Policy Patents (Class 726/1)
-
Patent number: 11888804Abstract: Methods and systems are disclosed for enhancements in email communication. In some embodiments, address-context information of an email message is rendered to aid the user in various user interface scenarios. These scenarios include user interfaces for a Reply All command and a Send command. The activation of the Reply All command in some embodiments is enabled with a predefined gesture on the user interface that is different from a gesture or gestures used for other commands such as the Reply command. The gesture required for the activation of the Send command can be changed based on the command that was activated to create the email message to be sent.Type: GrantFiled: November 29, 2021Date of Patent: January 30, 2024Assignee: Zoho Corporation Private LimitedInventor: Sudheer A Grandhi
-
Patent number: 11888968Abstract: A signature device (30) acquires a signature key SK(x?) in which an attribute vector x? is set over a basis B* of a basis B and the basis B*, which are dual bases in dual vector spaces. The signature device (30) generates a signature sig for a message MSG by setting predicate information of arithmetic branching programs (ABP) for the signature key SK(x?). The signature device (30) outputs the signature sig and the message MSG to a verification device (40).Type: GrantFiled: July 22, 2021Date of Patent: January 30, 2024Assignees: MITSUBISHI ELECTRIC CORPORATION, NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Katsuyuki Takashima, Tatsuaki Okamoto, Pratish Datta
-
Patent number: 11886558Abstract: Methods and systems for authenticating users based on contextual data in a privacy preserving way are disclosed.Type: GrantFiled: November 22, 2021Date of Patent: January 30, 2024Assignee: OneSpan North America Inc.Inventor: Pradip Mainali
-
Patent number: 11888748Abstract: Techniques are directed to controlling access to resources on a message bus of a network communication device. The techniques may include, by the network communication device, processing a message bus access policy file uniquely corresponding to a process. The message bus access policy file may include a certificate securely associating the message bus access policy file with the process. The techniques may further include, by the network communication device, based at least in part on the processing the message bus access policy file, exposing one or more resources of the network communication device to the process on the message bus, in a manner corresponding to at least one resource access permission indication contained within the message bus access policy file.Type: GrantFiled: December 30, 2022Date of Patent: January 30, 2024Assignee: ITRON, INC.Inventors: Scott Dale Brown, Andrew Keats, Matthew Rockey, Jason Estes
-
Patent number: 11888857Abstract: A risk-aware access control system and related methods are provided. In accordance with one aspect of the present disclosure, there is a provided a method of risk-aware access control, comprising: detecting a request to perform an action with respect to two factors, the factors being of a factor type selecting people, devices, documents, and location, wherein the factors are of a different factor type; determining a coupling associated with the requested action based on the factors of the requested action; determining a risk level associated with the coupling; denying the requested action in response to a determination that the risk level does not match a security policy; and allowing the requested action in response to a determination that the risk level matches the security policy.Type: GrantFiled: December 21, 2020Date of Patent: January 30, 2024Assignee: BlackBerry LimitedInventors: Andrew James Malton, Andrew Eric Walenstein, Jinxin Liu, Burak Kantarci, Melike Erol Kantarci, Murat Simsek
-
Patent number: 11886577Abstract: Disclosed herein are systems and methods for protecting a user's devices based on types of anomalies. In one aspect, an exemplary method comprises, determining, by a feature determiner, one or more values of features of a user's activity performed using at least one of the user's devices, detecting, by an anomaly detector, anomalies indicative of at least one threat to information security of the user's devices based on the one or more values of the features, for each detected anomaly, identifying, by the anomaly detector, a type of the anomaly and at least one device that is a source of the anomaly, wherein the type of anomaly is identified using an anomaly classifier and one or more values of features, and for each user's device, modifying, by a device protector, one or more information security settings of the user's device based on the identified type of the anomaly.Type: GrantFiled: April 19, 2021Date of Patent: January 30, 2024Assignee: AO Kaspersky LabInventors: Anton V. Tikhomirov, Evgenii Shchetinin
-
Patent number: 11886310Abstract: Systems, computer program products, and methods are described herein for implementing an intelligent validation protocol within a cloud infrastructure. The present invention is configured to receive a request to invoke the intelligent validation protocol on one or more cloud service component clusters; determine one or more operating systems associated with the one or more cloud service component clusters; determine one or more validation requirements for the one or more operating systems; dynamically invoke, using the intelligent validation protocol, a multi-checkpoint validation subroutine on the one or more operating systems; determine whether the one or more operating systems meet the one or more validation requirements; initiate a dashboard script configured to generate an analysis interface indicating whether the one or more operating systems meet the one or more validation requirements; and transmit control signals configured to cause the computing device of the user to display the analysis interface.Type: GrantFiled: August 3, 2021Date of Patent: January 30, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Syed Kareemuddin, Mohammed Abdul Azam
