Network Patents (Class 726/3)
-
Patent number: 12160685Abstract: A system and method are disclosed for generating a teleconference space for two or more initial communication devices using a computer coupled with a database and including a processor and memory. The computer generates a teleconference space and transmits requests to join the teleconference space to the two or more initial communication devices. The computer stores in memory identification information, and audiovisual data associated with one or more users, for each of the two or more initial communication devices. The computer transmits audiovisual teleconference data to each of the two or more initial communication devices. The computer transmits a request to join the teleconference space to a third communication device, stores identification information and audiovisual data from the third communication device, and transmits audiovisual teleconference data that includes audiovisual data from the third communication device to each of the three or more communication devices.Type: GrantFiled: February 28, 2024Date of Patent: December 3, 2024Assignee: Nextiva, Inc.Inventors: Tomas Gorny, Jean-Baptiste Martinoli, Tracy Conrad, Lukas Gorny
-
Patent number: 12160420Abstract: Techniques provided herein relate to electronic data access requests. An access system receives at least one electronic data action request from a client. At least a portion of the data access authentication information is sourced from a secondary device connected to an intermediary device. The electronic data action request is authenticated based upon the data access authentication information.Type: GrantFiled: July 5, 2023Date of Patent: December 3, 2024Assignee: United Services Automobile Association (USAA)Inventors: Bharat Prasad, Charles Lee Oakes, III, Gunjan C. Vijayvergia, Vijay Jayapalan, Thomas Bret Buckingham
-
Patent number: 12155645Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to, when a signed certificate associated with a client expires, challenge the client by transmitting a first plurality of keys to a client IHS, wherein the client IHS is configured to respond the challenge by associating each of the keys with a second plurality of keys, pairing each of the first key with its associated second key, sending the paired first and second keys to the server IHS, and authenticate the client IHS by verifying that each of the first plurality of keys is associated with the second plurality of keys.Type: GrantFiled: October 27, 2022Date of Patent: November 26, 2024Assignee: Dell Products, L.P.Inventors: Viswanath Ponnuru, Magesh Kumar Sivaswamy, Judith A. Furlong
-
Patent number: 12137096Abstract: A quantum entanglement communication service can be provided by detecting a request to access data stored at a first computer. In response to detecting the data access request, a request can be generated to request that a server computer generate an entangled particle pair. Measurement data can be received, the measurement data corresponding to a measurement observed after interacting a first bit of a token stored at a second computer with a first entangled particle from the entangled particle pair. An operation to perform on a second entangled particle of the entangled particle pair at the first computer can be determined and performed. A state of the second entangled particle can be measured to obtain a value, and a bit string can be generated, where the bit string can include a number that corresponds to the value.Type: GrantFiled: March 6, 2023Date of Patent: November 5, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: William Trost, Luis Albisu
-
Patent number: 12137025Abstract: A secure private network connectivity system (SNCS) within a cloud service provider infrastructure (CSPI) is described that provides secure private network connectivity between external resources residing in a customer's on-premise environment and the customer's resources residing in the cloud. The SNCS provides secure private bi-directional network connectivity between external resources residing in a customer's external site representation and resources and services residing in the customer's VCN in the cloud without a user (e.g., an administrator) of the enterprise having to explicitly configure the external resources, advertise routes or set up site-to-site network connectivity.Type: GrantFiled: September 27, 2023Date of Patent: November 5, 2024Assignee: Oracle International CorporationInventors: Lucas Michael Kreger-Stickles, Abhiman Yashpala Karkera, Dhwanish Pramthesh Shah, Guanhong Pei, Clayton Matthew Magouyrk, Paul James Cainkar
-
Patent number: 12133153Abstract: A system includes a plurality of remote units; a centralized unit communicatively coupled to the plurality of remote units via a fronthaul network; and an entity that performs deep packet inspection. The centralized unit transmits sets of data to the plurality of remote units across the fronthaul network in packets, each of the sets of data mapped to at least one of the plurality of remote units and each of the packets including a respective indicator indicating each remote unit the associated packet is intended for, wherein each indicator comprises a plurality of bit positions where each bit position is mapped to a different one of the plurality of remote units. The entity performs the deep packet inspection on the packets to determine each remote unit the packets are intended for and communicate each packet to each remote unit the packet is intended for over the fronthaul network.Type: GrantFiled: October 21, 2022Date of Patent: October 29, 2024Assignee: CommScope Technologies LLCInventors: Balaji B Raghothaman, Irfaan Ahamed Salahuddeen, Arthur J. Barabell
