 6, 2024
    Assignee: QUICKVAULT, INC.
    Inventors: Steven V. Bacastow, Michael Royd Heuss
  • Patent number: 11893456
    Abstract: In one embodiment, a device classification service receives telemetry data indicative of behavioral characteristics of a plurality of devices in a network. The service obtains side information for the telemetry data. The service applies metric learning to the telemetry data and side information, to construct a distance function. The service uses the distance function to cluster the telemetry data into device clusters. The service associates a device type label with a particular device cluster.
    Type: Grant
    Filed: June 7, 2019
    Date of Patent: February 6, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: David Tedaldi, Pierre-Andre Savalle, Sharon Shoshana Wulff, Jean-Philippe Vasseur, Grégory Mermoud
  • Patent number: 11895130
    Abstract: Various embodiments of the present invention provide methods, apparatuses, systems, computing devices, and/or the like that are configured to enable effective and efficient monitoring of software application frameworks. For example, certain embodiments of the present invention provide methods, apparatuses, systems, computing devices, and/or the like that are configured to perform software application framework monitoring using an interactive software application platform monitoring dashboard comprises a set of user interfaces (e.g.
    Type: Grant
    Filed: September 16, 2022
    Date of Patent: February 6, 2024
    Assignees: ATLASSIAN PTY LTD., ATLASSIAN US, INC.
    Inventors: Benjamin Walther, Brianna Malcolmson
  • Patent number: 11895158
    Abstract: A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having security policy visualization. At least one embodiment is directed to a computer-implemented method for implementing security policies in a secured network, including: retrieving a set of rules of a security policy; analyzing the set of rules of the security policy using one or more Satisfiability Modulo Theory (SMT) operations to reduce a dimensionality of the security policy; and generating a visual presentation on a user interface using results of the SMT operations, where the visual presentation includes visual indicia representing one or more targeted policy dimensions with respect to one or more fixed policy dimensions. In at least one embodiment, two or more security policies are presented with visual indicia representing differences between the security policies, including representations of one or more targeted policy dimensions with respect to one or more fixed policy dimensions.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: February 6, 2024
    Assignee: Forcepoint LLC
    Inventors: Lawrence Bruce Huston, III, David Coffey, Andrew Mortensen
  • Patent number: 11893131
    Abstract: A system, method, and computer-readable media for providing contextual data loss prevention (DLP) within a group-based communication system. At least a portion of a DLP policy may be suspended within a DLP engine based on a context for which a user input is to be displayed. Accordingly, the user input may be displayed without interference from the DLP engine.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: February 6, 2024
    Assignee: Salesforce, Inc.
    Inventor: Felipe Ryan
  • Patent number: 11895121
    Abstract: A method includes executing a configuration engine on one or more data processing device(s) of a computing system. In accordance with the execution, the method also includes discovering at least a subset of a number of resources associated with a target environment of the computing system, generating an environment definition associated with the target environment, building baseline configurations, policies, and metadata for at least the subset of the number of resources, and versioning the aforementioned data.
    Type: Grant
    Filed: March 20, 2023
    Date of Patent: February 6, 2024
    Assignee: CAPITIS SOLUTIONS INC.
    Inventors: Samiul Karim, Vikas K. Gupta, Eric C. Hein, Sanjay K. Kunchakarra, Prasad V. Kunchakarra
  • Patent number: 11895151
    Abstract: A computer-implemented method, executed by one or more email detection computers, receives from a computer network, a first email message from a first sender account to a first recipient account and having a plurality of attributes. The method determines that the first email message is a phishing email, extracts a subset of attributes, normalizes transformable attributes, and generates a hash representation from fixed attributes and the normalized transformable attributes, stores the hash representation in a database, receives a second email message, and determines that the second email message is a phishing email based on the stored hash representation.
    Type: Grant
    Filed: January 12, 2022
    Date of Patent: February 6, 2024
    Assignee: CLOUDFLARE, INC.