-
Patent number: 11881938Abstract: There is disclosed in one example an enrollment over secure transport (EST)-capable gateway device, including: a hardware platform including a processor and a memory; a first network interface to communicatively couple to an external network, including an external DNS server; a second network interface to communicatively couple to a home network; a caching DNS server including a local DNS cache, and logic to provide DNS services to the home network; and an EST proxy to authenticate to a local endpoint on the home network, provision a DNS server certificate on the local endpoint, provision an authentication domain name (ADN) on the local endpoint, and provide encrypted domain name system (DNS) services to the local endpoint.Type: GrantFiled: August 24, 2022Date of Patent: January 23, 2024Assignee: McAfee, LLCInventors: Tirumaleswar Reddy Konda, Shashank Jain, Himanshu Srivastava, Naveen Kumar Reddy Kandadi, Piyush Pramod Joshi
-
Patent number: 11881939Abstract: A system provides for authorization of data access and processing functions within a distributed server network using a delegated proof-of-stake consensus mechanism. In particular, the system may use assign authorization levels to each node within the network environment. Certain actions or processes performed within the network (e.g., potentially damaging actions) may require that the node proposing the action meets a threshold authorization level before authorizing the action. The system may further increase or decrease authorization levels for each node depending on the outcomes of the proposed actions. In this way, the system may provide a secure way to authorize certain actions or processes taken within a computing environment.Type: GrantFiled: October 5, 2021Date of Patent: January 23, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Brandon Sloane, Lydia Lambright
-
Patent number: 11882157Abstract: A method includes: generating a manifest of assets during the target time interval; labeling each asset in the manifest of assets with a set of attributes exhibited by the asset during the target time interval; defining a first attribute category exhibiting a first combination of attributes; assigning a first action to the first attribute category; identifying a subset of assets in the manifest of assets matching the first attribute category, each asset in the subset of assets exhibiting a set of attributes including the first combination of attributes; and executing the first action on the first subset of assets.Type: GrantFiled: January 25, 2023Date of Patent: January 23, 2024Assignee: Sevco Security, Inc.Inventors: Jeffrey J. Guy, Dean Mekkawy, Jeremiah Clark, Nevins Bartolemeo, Aaron Griffin, Michael Alfonse, Jacob Hackett, Nick Murdock, Jim LoRusso, Jason McFarland, Luis Diego Cabezas
-
Patent number: 11882055Abstract: A transactional method and system of managing access to API services based on the performance of computational tasks by an end-user is disclosed. The system and method are configured to identify requests from an end-user to an API for services that are associated with a transactional cost. This cost is passed on to the end-user by generation of a computational task assignment to be completed by the client computing system. Once the assignment has been performed, the end-user may be granted access to the requested service.Type: GrantFiled: July 12, 2022Date of Patent: January 23, 2024Assignee: United Services Automobile Association (USAA)Inventors: Yevgeniy Viatcheslavovich Khmelev, Christopher Russell, Deborah Janette Schulz, David Morley, Gregory Brian Meyer, Ryan Thomas Russell
-
Patent number: 11880360Abstract: The present invention extends to methods, systems, and computer program products for deriving unified insights ad logs from DevOps Cl/CD tools and pipeline data. In general, a data transformer facilitates data normalization and serialization converting raw data across multiple DevOps tools and stores the data into a Data Lake in accordance with a customized schema. A continuous orchestrator sequences, aggregates and contextualizes the logs, providing an intuitive way of troubleshooting issues across a DevOps environment, historical data for compliance and audit purposes, and a build manifest for root cause analysis. The continuous orchestrator also processes the logs and leverages a KPI framework, providing intelligent dashboards across 90+ KPI's and a plurality of different dimensions (Planning, Development/pipelines, security, quality, operations, productivity and source code) to help customers make smart decisions and do more with less.Type: GrantFiled: June 23, 2021Date of Patent: January 23, 2024Assignee: Opsera Inc.Inventors: Ravi Kumar Chivukula, Chandra Ranganathan, Vasanthavishnu Vasudevan, Sundar Rajan Renganathan, Tejas Bharadwaj, Shrey Malhotra, Venkat Yuvraj, Phani Sree Harsha Pullabhatlapogada, Kishore Rajan
-
Patent number: 11881957Abstract: The method comprises the steps of: the Policy and Charging Rules Function (PCRF) receiving (Step 1) user's subscription information, in order to determine an initial policy; the Policy and Charging Enforcement Function (PCEF) applying (Step 2) the initial rules; the Policy and Charging Enforcement Function (PCEF) triggering (Step 3) the Extended Online Charging System (EOCS) for the user's service/network resource usage; the Extended Online Charging System (EOCS) rating and charging (step 4) the user, in real time; the Extended Online Charging System (EOCS) triggering (Step 5) a change of policy in the Policy and Charging Rules Function (PCRF); the Policy and Charging Rules Function (PCRF) determining (Step 6) new rules for the new policy; the Policy and Charging Enforcement Function (PCEF) receiving (Step 7) the new rules and applying them.Type: GrantFiled: July 7, 2021Date of Patent: January 23, 2024Assignees: ALCATEL LUCENT, NOKIA OF AMERICA CORPORATIONInventors: Kim Brouard, Thomas Levy, Yigang Cai