-
Patent number: 12127066Abstract: Method and apparatus for improving the flexibility of supporting service continuity are disclosed. A method comprises receiving a PCC rule containing a traffic steering control information per AF request which includes an indication on whether service continuity for offload traffic is supported or not; and performing a PSA relocation based on the information.Type: GrantFiled: September 30, 2019Date of Patent: October 22, 2024Assignee: Lenovo (Beijing) LimitedInventors: Tingfang Tang, Genadi Velev
-
Patent number: 12118127Abstract: A machine data validation system can track and validate the integrity of machine data generated by machines. The system can generate hashes for the items and batch hashes that can be validated using an immutable data store, such one or more blockchains in a tiered blockchain structure. The system can store machine data and additional associated data in a first lightweight blockchain, and store grouped sets of the data in a second robust blockchain. The system can implement the tiered blockchain structure to efficiently store and reference the hashes to validate the machine data at different times or upon request from an end-user.Type: GrantFiled: October 29, 2021Date of Patent: October 15, 2024Assignee: SPLUNK INC.Inventors: Christopher Cordi, Nathaniel G. McKervey, Siegfried Puchbauer, Antoine Toulme
-
Patent number: 12120512Abstract: An external Secure Intelligent Secondary Router is connected to a Primary Wired/Wireless Router/Modem via wire cable, and whereby said external Secure Intelligent Secondary Router communicably coupled to said Primary Wired/Wireless Router/Modem creates one or more secure secondary Wi-Fi networks that can only be accessed by a computing device that has been registered by the rightful account owner and whose identity has been validated by an online validation service.Type: GrantFiled: March 7, 2022Date of Patent: October 15, 2024Inventors: Gary William Streuter, William Pat Price, Andy Gutman
-
Patent number: 12118550Abstract: The present invention comprises a computer-implemented method for zero-trust authentication and session management utilizing the Bitcoin Lightning Network. A user requests access to the resource of a service provider and the user provides authentication material to securely access the service provider. The service provider initiates a Hold Invoice via a cryptographic function to generate a pre-image hash instructing the user to authorize release a specified amount of Bitcoin. Bitcoin is then moved into the Hold Invoice where it remains during an authentication attempt. A successful attempt issues an access token to log into an authenticated session. The Hold Invoice remains in place until the session ends, then the Hold Invoice is canceled and Bitcoin is released to the user. An unsuccessful attempt or a violations of terms of use, reveals the pre-image, denies the user access, and Bitcoin is transferred to the service provider as a settled payment transaction.Type: GrantFiled: January 18, 2024Date of Patent: October 15, 2024Assignee: AUTHLN LLCInventors: James Michael Siers, Maxwell Dignan
-
Patent number: 12107931Abstract: The present disclosure relates to a system, method, and computer-program product for identifying and tagging users. Embodiments may include receiving, using at least one processor, a first content request. Embodiments may further include associating a user-access identifier with a first portion of data from the first content request based upon a second portion of the data from the first content request. Embodiments may also include storing the first portion of data from the first content request and the user-access identifier within a memory system. Embodiments may further include receiving a second content request. Embodiments may also include generating a user-identifier tag based upon the user-access identifier stored in the memory system, the first portion of data from the first content request, and a first portion of data from the second content request. Embodiments may further include providing a response to the second content request, the response including the user-identifier tag.Type: GrantFiled: June 22, 2021Date of Patent: October 1, 2024Assignee: Polaris Solutions, LLCInventor: John Phillip Harlamert, II
-
Patent number: 12107827Abstract: A unified network service that connects multiple disparate private networks and end user client devices operating on separate networks is described. The multiple disparate private networks and end user client devices connect to a distributed cloud computing network that provides routing services, security services, and performance services, and that can be controlled consistently regardless of the connection type. The unified network service provides uniform access control at the L3 layer (e.g., at the IP layer) or at a higher layer using user identity information (e.g., a zero-trust model). The disparate private networks are run on top of the distributed cloud computing network. The virtual routing layer of the distributed cloud computing network allows customers of the service to have private resources visible only to client devices (e.g.Type: GrantFiled: May 31, 2023Date of Patent: October 1, 2024Assignee: CLOUDFLARE, INC.Inventors: Nicholas Alexander Wondra, Igor Postelnik, Michael John Vanderwater, Adam Simon Chalmers, Nuno Miguel Lourenço Diegues, Arég Harutyunyan, Erich Alfred Heine