    Inventor: Javier Castro
  • Patent number: 11893123
    Abstract: In some aspects, a method for mediation of a screenshot capture by a client application based on policy includes identifying, by a client application on a client device, a policy for mediating one or more screenshots of content displayed via the client application. An embedded browser within the client application accesses a network application of one or more servers. The method further includes intercepting, by the client application, a request to capture a screenshot of at least a portion of the network application being displayed, determining, by the client application, one or more mediation actions to perform on the screenshot responsive to the policy, performing, by the client application, the one or more mediation actions on the screenshot, and providing, by the client responsive to the request, the screenshot resulting from the one or more mediation actions.
    Type: Grant
    Filed: March 4, 2021
    Date of Patent: February 6, 2024
    Inventor: Abhishek Chauhan
  • Patent number: 11888900
    Abstract: In one embodiment, a service receives captured traffic flow data regarding a traffic flow sent via a network between a first device assigned to a first network zone and a second device assigned to a second network zone. The service identifies, from the captured traffic flow data, one or more cryptographic parameters of the traffic flow. The service determines whether the one or more cryptographic parameters of the traffic flow satisfy an inter-zone policy associated with the first and second network zones. The service causes performance of a mitigation action in the network when the one or more cryptographic parameters of the traffic flow do not satisfy the inter-zone policy associated with the first and second network zones.
    Type: Grant
    Filed: April 24, 2020
    Date of Patent: January 30, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Matthew Scott Robertson, David McGrew, Timothy David Keanini, Sunil Amin, Ellie Marie Daw
  • Patent number: 11888804
    Abstract: Methods and systems are disclosed for enhancements in email communication. In some embodiments, address-context information of an email message is rendered to aid the user in various user interface scenarios. These scenarios include user interfaces for a Reply All command and a Send command. The activation of the Reply All command in some embodiments is enabled with a predefined gesture on the user interface that is different from a gesture or gestures used for other commands such as the Reply command. The gesture required for the activation of the Send command can be changed based on the command that was activated to create the email message to be sent.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: January 30, 2024
    Assignee: Zoho Corporation Private Limited
    Inventor: Sudheer A Grandhi
  • Patent number: 11888968
    Abstract: A signature device (30) acquires a signature key SK(x?) in which an attribute vector x? is set over a basis B* of a basis B and the basis B*, which are dual bases in dual vector spaces. The signature device (30) generates a signature sig for a message MSG by setting predicate information of arithmetic branching programs (ABP) for the signature key SK(x?). The signature device (30) outputs the signature sig and the message MSG to a verification device (40).
    Type: Grant
    Filed: July 22, 2021
    Date of Patent: January 30, 2024
    Assignees: MITSUBISHI ELECTRIC CORPORATION, NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Katsuyuki Takashima, Tatsuaki Okamoto, Pratish Datta
  • Patent number: 11888857
    Abstract: A risk-aware access control system and related methods are provided. In accordance with one aspect of the present disclosure, there is a provided a method of risk-aware access control, comprising: detecting a request to perform an action with respect to two factors, the factors being of a factor type selecting people, devices, documents, and location, wherein the factors are of a different factor type; determining a coupling associated with the requested action based on the factors of the requested action; determining a risk level associated with the coupling; denying the requested action in response to a determination that the risk level does not match a security policy; and allowing the requested action in response to a determination that the risk level matches the security policy.
    Type: Grant
    Filed: December 21, 2020
    Date of Patent: January 30, 2024
    Assignee: BlackBerry Limited
    Inventors: Andrew James Malton, Andrew Eric Walenstein, Jinxin Liu, Burak Kantarci, Melike Erol Kantarci, Murat Simsek
  • Patent number: 11886310
    Abstract: Systems, computer program products, and methods are described herein for implementing an intelligent validation protocol within a cloud infrastructure. The present invention is configured to receive a request to invoke the intelligent validation protocol on one or more cloud service component clusters; determine one or more operating systems associated with the one or more cloud service component clusters; determine one or more validation requirements for the one or more operating systems; dynamically invoke, using the intelligent validation protocol, a multi-checkpoint validation subroutine on the one or more operating systems; determine whether the one or more operating systems meet the one or more validation requirements; initiate a dashboard script configured to generate an analysis interface indicating whether the one or more operating systems meet the one or more validation requirements; and transmit control signals configured to cause the computing device of the user to display the analysis interface.