-
Patent number: 11876836Abstract: A system and computerized method for generating an improved cyber-security rule ordering for cyber-security threat detection or post-processing activities conducted by a rules-based cyber-security engine deployed within a network device is described. Herein, historical metadata associated with analytics conducted on incoming data by a rule-based cyber-security engine and in accordance with a plurality of rules is described. These rules are arranged in a first ordered rule sequence. The historical metadata is analyzed to determine one or more salient rules from the plurality of rules. The plurality of rules are reprioritized by at least rearranging an order to a second ordered rule sequence with the one or more salient rules being positioned toward a start of the second ordered rule sequence. Thereafter, the rule-based cyber-security engine operates in accordance with the reprioritized rule set that is arranged in the second ordered rule sequence to achieve improved performance.Type: GrantFiled: March 31, 2022Date of Patent: January 16, 2024Assignee: Musarubra US LLCInventors: Paul Schottland, Chinmoy Dey, Christopher Glyer
-
Patent number: 11870818Abstract: A management server retrieves access logs associated with a plurality of identities and generates a plurality of behavioral scores for the plurality of identities. The behavioral score for a particular identity increases responsive to access approvals and decreases responsive to access denials for that particular identity. A proxy server receives a first request to access a resource associated with a first identity of the plurality of identities and determines a zero trust access policy for the resource. When a first behavioral score for the first identity satisfies a behavioral score threshold for the zero trust access policy, the proxy server provides the resource. The proxy server receives a second request to access the resource associated with a second identity. When a second behavioral score for the second identity fails to satisfy the behavioral score threshold, the proxy server performs an action defined in the zero trust access policy.Type: GrantFiled: February 28, 2023Date of Patent: January 9, 2024Assignee: CLOUDFLARE, INC.Inventors: Edwin Donald Sutherland, Sheril Nagoormeera
-
Patent number: 11868478Abstract: Configuration monitoring is performed using a computer-based system and method by identifying misconfigured settings through the collection of large amounts of configuration data from diverse sources. The configuration data is then analyzed to identify misconfigured items. Automation of such configurations is implemented using machine learning to analyze existing configurations as well as new configurations. By using machine learning, the computer-based system and method can predict a pass state or a fail state of the configuration of a newly connected system in an organization. A logistic regression classifier is trained using old complying configuration data and data reflecting industry standards. The trained classifier can predict and classify whether a new configuration passes or fails the industry standards based on the training data of old configuration data.Type: GrantFiled: May 18, 2020Date of Patent: January 9, 2024Assignee: SAUDI ARABIAN OIL COMPANYInventors: Johara Abdulrahman Al Jarri, Aasim Ajaz
-
Patent number: 11868798Abstract: A system and method for securing virtual cloud assets in a cloud computing environment against cyber threats. The method includes: determining a location of a snapshot of at least one virtual disk of a protected virtual cloud asset, wherein the virtual cloud asset is instantiated in the cloud computing environment; accessing the snapshot of the virtual disk based on the determined location; analyzing the snapshot of the protected virtual cloud asset to detect potential cyber threats risking the protected virtual cloud asset; and alerting detected potential cyber threats based on a determined priority.Type: GrantFiled: August 22, 2022Date of Patent: January 9, 2024Assignee: Orca Security Ltd.Inventor: Avi Shua
-
Patent number: 11861405Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: receiving, by a manager node, from a plurality of compute nodes metrics data, the manager node and the plurality of compute nodes defining a first local cluster of a first computing environment, wherein nodes of the compute nodes defining the first local cluster have running thereon container based applications, wherein a first container based application runs on a first compute node of the plurality of compute nodes defining the first local cluster, and wherein a second compute node of the plurality of compute nodes defining the first local cluster runs a second container based application; wherein the manager node has received from an orchestrator availability data specifying a set of compute nodes available for hosting the first application.Type: GrantFiled: April 29, 2020Date of Patent: January 2, 2024Assignee: Kyndryl, Inc.Inventor: Vishal Anand
-
Patent number: 11853420Abstract: The innovation disclosed and claimed herein, in one or more aspects thereof, illustrates systems and methods for providing a technical control to a technically pervasive problem of inadvertent capture of items in a computing environment, returning control of what happens to such items in technical environments that have become widespread and intrusive. The innovation provides a system for users to control the types of items that pervasive computing environment elements may process without their express control and with technical countermeasures in a relatively unobtrusive manner.Type: GrantFiled: October 4, 2021Date of Patent: December 26, 2023Assignee: Wells Fargo Bank, N.A.Inventors: Nilotpol Bhattacharya, Priyankant Singh, Satish Babu S N