-
Patent number: 12096514Abstract: Methods and apparatus are provided for network slice configuration. In one example aspect, a method in a network function in a network is disclosed. The network is a visited network for at least one User Equipment, UE. The network provides a network slice for the at least one UE, and the network function is a gateway for data communications for the at least one UE. The method includes obtaining an IP address for at least one service for the at least one UE, and providing the at least one service to the at least one UE according to a gateway configuration from a home network of the at least one UE.Type: GrantFiled: March 22, 2019Date of Patent: September 17, 2024Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventors: Nipun Sharma, Rakesh Bajpai, Steve Menear, Tushar Sabharwal, Hans Eriksson, Rajiv Bhardwaj
-
Patent number: 12095783Abstract: A fraud detecting method for use in an in-vehicle network system including a plurality of electronic control units that communicate with each other via a network includes detecting whether a state of a vehicle satisfies a first condition or a second condition, and switching, upon detecting that the state of the vehicle satisfies the first condition or the second condition, an operation mode of a second electronic control unit connected to the network. A first mode in which a first type of detecting process for detecting a fraudulent message in the network is performed is switched to a second mode in which the first type of detecting process is not performed upon detecting that the state of the vehicle satisfies the first condition. Moreover, the second mode is switched to the first mode upon detecting that the state of the vehicle satisfies the second condition.Type: GrantFiled: October 4, 2023Date of Patent: September 17, 2024Assignee: Panasonic Intellectual Property Corporation of AmericaInventors: Manabu Maeda, Hideki Matsushima, Tomoyuki Haga, Yuji Unagami, Yoshihiro Ujiie, Takeshi Kishikawa
-
Patent number: 12096213Abstract: The invention relates to a method and a system for generating and saving a set of digital data or evidence associated with an individual within a system including several devices issuing and receiving evidence and a medium for communicating between the devices, which may include: For the generation of the data constituting evidence by a device, the definition of a data block characterizing the evidence, For the individual wishing to build him/herself a set of evidence, adding to the received data block data characterizing a piece of evidence, a datestamp parameter, an indicator identifying the device receiving a piece of evidence, an evidence signature. In order to use a piece of evidence, an individual issues a request containing the evidence proving that he/she is the recipient of this evidence to a third-party system. The third-party system contacts the device issuing the evidence which re-signs.Type: GrantFiled: June 10, 2020Date of Patent: September 17, 2024Assignee: IMPRIMERIE NATIONALEInventors: Stéphane Drubay, Thomas Foutrein, Jean-François Demeestere
-
Patent number: 12093982Abstract: Methods and systems to identify a user across multiple browsers and machines are described. In some embodiments, a web request is received at a retrieval service from a browser. The web request may include a request to access a retrieval service website of the retrieval service and may be initiated by a redirection of the browser from a requesting service to the retrieval service. A unique identifier associated with a user logged in to an account of the retrieval service may be determined. The user may be logged in to the account via the browser. A redirect request is sent from the retrieval service to the browser. The redirect may include the unique identifier and may redirect the browser from the retrieval service website to the requesting service. The unique identifier may be used by the requesting service to perform additional functionality specific to the user.Type: GrantFiled: November 3, 2022Date of Patent: September 17, 2024Assignee: PayPal, Inc.Inventor: Srinivasan Raman
-
Patent number: 12081982Abstract: Techniques and apparatus for optimizing an initial access stratum security mode command procedure are described. One example technique includes sending a first service request to establish a connection with a network. A second service request is sent to the network, upon determining that one or more criteria is satisfied. Another example technique includes sending a first service request to establish a connection with a network and sending a second service request after sending the first service request. The first service request is associated with a first security parameter and the second service request is associated with a second security parameter. A security mode command procedure is participated in with a base station, based on the first security parameter and the second security parameter.Type: GrantFiled: September 7, 2021Date of Patent: September 3, 2024Assignee: QUALCOMM IncorporatedInventors: Xuepan Guan, Osama Lotfallah, Vitaly Drapkin, Cogol Tina, Swathi Seshadri