    Type: Grant
    Filed: August 3, 2021
    Date of Patent: January 30, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Syed Kareemuddin, Mohammed Abdul Azam
  • Patent number: 11886577
    Abstract: Disclosed herein are systems and methods for protecting a user's devices based on types of anomalies. In one aspect, an exemplary method comprises, determining, by a feature determiner, one or more values of features of a user's activity performed using at least one of the user's devices, detecting, by an anomaly detector, anomalies indicative of at least one threat to information security of the user's devices based on the one or more values of the features, for each detected anomaly, identifying, by the anomaly detector, a type of the anomaly and at least one device that is a source of the anomaly, wherein the type of anomaly is identified using an anomaly classifier and one or more values of features, and for each user's device, modifying, by a device protector, one or more information security settings of the user's device based on the identified type of the anomaly.
    Type: Grant
    Filed: April 19, 2021
    Date of Patent: January 30, 2024
    Assignee: AO Kaspersky Lab
    Inventors: Anton V. Tikhomirov, Evgenii Shchetinin
  • Patent number: 11886558
    Abstract: Methods and systems for authenticating users based on contextual data in a privacy preserving way are disclosed.
    Type: Grant
    Filed: November 22, 2021
    Date of Patent: January 30, 2024
    Assignee: OneSpan North America Inc.
    Inventor: Pradip Mainali
  • Patent number: 11888748
    Abstract: Techniques are directed to controlling access to resources on a message bus of a network communication device. The techniques may include, by the network communication device, processing a message bus access policy file uniquely corresponding to a process. The message bus access policy file may include a certificate securely associating the message bus access policy file with the process. The techniques may further include, by the network communication device, based at least in part on the processing the message bus access policy file, exposing one or more resources of the network communication device to the process on the message bus, in a manner corresponding to at least one resource access permission indication contained within the message bus access policy file.
    Type: Grant
    Filed: December 30, 2022
    Date of Patent: January 30, 2024
    Assignee: ITRON, INC.
    Inventors: Scott Dale Brown, Andrew Keats, Matthew Rockey, Jason Estes
  • Patent number: 11882157
    Abstract: A method includes: generating a manifest of assets during the target time interval; labeling each asset in the manifest of assets with a set of attributes exhibited by the asset during the target time interval; defining a first attribute category exhibiting a first combination of attributes; assigning a first action to the first attribute category; identifying a subset of assets in the manifest of assets matching the first attribute category, each asset in the subset of assets exhibiting a set of attributes including the first combination of attributes; and executing the first action on the first subset of assets.
    Type: Grant
    Filed: January 25, 2023
    Date of Patent: January 23, 2024
    Assignee: Sevco Security, Inc.
    Inventors: Jeffrey J. Guy, Dean Mekkawy, Jeremiah Clark, Nevins Bartolemeo, Aaron Griffin, Michael Alfonse, Jacob Hackett, Nick Murdock, Jim LoRusso, Jason McFarland, Luis Diego Cabezas
  • Patent number: 11881939
    Abstract: A system provides for authorization of data access and processing functions within a distributed server network using a delegated proof-of-stake consensus mechanism. In particular, the system may use assign authorization levels to each node within the network environment. Certain actions or processes performed within the network (e.g., potentially damaging actions) may require that the node proposing the action meets a threshold authorization level before authorizing the action. The system may further increase or decrease authorization levels for each node depending on the outcomes of the proposed actions. In this way, the system may provide a secure way to authorize certain actions or processes taken within a computing environment.
    Type: Grant
    Filed: October 5, 2021
    Date of Patent: January 23, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Brandon Sloane, Lydia Lambright
  • Patent number: 11882055
    Abstract: A transactional method and system of managing access to API services based on the performance of computational tasks by an end-user is disclosed. The system and method are configured to identify requests from an end-user to an API for services that are associated with a transactional cost. This cost is passed on to the end-user by generation of a computational task assignment to be completed by the client computing system. Once the assignment has been performed, the end-user may be granted access to the requested service.