-
Patent number: 11856002Abstract: The technology disclosed herein enable a consumer to verify the integrity of services running in trusted execution environments. An example method may include: receiving, by a broker device, a request to verify that a service is executing in a trusted execution environment, wherein the request comprises data identifying the service; determining, by the broker device, a computing device that is executing the service; initiating, by the broker device, a remote integrity check of the computing device executing the service; receiving, by the broker device, integrity data of the trusted execution environment of the computing device; and providing, by the broker device, the integrity data to a consumer device associated with the service.Type: GrantFiled: July 30, 2021Date of Patent: December 26, 2023Assignee: Red Hat, Inc.Inventors: Michael Hingston McLaughlin Bursell, Lilian Sturmann
-
Patent number: 11855974Abstract: Described herein are techniques for providing one or more users with access to content obtained from a plurality of content providers. In some embodiments, such techniques may comprise maintaining a number of access credentials associated with a plurality of different content providers, obtaining access to a plurality of media content libraries, each of the plurality of media content libraries managed by a content provider of the plurality of different content providers, and providing the plurality of media content libraries to at least one user device as a single library of media content. Such techniques may further comprise receiving, from the user device, a selection of a media content from the single library of media content and providing, to the user device, access to the selected media content within a corresponding media content library of the plurality of media content libraries using an access credential.Type: GrantFiled: February 4, 2021Date of Patent: December 26, 2023Assignee: T-Mobile USA, Inc.Inventors: Michael Burbo, Nicholas Seitz
-
Patent number: 11853455Abstract: Systems, methods and non-transitory computer readable media for controlling access in privacy firewalls are provided. A request to access a content of an element may be received, the content of the element may include a first portion and a second portion, the first portion may include identifiable information and the second portion may include no identifiable information. A permission record corresponding to the element may be accessed. In response to a first value in the permission record, access may be provided to the content of the element, including access to the first and second portions, and in response to a second value in the permission record, partial access may be provided to the content of the element, the partial access may include access to the second portion and may exclude access to the first portion.Type: GrantFiled: December 17, 2020Date of Patent: December 26, 2023Assignee: LYNX MD LTDInventors: Omer Dror, Ofir Farchy
-
Patent number: 11856065Abstract: A data transmission method includes receiving, by a gateway of an integration platform as a service (iPaaS) system, a data transmission request transmitted by the iPaaS system, the iPaaS system being deployed on a first virtual private cloud (VPC) in a cloud network. The method further includes determining an address identifier of the service to be accessed by the iPaaS system, and a first transmission connection between the gateway and a data transmission circuitry associated with the service. The data transmission circuitry is connected to an Intranet, and the service is deployed in the Intranet or in a second VPC. The method further includes transmitting the data transmission request and the address identifier of the service from the gateway to the data transmission circuitry through the first transmission connection, where the data transmission circuitry transmits the data transmission request of the iPaaS system to the service.Type: GrantFiled: November 21, 2022Date of Patent: December 26, 2023Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Bin Sun, Yunfan Li, Kexin Li, Mingbo Huang, Xuan Feng
-
Patent number: 11856003Abstract: Techniques for providing innocent until proven guilty (IUPG) solutions for building and using adversary resistant and false positive resistant deep learning models are disclosed. In some embodiments, a system, process, and/or computer program product includes storing a set comprising one or more innocent until proven guilty (IUPG) models for static analysis of a sample; performing a static analysis of content associated with the sample, wherein performing the static analysis includes using at least one stored IUPG model; and determining that the sample is malicious based at least in part on the static analysis of the content associated with the sample, and in response to determining that the sample is malicious, performing an action based on a security policy.Type: GrantFiled: May 26, 2021Date of Patent: December 26, 2023Assignee: Palo Alto Networks, Inc.Inventors: Brody James Kutt, Oleksii Starov, Yuchen Zhou, William Redington Hewlett, II
-
Patent number: 11856072Abstract: A terminal receiving a push message is provided. The terminal sets service control condition which specifies application identifier (app ID) corresponding to service that the terminal is allowed to receive, wherein the service control condition is contained in push message control policy. And the terminal then receives a push message, matching the push message control policy, sent by a server.Type: GrantFiled: November 14, 2022Date of Patent: December 26, 2023Assignee: Huawei Technologies Co., Ltd.Inventors: Shunan Fan, Guoqiao Chen, Lei Wang, Ting Dong, Huiping Zhang, Jian Yang
-