-
Patent number: 12079285Abstract: A learning device includes processing circuitry configured to use a web browser to crawl one or more web pages from an originating web page, and to accept input of log information obtained from the web browser until an ending web page is reached, and generate a training model using, as training data, any one or more feature amounts among a feature amount of each web page included in the log information, a feature amount about an operation performed on the web browser on a path reaching the ending web page, and a feature amount about an event occurring on the path reaching the ending web page.Type: GrantFiled: May 24, 2019Date of Patent: September 3, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Takashi Koide, Daiki Chiba
-
Patent number: 12075122Abstract: Systems and methods for presenting user-selectable options for parental control in response to detecting a triggering action by a user are disclosed. A system generates for output a first content item on a device. The system identifies a first user and a second user in proximity to the device and determines that a first gesture is performed by the first user wherein the first gesture is covering the eyes of the second user. In response to determining that the first gesture is performed, the system presents a selectable option for a user input such as (a) skipping a portion of the first content item; (b) lowering the volume; (c) removing the video of the first content item; or (d) presenting a second content item instead of presenting the first content item. In response to receiving a user input selecting the selectable option, the system performs an action corresponding to the selectable option.Type: GrantFiled: June 29, 2021Date of Patent: August 27, 2024Assignee: Rovi Guides, Inc.Inventor: Daina Emmanuel
-
Patent number: 12063223Abstract: Systems and methods for implementing a system for analyzing large amounts of event data to determine any potential security threats or anomalies. Event data may be obtained and processed. The processed event data may be analyzed to detect any potential security threats or anomalies.Type: GrantFiled: December 11, 2019Date of Patent: August 13, 2024Assignee: Amazon Technologies, Inc.Inventors: Joshua Haycraft, Vignesh Janakiraman, Jessica Erin Clark, Pradeep Ramarao, Karthik Kumar Odapally
-
Patent number: 12058589Abstract: An integrated access and backhaul (IAB) donor central unit (CU) may transmit, to an IAB-node, a plurality of messages for a child of the IAB-node, the plurality of messages including a first message being associated with a first condition, and a second message being associated with a second condition, and transmit an indication instructing the IAB to forward, to the child, the first message if a first condition is met or the second message if a second condition is met. The IAB-node may receive, from the IAB-donor-CU, the indication, determine that one condition among the first condition and the second condition has occurred, forward one of the first message or the second message to the child based on the occurrence of the one condition, and discard the other of the first message or the second message.Type: GrantFiled: December 15, 2021Date of Patent: August 6, 2024Assignee: QUALCOMM IncorporatedInventors: Naeem Akl, Karl Georg Hampel, Luis Fernando Brisson Lopes, Navid Abedini, Jianghong Luo, Luca Blessent, Junyi Li, Tao Luo
-
Patent number: 12051059Abstract: A method includes receiving, by an identity provider computing system, a user token from a third party provider, wherein the user token is associated with a user of the identity provider computing system; sending, by the identity provider computing system, a prompt to a user device associated with the user token, the prompt requesting authentication information and including a code; and authenticating, by the identity provider computing system, the user token based on receipt of the requested authentication information and receipt of the code from the third party provider.Type: GrantFiled: November 14, 2022Date of Patent: July 30, 2024Assignee: Wells Fargo Bank, N.A.Inventor: Brian M. Pearce
-
Patent number: 12041082Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.Type: GrantFiled: February 27, 2023Date of Patent: July 16, 2024Assignee: AT&T Intellectual Property I, L.P.Inventor: Yeeling Lam
-
Patent number: 12041095Abstract: A computer method and system for mitigating Domain Name System (DNS) misuse using a probabilistic data structure, such as a cuckoo filter. Intercepted is network traffic flowing from one or more external hosts to a computer network, the intercepted network traffic including a DNS request that requests a Resource Record name in a DNS zone file. A determination is made as to whether the DNS request is requesting resolution at a protected DNS Name Server. A hash value is calculated for the requested Resource Record name if it is determined the DNS request is requesting resolution at the protected DNS Name Server. A determination is then made as to whether the calculated hash value for the requested Resource Record name is present in the probabilistic data structure. The DNS request is forwarded to the protected server if the requested Resource Record name is determined present in the probabilistic data structure.Type: GrantFiled: July 14, 2023Date of Patent: July 16, 2024Assignee: ARBOR NETWORKS, INC.Inventors: Brian St. Pierre, Sean O'Hara, Edmund J. Gurney, III