    Type: Grant
    Filed: July 12, 2022
    Date of Patent: January 23, 2024
    Assignee: United Services Automobile Association (USAA)
    Inventors: Yevgeniy Viatcheslavovich Khmelev, Christopher Russell, Deborah Janette Schulz, David Morley, Gregory Brian Meyer, Ryan Thomas Russell
  • Patent number: 11881957
    Abstract: The method comprises the steps of: the Policy and Charging Rules Function (PCRF) receiving (Step 1) user's subscription information, in order to determine an initial policy; the Policy and Charging Enforcement Function (PCEF) applying (Step 2) the initial rules; the Policy and Charging Enforcement Function (PCEF) triggering (Step 3) the Extended Online Charging System (EOCS) for the user's service/network resource usage; the Extended Online Charging System (EOCS) rating and charging (step 4) the user, in real time; the Extended Online Charging System (EOCS) triggering (Step 5) a change of policy in the Policy and Charging Rules Function (PCRF); the Policy and Charging Rules Function (PCRF) determining (Step 6) new rules for the new policy; the Policy and Charging Enforcement Function (PCEF) receiving (Step 7) the new rules and applying them.
    Type: Grant
    Filed: July 7, 2021
    Date of Patent: January 23, 2024
    Assignees: ALCATEL LUCENT, NOKIA OF AMERICA CORPORATION
    Inventors: Kim Brouard, Thomas Levy, Yigang Cai
  • Patent number: 11881938
    Abstract: There is disclosed in one example an enrollment over secure transport (EST)-capable gateway device, including: a hardware platform including a processor and a memory; a first network interface to communicatively couple to an external network, including an external DNS server; a second network interface to communicatively couple to a home network; a caching DNS server including a local DNS cache, and logic to provide DNS services to the home network; and an EST proxy to authenticate to a local endpoint on the home network, provision a DNS server certificate on the local endpoint, provision an authentication domain name (ADN) on the local endpoint, and provide encrypted domain name system (DNS) services to the local endpoint.
    Type: Grant
    Filed: August 24, 2022
    Date of Patent: January 23, 2024
    Assignee: McAfee, LLC
    Inventors: Tirumaleswar Reddy Konda, Shashank Jain, Himanshu Srivastava, Naveen Kumar Reddy Kandadi, Piyush Pramod Joshi
  • Patent number: 11880360
    Abstract: The present invention extends to methods, systems, and computer program products for deriving unified insights ad logs from DevOps Cl/CD tools and pipeline data. In general, a data transformer facilitates data normalization and serialization converting raw data across multiple DevOps tools and stores the data into a Data Lake in accordance with a customized schema. A continuous orchestrator sequences, aggregates and contextualizes the logs, providing an intuitive way of troubleshooting issues across a DevOps environment, historical data for compliance and audit purposes, and a build manifest for root cause analysis. The continuous orchestrator also processes the logs and leverages a KPI framework, providing intelligent dashboards across 90+ KPI's and a plurality of different dimensions (Planning, Development/pipelines, security, quality, operations, productivity and source code) to help customers make smart decisions and do more with less.
    Type: Grant
    Filed: June 23, 2021
    Date of Patent: January 23, 2024
    Assignee: Opsera Inc.
    Inventors: Ravi Kumar Chivukula, Chandra Ranganathan, Vasanthavishnu Vasudevan, Sundar Rajan Renganathan, Tejas Bharadwaj, Shrey Malhotra, Venkat Yuvraj, Phani Sree Harsha Pullabhatlapogada, Kishore Rajan
  • Patent number: 11876836
    Abstract: A system and computerized method for generating an improved cyber-security rule ordering for cyber-security threat detection or post-processing activities conducted by a rules-based cyber-security engine deployed within a network device is described. Herein, historical metadata associated with analytics conducted on incoming data by a rule-based cyber-security engine and in accordance with a plurality of rules is described. These rules are arranged in a first ordered rule sequence. The historical metadata is analyzed to determine one or more salient rules from the plurality of rules. The plurality of rules are reprioritized by at least rearranging an order to a second ordered rule sequence with the one or more salient rules being positioned toward a start of the second ordered rule sequence. Thereafter, the rule-based cyber-security engine operates in accordance with the reprioritized rule set that is arranged in the second ordered rule sequence to achieve improved performance.