Patent number: 11853110Abstract: Disclosed is a system to optimize rule weights for classifying access requests so as to manage rates of false positives and false negative classifications. A rules suggestion engine may suggest a profile of classification rules to a merchant for access requests. The system can optimize weights for the profile of rules using a cost function based on a training set of historical access requests, for example using stepwise regression or machine learning (ML). The system can compute a profile score based on the optimized weights, for example by summing the weights. The system statistically analyzes the profile score using classification thresholds and the historical access requests. The system can perform receiver operating characteristic (ROC) analysis for various threshold values, enabling a user to select a suitable threshold. The system can further optimize by adding or removing rules from the profile of rules.Type: GrantFiled: December 21, 2022Date of Patent: December 26, 2023Assignee: Visa International Service AssociationInventors: Benjamin Scott Boding, Ge Wen
-
Patent number: 11848946Abstract: Some embodiments of the invention provide a method for performing intrusion detection operations on a host computer. The method receives a data message sent by a machine executing on the host computer. For the data message's flow, the method identifies a set of one or more contextual attributes that are different than layers 2, 3 and 4 header values of the data message. The identified set of contextual attributes are provided to an intrusion detection system (IDS) engine that executes on the host computer to enforce several IDS rules. The IDS engine uses the identified set of contextual attributes to identify a subset of the IDS rules that are applicable to the received data message and that do not include all of the IDS rules enforced by the IDS engine. The IDS engine then examines the subset of IDS rules for the received data message to ascertain whether the data message is associated with a network intrusion activity.Type: GrantFiled: December 26, 2022Date of Patent: December 19, 2023Assignee: VMWARE, INC.Inventors: Jayant Jain, Jingmin Zhou, Sushruth Gopal, Anirban Sengupta, Sirisha Myneni
-
Patent number: 11849314Abstract: A method for ensuring secure wireless communication of a first device in a communication system includes: retrieving information about a type of trustiness of a first communication link of a first access technology and about a type of trustiness of a second communication link of a second access technology, wherein a second device and the first device are configured to communicate data with each other via the first communication link and the second communication link; determining, by a processor of the first device and/or a processor of the second device, security levels based on the information about the type of trustiness of the first communication link and about the type of trustiness of the second communication link.Type: GrantFiled: June 7, 2021Date of Patent: December 19, 2023Assignee: DEUTSCHE TELEKOM AGInventor: Markus Amend
-
Patent number: 11847224Abstract: An apparatus for preventing unauthorized software or firmware upgrades between two or more computing devices connected on a data bus includes a cryptographic engine, memory, and at least one processor coupled with the cryptographic engine and memory. The cryptographic engine stores cryptographic metadata for authorized upgrade images for updating at least one target computing device coupled to the data bus. The cryptographic metadata includes a manifest list of upgrade images. The processor is configured to monitor the data bus for transmissions of striped update hashes from a maintenance device, to receive signed striped hashes corresponding to an upgrade image file transmitted by the maintenance device, to validate the striped update hashes using information in the manifest list, to log that an unauthorized upload has been attempted when at least one of the striped update hashes fails validation, and to perform a mitigation action(s) in response to the attempted unauthorized upload.Type: GrantFiled: September 23, 2020Date of Patent: December 19, 2023Assignee: Shift5, Inc.Inventors: Michael A Weigand, Joshua A. Lospinoso, James E. Correnti
-
Patent number: 11848827Abstract: A security apparatus for a local network is in communication with an external electronic communication system and a first electronic device. The apparatus includes a memory device configured to store computer-executable instructions, and a processor in operable communication with the memory device. The processor is configured to implement the stored computer-executable instructions to cause the apparatus to determine a complexity score for the first electronic device, establish a behavioral pattern for the first electronic device operating within the local network, calculate a confidence metric for the first electronic device based on the determined complexity score and the established behavioral pattern, and control access of the first electronic device to the external communication system according to the calculated confidence metric.Type: GrantFiled: September 6, 2021Date of Patent: December 19, 2023Assignee: Cable Television Laboratories, Inc.Inventor: Kyle Haefner
-
Patent number: 11848953Abstract: A network compromise activity monitoring system includes a network connector, a compromise activity analyzer, and a compromise defender. The network connector has a public network port, at least one private network port, and an associated network connector traffic log concerning data packet traffic of the network connector. The compromise activity analyzer has access to suspect destination metadata, egress traffic metadata, and network device metadata, and is operative to determine a compromise activity level of one or more devices coupled to the at least one private network port. The compromise defender is responsive to the determined compromise activity level of the one or more devices and is operative to at least one of block, alert and notify in accordance with at least one rule.Type: GrantFiled: February 17, 2023Date of Patent: December 19, 2023Assignee: Celerium Inc.Inventors: Aubrey Grant Chernick, Vincent Owen Crisler