-
Patent number: 12034730Abstract: A computing system for detecting shadow applications operating in devices used by an organization, the system including a memory and a processor configured to monitor incoming email messages received by email accounts of the organization, identify, from the incoming email messages, a first list of software services used by identities of the organization, collect from identity provider services a second list of software services used by identities of the organization via the identity provider services, identify a list of unsanctioned applications that appear in the first list and do not appear in the second list of software services, and update a database based on the list of unsanctioned applications.Type: GrantFiled: March 21, 2024Date of Patent: July 9, 2024Assignee: RECOLABS LTD.Inventors: Tal Shapira, Dana Hohenstein, Eyal Asulin
-
Patent number: 12034871Abstract: In a method for enabling a message receive end to quickly confirm a certificate status, a defined field of a certificate includes classification information of the certificate, and a defined field of a certificate revocation list includes classification information of a revoked certificate, so that the receive end can quickly narrow a searching or matching range in massive records of the certificate revocation list based on the classification information carried in the certificate of a transmit end.Type: GrantFiled: February 23, 2021Date of Patent: July 9, 2024Assignee: HUAWEI CLOUD COMPUTING TECHNOLOGIES CO., LTD.Inventors: Fei Li, Jintao Zhu, Chengdong He, Tao Bai
-
Patent number: 12028456Abstract: A computer-implemented system for authorizing access to one or more smart devices provided in a local environment is disclosed herein. The system comprises a client device, a local network node, and a remote network node. The remote network node is configured generate a link and send it to an address associated with a personal identifier of the client device, and in response to the client device having executed the link, the client device being configured to receive an authorization code. The authorization code is locally or remotely validated based on a challenge previously generated by the client device. An access token is generated and sent to the client device, thereby authorizing the client device access to the one or more smart devices in the local environment.Type: GrantFiled: April 28, 2022Date of Patent: July 2, 2024Assignee: Inter IKEA Systems B.V.Inventor: Ted Hallberg
-
Patent number: 12015915Abstract: This application provides a communication method and apparatus, and relates to the field of communication technologies. The method may include: A network device performs integrity protection on system information by using a first private key, and sends the system information, where the system information includes a first public key corresponding to the first private key and/or an index of the first public key. Correspondingly, a terminal device receives the system information from the network device, and if determining that the first public key is valid, the terminal device verifies integrity of the system information by using the first public key. According to this method, on one hand, the terminal device can effectively identify validity of the system information. On the other hand, because the system information includes the first public key and/or the index of the first public key, flexible update of an asymmetric key can be implemented.Type: GrantFiled: October 28, 2021Date of Patent: June 18, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Tingting Geng, Haiyan Luo, Le Yan, Qinghai Zeng
-
Patent number: 12010284Abstract: An image forming apparatus is provided with a storage, a controller, an image forming part, a first interface configured to receive an image forming job, and a second interface to which a portable storage device is connectable. When the particular storing function is enabled, image data is stored in the portable storage in response to receipt of the print job, and an image is formed in accordance with the image data stored in the portable storage. When the particular storing function is disabled, the image data related to the print job is stored in the storage of the image forming apparatus in response to receipt of the print job, and an image is formed in accordance with the image data stored in the storage of the image forming apparatus.Type: GrantFiled: December 5, 2022Date of Patent: June 11, 2024Assignee: Brother Kogyo Kabushiki KaishaInventor: Sho Ogura
-
Patent number: 12010114Abstract: Upon determining a first user of an object is authorized via first biometric data, object components are controlled based on user data for the first user. A second user is permitted to access the object based on detecting a presence of the second user within a predetermined time of detecting an absence of the first user. Then, upon determining a delay parameter is satisfied, a user status of the second user is determined via second biometric data. The user status is one of authorized or not authorized. The object components are controlled based on the user status of the second user.Type: GrantFiled: April 5, 2022Date of Patent: June 11, 2024Assignee: Ford Global Technologies, LLCInventors: Ryan Edwin Hanson, John Robert Van Wiemeersch