    Type: Grant
    Filed: March 31, 2022
    Date of Patent: January 16, 2024
    Assignee: Musarubra US LLC
    Inventors: Paul Schottland, Chinmoy Dey, Christopher Glyer
  • Patent number: 11868478
    Abstract: Configuration monitoring is performed using a computer-based system and method by identifying misconfigured settings through the collection of large amounts of configuration data from diverse sources. The configuration data is then analyzed to identify misconfigured items. Automation of such configurations is implemented using machine learning to analyze existing configurations as well as new configurations. By using machine learning, the computer-based system and method can predict a pass state or a fail state of the configuration of a newly connected system in an organization. A logistic regression classifier is trained using old complying configuration data and data reflecting industry standards. The trained classifier can predict and classify whether a new configuration passes or fails the industry standards based on the training data of old configuration data.
    Type: Grant
    Filed: May 18, 2020
    Date of Patent: January 9, 2024
    Assignee: SAUDI ARABIAN OIL COMPANY
    Inventors: Johara Abdulrahman Al Jarri, Aasim Ajaz
  • Patent number: 11870818
    Abstract: A management server retrieves access logs associated with a plurality of identities and generates a plurality of behavioral scores for the plurality of identities. The behavioral score for a particular identity increases responsive to access approvals and decreases responsive to access denials for that particular identity. A proxy server receives a first request to access a resource associated with a first identity of the plurality of identities and determines a zero trust access policy for the resource. When a first behavioral score for the first identity satisfies a behavioral score threshold for the zero trust access policy, the proxy server provides the resource. The proxy server receives a second request to access the resource associated with a second identity. When a second behavioral score for the second identity fails to satisfy the behavioral score threshold, the proxy server performs an action defined in the zero trust access policy.
    Type: Grant
    Filed: February 28, 2023
    Date of Patent: January 9, 2024
    Assignee: CLOUDFLARE, INC.
    Inventors: Edwin Donald Sutherland, Sheril Nagoormeera
  • Patent number: 11868798
    Abstract: A system and method for securing virtual cloud assets in a cloud computing environment against cyber threats. The method includes: determining a location of a snapshot of at least one virtual disk of a protected virtual cloud asset, wherein the virtual cloud asset is instantiated in the cloud computing environment; accessing the snapshot of the virtual disk based on the determined location; analyzing the snapshot of the protected virtual cloud asset to detect potential cyber threats risking the protected virtual cloud asset; and alerting detected potential cyber threats based on a determined priority.
    Type: Grant
    Filed: August 22, 2022
    Date of Patent: January 9, 2024
    Assignee: Orca Security Ltd.
    Inventor: Avi Shua
  • Patent number: 11861405
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: receiving, by a manager node, from a plurality of compute nodes metrics data, the manager node and the plurality of compute nodes defining a first local cluster of a first computing environment, wherein nodes of the compute nodes defining the first local cluster have running thereon container based applications, wherein a first container based application runs on a first compute node of the plurality of compute nodes defining the first local cluster, and wherein a second compute node of the plurality of compute nodes defining the first local cluster runs a second container based application; wherein the manager node has received from an orchestrator availability data specifying a set of compute nodes available for hosting the first application.
    Type: Grant
    Filed: April 29, 2020
    Date of Patent: January 2, 2024
    Assignee: Kyndryl, Inc.
    Inventor: Vishal Anand
  • Patent number: 11853110
    Abstract: Disclosed is a system to optimize rule weights for classifying access requests so as to manage rates of false positives and false negative classifications. A rules suggestion engine may suggest a profile of classification rules to a merchant for access requests. The system can optimize weights for the profile of rules using a cost function based on a training set of historical access requests, for example using stepwise regression or machine learning (ML). The system can compute a profile score based on the optimized weights, for example by summing the weights. The system statistically analyzes the profile score using classification thresholds and the historical access requests. The system can perform receiver operating characteristic (ROC) analysis for various threshold values, enabling a user to select a suitable threshold. The system can further optimize by adding or removing rules from the profile of rules.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: December 26, 2023
    Assignee: Visa International Service Association
    Inventors: Benjamin Scott Boding, Ge Wen
  • Patent number: 11853420
    Abstract: The innovation disclosed and claimed herein, in one or more aspects thereof, illustrates systems and methods for providing a technical control to a technically pervasive problem of inadvertent capture of items in a computing environment, returning control of what happens to such items in technical environments that have become widespread and intrusive. The innovation provides a system for users to control the types of items that pervasive computing environment elements may process without their express control and with technical countermeasures in a relatively unobtrusive manner.