-
Patent number: 11849040Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to receive a request from a client for a status of the client, and based on the status of the client, generate a token associated with application programming interface (API) calls to be received from the client. In some examples, the token may include a value representing a priority for determining an adaptive rate limiting of the API calls to be received from the client. The processor may send a response to the request, in which the response may include the status of the client and the token.Type: GrantFiled: July 27, 2020Date of Patent: December 19, 2023Assignee: Micro Focus LLCInventors: Abhay Krishnan M R, Vamsi Krishna
-
Patent number: 11847193Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums which utilize digital tracking tags attached to data to monitor and/or control the data as it moves between applications and/or computing devices. The digital tracking tag may be embedded in the data (e.g., as a digital watermark) or associated with the data e.g., as metadata. In some examples, the digital tracking tag may include an address of a tracking database with which to record one or more events related to the data. For example, recipients, senders, or other participants in a data transfer event may register the data transfer event with the tracking database.Type: GrantFiled: October 22, 2020Date of Patent: December 19, 2023Assignee: Microsoft Technology Licensing, LLCInventor: William James Bliss
-
Patent number: 11843532Abstract: Systems and methods are described herein for managing peering relationships and applying peering policy between service providers and content distribution networks. Aspects discussed herein relate to establishing secure peering connections between service providers to exchange application and/or network information. In some embodiments, an application peering manager may apply peering policy based on token information or other suitable information configured to uniquely identify an application and/or subscriber. In other embodiments, policy enforcement points or other elements residing within a network may be configured to accept and/or apply peering policy to application sessions.Type: GrantFiled: April 28, 2020Date of Patent: December 12, 2023Assignee: Comcast Cable Communications, LLCInventors: Yiu Leung Lee, Franklyn Athias
-
Patent number: 11843509Abstract: Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem are described. In some embodiments, a client Information Handling System (IHS) may include a processor and a memory, the memory having program instructions that, upon execution by the processor, cause the client IHS to: receive, from a workspace orchestration service, one or more files or policies configured to enable the client IHS to instantiate a first workspace based upon a first workspace definition; allow a user to execute a non-vetted application in the first workspace; determine that the first workspace is compromised; and receive, in response to the determination, from the workspace orchestration service, one or more other files or policies configured to enable the client IHS to instantiate a second workspace based upon a second workspace definition, where the second workspace definition allows execution of a vetted application corresponding to the non-vetted application.Type: GrantFiled: December 8, 2021Date of Patent: December 12, 2023Assignee: Dell Products L.P.Inventors: Carlton A. Andrews, Girish S. Dhoble, Nicholas D. Grobelny, David Konetski, Joseph Kozlowski, Ricardo L Martinez, Charles D. Robison
-
Patent number: 11843622Abstract: Techniques are described for providing users of a data intake and query system with pre-trained ML models capable of identifying malicious threats (e.g., malware, botnets, ransomware, etc.) in users' computing environments based on an analysis of Domain Name System (DNS) log data collected from DNS servers in users' environments. DNS log data is ingested by a data intake and query system and processed to obtain searchable timestamped event data. This event data can then be used as input to ML models provided by a security ML application described herein to detect potential occurrences of malicious activity within users' computing environments.Type: GrantFiled: October 16, 2020Date of Patent: December 12, 2023Assignee: Splunk Inc.Inventors: Anthony G Tellez, Philipp Drieger
-
Patent number: 11843638Abstract: The technology disclosed relates to a DHCP server-based steering logic for policy enforcement on IoT devices. In particular, the technology disclosed provides a steering logic running on a DHCP server on a network segment of a network. The steering logic is configured to receive DHCP requests broadcasted to the DHCP server by a plurality of special-purpose devices on the network segment, access DHCP responses generated by the DHCP server for the DHCP requests, receive, from a device classification logic, a positive determination that special-purpose devices in the plurality of special-purpose devices are special-purpose devices and not general-purpose devices, modify the accessed DHCP responses by replacing the default gateway with an inline secure forwarder on the network segment, and send the modified DHCP responses to the special-purpose devices.Type: GrantFiled: August 12, 2022Date of Patent: December 12, 2023Assignee: Netskope, Inc.Inventors: David Tze-Si Wu, Siying Yang, Krishna Narayanaswamy
-