-
Patent number: 12003520Abstract: A method for scalable vulnerability detection is provided. The method includes selecting at least a workload of a plurality of workloads deployed in a first cloud environment for inspection, wherein the workload includes a first volume; generating in a remote cluster an inspection node, the inspection node including at least a first disk, wherein the remote cluster provisions inspection nodes in response to demand for inspection nodes; generating a persistent volume (PV) on which the at least a first disk is mounted, wherein the at least a first disk is generated from a snapshot of the first volume; and generating a persistent volume claim (PVC) of the PV for an inspector workload, wherein the inspector workload is configured to inspect the PV for an object, and wherein inspector workloads are provisioned in response to demand for inspector workloads.Type: GrantFiled: September 15, 2023Date of Patent: June 4, 2024Assignee: Wiz, Inc.Inventors: Yarin Miran, Ami Luttwak, Roy Reznik, Avihai Berkovitz, Moran Cohen, Yaniv Shaked, Yaniv Joseph Oliver
-
Patent number: 12001384Abstract: A processing element array includes N processing elements (PE) arranged linearly, N?2, and an operating method of the PE array includes: performing a first data transmission procedure, where an initial value of I is 1 and the first data transmission procedure includes: operating, by an ith PE, according to a first datum stored in itself, and sending the first datum to other PEs for their operations, adding 1 to I when I<N, and performing the first data transmission procedure again, performing a second data transmission procedure when I is equal to N, which includes: operating, by the Jth PE, according to a second datum stored in itself, and sending the second datum to other PEs for their operations, reducing J by 1 when J>1 and the (J?1)th PE has the second datum, and performing the second data transmission procedure again.Type: GrantFiled: November 17, 2022Date of Patent: June 4, 2024Assignees: INVENTEC (PUDONG) TECHNOLOGY CORPORATION, INVENTEC CORPORATIONInventors: Yu-Sheng Lin, Trista Pei-Chun Chen, Wei-Chao Chen
-
Patent number: 12003605Abstract: A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both.Type: GrantFiled: March 11, 2023Date of Patent: June 4, 2024Assignee: BRIGHT DATA LTD.Inventors: Derry Shribman, Ofer Vilenski
-
Patent number: 12003961Abstract: Techniques for facilitating onboarding to a non-public network is provided. Provisioning parameters may be provided to User Equipment (UE) from a Default Credential Server (DCS) via a secure communication tunnel. Additionally or alternatively, provisioning parameter container(s) including readable provisioning parameters for an Onboarding Network (ONN), and secure provisioning parameters for the UE, may be transmitted to the UE via the ONN. The disclosed methods and apparatuses enable the UE to onboard to a non-public network using the provisioning parameters, and to verify the integrity of the provisioning parameters and ensure the provisioning parameters are not modified by an unauthorized device.Type: GrantFiled: October 29, 2021Date of Patent: June 4, 2024Assignee: NOKIA TECHNOLOGIES OYInventors: Markus Staufer, Rainer Liebhart, Devaki Chandramouli, Markus Sakari Isomäki, Pekka Juhani Korja
-
Patent number: 12003538Abstract: An authentication system includes an authentication module and a user history database storing order information that includes, for each of multiple logins of the first user to a web property, at least one of: an indication of an order of hypertext transfer protocol (HTTP) headers that were previously received at the authentication module during the login, and an indication of an order of navigator object properties that were previously returned to the authentication module during the login. The authentication module is configured to: receive, from a web browser of a first entity attempting to log in to the web property, credentials of the first user; determine order information of the first entity's web browser; perform a comparison operation based on the order information of the first user and that of the first entity, and determine whether to allow the first entity to log in based on the comparison operation.Type: GrantFiled: December 16, 2022Date of Patent: June 4, 2024Assignee: CHARLES SCHWAB & CO., INC.Inventor: John Scott Kula
-
Patent number: 11997338Abstract: Devices, systems, and methods are provided for enhanced parsing of manifest files for streaming media. A method may include receiving, by a media player, a first media manifest including tags indicative of first temporal segments for media content; identifying, using a parser, a first tag indicative of a first temporal segment; identifying, using the parser, a second tag indicative of a second temporal segment; parsing, using the parser, the first tag; based on at least one of the parsing or a user preference indicative of a starting location for playback of first media content of the media content or a preferred bandwidth, refraining from parsing the second tag; retrieving, by the at least one processor, based on a time associated with the first temporal segment, an address of the first video content; and presenting, by the at least one processor, the first media content based on the address.Type: GrantFiled: August 16, 2021Date of Patent: May 28, 2024Assignee: Amazon Technologies, Inc.Inventors: Kyle Koceski, Mairo Pedrini