    Type: Grant
    Filed: October 4, 2021
    Date of Patent: December 26, 2023
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Nilotpol Bhattacharya, Priyankant Singh, Satish Babu S N
  • Patent number: 11856002
    Abstract: The technology disclosed herein enable a consumer to verify the integrity of services running in trusted execution environments. An example method may include: receiving, by a broker device, a request to verify that a service is executing in a trusted execution environment, wherein the request comprises data identifying the service; determining, by the broker device, a computing device that is executing the service; initiating, by the broker device, a remote integrity check of the computing device executing the service; receiving, by the broker device, integrity data of the trusted execution environment of the computing device; and providing, by the broker device, the integrity data to a consumer device associated with the service.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: December 26, 2023
    Assignee: Red Hat, Inc.
    Inventors: Michael Hingston McLaughlin Bursell, Lilian Sturmann
  • Patent number: 11853455
    Abstract: Systems, methods and non-transitory computer readable media for controlling access in privacy firewalls are provided. A request to access a content of an element may be received, the content of the element may include a first portion and a second portion, the first portion may include identifiable information and the second portion may include no identifiable information. A permission record corresponding to the element may be accessed. In response to a first value in the permission record, access may be provided to the content of the element, including access to the first and second portions, and in response to a second value in the permission record, partial access may be provided to the content of the element, the partial access may include access to the second portion and may exclude access to the first portion.
    Type: Grant
    Filed: December 17, 2020
    Date of Patent: December 26, 2023
    Assignee: LYNX MD LTD
    Inventors: Omer Dror, Ofir Farchy
  • Patent number: 11855974
    Abstract: Described herein are techniques for providing one or more users with access to content obtained from a plurality of content providers. In some embodiments, such techniques may comprise maintaining a number of access credentials associated with a plurality of different content providers, obtaining access to a plurality of media content libraries, each of the plurality of media content libraries managed by a content provider of the plurality of different content providers, and providing the plurality of media content libraries to at least one user device as a single library of media content. Such techniques may further comprise receiving, from the user device, a selection of a media content from the single library of media content and providing, to the user device, access to the selected media content within a corresponding media content library of the plurality of media content libraries using an access credential.
    Type: Grant
    Filed: February 4, 2021
    Date of Patent: December 26, 2023
    Assignee: T-Mobile USA, Inc.
    Inventors: Michael Burbo, Nicholas Seitz
  • Patent number: 11856072
    Abstract: A terminal receiving a push message is provided. The terminal sets service control condition which specifies application identifier (app ID) corresponding to service that the terminal is allowed to receive, wherein the service control condition is contained in push message control policy. And the terminal then receives a push message, matching the push message control policy, sent by a server.
    Type: Grant
    Filed: November 14, 2022
    Date of Patent: December 26, 2023
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Shunan Fan, Guoqiao Chen, Lei Wang, Ting Dong, Huiping Zhang, Jian Yang
  • Patent number: 11856003
    Abstract: Techniques for providing innocent until proven guilty (IUPG) solutions for building and using adversary resistant and false positive resistant deep learning models are disclosed. In some embodiments, a system, process, and/or computer program product includes storing a set comprising one or more innocent until proven guilty (IUPG) models for static analysis of a sample; performing a static analysis of content associated with the sample, wherein performing the static analysis includes using at least one stored IUPG model; and determining that the sample is malicious based at least in part on the static analysis of the content associated with the sample, and in response to determining that the sample is malicious, performing an action based on a security policy.
    Type: Grant
    Filed: May 26, 2021
    Date of Patent: December 26, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Brody James Kutt, Oleksii Starov, Yuchen Zhou, William Redington Hewlett, II