Patent number: 11843510Abstract: Techniques are disclosed for automatically inferring software-defined network policies from the observed workload in a computing environment. The disclosed techniques include monitoring network traffic flow originating from network interfaces corresponding to containers that execute components of an application, recording details of a new network connection or a change in the existing network connection, obtaining information concerning the components of the application, identifying metadata for a component involved in the new network connection or the change in an existing network connection based on a comparison of the details of the new network connection or a change in the existing network connection and the information concerning the components of the application, generating a network policy for the component using at least the metadata for the component, and integrating the network policy for the component into a deployment package for the application.Type: GrantFiled: August 25, 2022Date of Patent: December 12, 2023Assignee: Oracle International CorporationInventors: Olgierd Stanislaw Pieczul, Robert Clark, Nitin Srinivasa Rao Jami
-
Patent number: 11843577Abstract: Systems and methods include obtaining a plurality of parameters associated with a host; determining a fingerprint of the host utilizing the plurality of parameters; and providing the fingerprint to cloud service for enrollment and management of the host in the cloud service. The cloud service can include microsegmentation of the host. The cloud service can include any of Internet access for the host and private resource access by the host.Type: GrantFiled: August 16, 2021Date of Patent: December 12, 2023Assignee: Zscaler, Inc.Inventors: Ajit Singh, Vivek Ashwin Raman, Abhinav Bansal, Thomas Evan Keiser, Jr., John H. O'Neil
-
Patent number: 11843637Abstract: The technology disclosed relates to a DHCP relay-based steering logic for policy enforcement on IoT devices. In particular, the technology disclosed provides a steering logic that is interposed between a plurality of special-purpose devices on a network segment of a network and a DHCP server on the network segment. The steering logic is configured to intercept DHCP requests broadcasted to the DHCP server by special-purpose devices in the plurality of special-purpose devices, forward the intercepted DHCP requests to the DHCP sever 522, receive, from the DHCP server, DHCP responses to the intercepted DHCP requests, receive, from a device classification logic, a positive determination that the special-purpose devices are special-purpose devices and not general-purpose devices, modify the received DHCP responses by replacing the default gateway with an inline secure forwarder on the network segment, and send the modified DHCP responses to the special-purpose devices.Type: GrantFiled: August 12, 2022Date of Patent: December 12, 2023Assignee: Netskope, Inc.Inventors: David Tze-Si Wu, Siying Yang, Krishna Narayanaswamy
-
Patent number: 11843603Abstract: A non-transitory computer-readable storage medium storing a program that causes a processor included in an authorization server to execute a process, the process includes storing an association relationship between a plurality of users who are owners of data, and a consent portal with which each of the plurality of users performs user registration, when consent of a user to access to data of a first condition is asked for by a client, detecting a target user who is an owner of data that matches the first condition, extracting a consent portal with which the target user performs user registration, from the association relationship, and obtaining an intention of consent or non-consent to access to the data, from the target user by using the extracted consent portal, and controlling an access by the client to data in the resource server, in accordance with the obtained intention.Type: GrantFiled: January 14, 2021Date of Patent: December 12, 2023Assignee: FUJITSU LIMITEDInventor: Izuru Sato
-
Patent number: 11836268Abstract: A request to perform a prediction using a machine learning model of a specific entity is received. A specific security key for the machine learning model of the specific entity is received. At least a portion of the machine learning model is obtained from a multi-tenant machine learning model storage. The machine learning model is unlocked using the specific security key and the requested prediction is performed. A result of the prediction is provided from a prediction server.Type: GrantFiled: October 2, 2020Date of Patent: December 5, 2023Assignee: ServiceNow, Inc.Inventors: Virendra Kumar Mehta, Sriram Palapudi
-
Patent number: 11838367Abstract: Various embodiments include a method for deploying field device into an Internet of Things (IoT). The method may include: acquiring information from a field device using an edge device; transmitting the acquired information to a cloud platform; wherein the information comprises data and an industrial IoT model; converting the industrial IoT model into a graph; performing similarity analysis based on the graph; classifying the industrial IoT model based on the similarity analysis; generating a first industrial IoT model comprising a type or an example; performing data mapping on the first industrial IoT model; and operating the field device as part of the IoT.Type: GrantFiled: December 9, 2019Date of Patent: December 5, 2023Assignee: SIEMENS AKTIENGESELLSCHAFTInventors: Qi Wang, He Yu, Jun Jie Chen, Wen Jing Zhou, Yue Hua Zhang, Teng Fei Wu, Yang Wang
-
Patent number: 11838283Abstract: An enclave manager of a network enclave obtains a request to retrieve configuration information and state information corresponding to compute devices and network devices comprising a network enclave. The request specifies a set of parameters of the configuration information and the state information usable to generate a response to the request. The enclave manager evaluates the compute devices, the network devices, and network connections among these devices within the network enclave to obtain the configuration information and the state information. Based on the configuration information and the state information, the enclave manager determines whether the network enclave is trustworthy. Based on the parameters of the request, the enclave manager generates a response indicating a summary that is used to identify the trustworthiness of the network enclave.Type: GrantFiled: October 4, 2022Date of Patent: December 5, 2023Assignee: Cisco Technology, Inc.Inventors: David Delano Ward, Robert Stephen Rodgers, Andrew Phillips Thurber, Eric Voit, Thomas John Giuli
-
Patent number: 11838327Abstract: A cloud-based security service that includes external evaluation for accessing a third-party application. The security service receives a request to access a third-party application from a client device. The security service enforces a set of one or more access policies configured for the third-party application including an external evaluation rule. As part of enforcing the external evaluation rule, the security service transmits an external evaluation request to an external endpoint defined in the external evaluation rule. The external evaluation request includes an identity of a user associated with the request. The security service receives the result of the external evaluation. If the external evaluation passed, the security service grants access to the third-party application based at least in part on its passing.Type: GrantFiled: September 29, 2022Date of Patent: December 5, 2023Assignee: CLOUDFLARE, INC.Inventor: James Howard Royal
-
Patent number: 11836965Abstract: An image matching system for determining visual overlaps between images by using box embeddings is described herein. The system receives two images depicting a 3D surface with different camera poses. The system inputs the images (or a crop of each image) into a machine learning model that outputs a box encoding for the first image and a box encoding for the second image. A box encoding includes parameters defining a box in an embedding space. Then the system determines an asymmetric overlap factor that measures asymmetric surface overlaps between the first image and the second image based on the box encodings. The asymmetric overlap factor includes an enclosure factor indicating how much surface from the first image is visible in the second image and a concentration factor indicating how much surface from the second image is visible in the first image.Type: GrantFiled: August 10, 2021Date of Patent: December 5, 2023Assignee: NIANTIC, INC.Inventors: Anita Rau, Guillermo Garcia-Hernando, Gabriel J. Brostow, Daniyar Turmukhambetov
-
Patent number: 11832104Abstract: Systems and methods provide for provisioning services for an unmanned aerial system (UAS) in a 3GPP network, enabling communication for command and control in 5G systems, and enabling UAS service for identification and operation in a 3GPP system.Type: GrantFiled: August 9, 2019Date of Patent: November 28, 2023Assignee: APPLE INC.Inventor: Ching-Yu Liao
-
Patent number: 11831670Abstract: A server system obtains, for machines in a distributed system, system risk information, such as information identifying open sessions between respective users and respective machines, information identifying vulnerabilities in respective machines; and administrative rights information identifying groups of users having administrative rights to respective machines. The server system determines security risk factors, including risk factors related to lateral movement between logically coupled machines, and generates machine risk assessment values for at least a subset of the machines, based on a weighted combination of the risk factors. A user interface that includes a list of machines, sorted in accordance with the machine risk assessment values is presented to a user.Type: GrantFiled: November 18, 2020Date of Patent: November 28, 2023Assignee: TANIUM INC.Inventors: Stefan Horst-Guenter Molls, Joshua M. Bryant, Keith A. Robertson, John E. Foscue
-
Patent number: 11829516Abstract: Systems and methods for automated actions for application policy violations are disclosed. For example, policy violation evaluation components may monitor requests and/or responses from one or more applications to identify content policy violations. When a violation is identified, an automated decision engine utilizes data representing the policy violation along with, in example, contextual information about the policy violation to identify a rule from a rules database that is associated with the policy violation. An action is determined from the selected rule, and a command is generated to perform the action in response to the policy violation.Type: GrantFiled: September 30, 2020Date of Patent: November 28, 2023Assignee: Amazon Technologies, Inc.Inventor: Madhura Ashwin Raj
-
Patent number: 11831630Abstract: Systems and methods for accessing credentials from a blockchain are provided. A computing device requests for a server to process a transaction. In response to the request, the server transmits a server public key to the computing device. A key generator of the computing devices uses the user private key and the server public key to generate a user public key. The user public key includes permissions to access credentials that are stored on blockchain. The server receives the user public key and generates a request for credentials to blockchain. The request includes the user public key and the server private key. The blockchain receives the request and generates an identity token. The identity token includes credentials that are specified in the user public key. The blockchain transmits the identity token to the server and the server uses the identity token to processes the transaction.Type: GrantFiled: December 12, 2022Date of Patent: November 28, 2023Assignee: PayPal, Inc.Inventor: Lorenz Lee Breu