-
Patent number: 11995050Abstract: A method for sketch computation is provided. The method may comprise receiving an input data stream from one or more client applications. The method may also comprise generating at least one segment from the input data stream. At least one segment may comprise a plurality of chunks. The method may further comprise computing a sketch of the at least one segment. The sketch may comprise a set of features that are representative of or unique to the at least one segment, such that the set of features corresponds to the at least one segment. The sketch may be useable for inline deduplication of at least one other input data stream received from the one or more client applications without (i) generation of a full index of the plurality of chunks or (ii) comparison of the at least one other input data stream to the full index.Type: GrantFiled: July 28, 2021Date of Patent: May 28, 2024Assignee: GRANICA COMPUTING, INC.Inventors: Santhosh Rahul Ponnala, Tarang Vaish
-
Patent number: 11989330Abstract: A permission management method and a terminal device are provided, where the permission management method is applied to the terminal device including a first display area and a second display area. The permission management method includes: determining a target permission management policy corresponding to a first application based on a display area in which the first application is located (101); and controlling permission management for the first application according to the target permission management policy (102); where the target permission management policy includes a first permission management policy corresponding to the first display area and/or a second permission management policy corresponding to the second display area.Type: GrantFiled: June 28, 2021Date of Patent: May 21, 2024Assignee: VIVO MOBILE COMMUNICATION CO., LTD.Inventor: Gen Li
-
Patent number: 11989253Abstract: A device for a website building system (WBS) includes a communication hub embedded in a page of a website built by the WBS to implement 2-way cross domain communication with direct addressing between at least two third party applications from different vendors, the at least two third party applications each having an instance within the page. The communication hub includes a smart identifier and addresser to identify and provide the direct addressing of source or target third party applications between the at least two third party applications and to maintain a table of all absolute addresses for the 2-way cross domain communication; and a communication policy enforcer to enforce a communication policy between the WBS and the at least two third party applications to filter non-conforming communication according to the communication policy; and a protocol translator to provide 2-way interface translation between the at least two third party applications.Type: GrantFiled: April 12, 2021Date of Patent: May 21, 2024Assignee: Wix.com Ltd.Inventor: Yoav Abrahami
-
Patent number: 11985114Abstract: The present disclosure includes secure device coupling. An embodiment includes a processing resource, memory, and a network management device communication component configured to, identifying a network attached device within a first domain. Generating a domain device secret corresponding to the first domain. Each network attached device within the first domain can share the same domain device secret. Coupling iterations may be performed for each device within the first domain can include: generating a network management device private key and public key. Providing, via short-range communication, the network management device public key and the domain device secret to a network attached device communication component included in each network attached device of the first domain.Type: GrantFiled: August 30, 2021Date of Patent: May 14, 2024Assignee: Micron Technology, Inc.Inventors: Antonino Mondello, Alberto Troia
-
Patent number: 11985128Abstract: Embodiments of the present invention provide computer-implemented methods, computer program products and computer systems. Embodiments of the present invention can monitor user activity for one or more user interactions performed while connected to a Virtual Private Network. Embodiments of the present invention can then identify potential risks associated with a user and respective user interactions. Embodiments of the present invention can then, in response to determining a respective user interaction of the one or more interactions is suspicious, generate a real time risk score for the respective user interaction. Embodiments of the present invention can then, in response to the generate real time risk score exceeding a threshold level of risk for the respective user interaction, initiate a secondary authentication protocol.Type: GrantFiled: August 19, 2021Date of Patent: May 14, 2024Assignee: International Business Machines CorporationInventors: Jacob Thomas Covell, Thomas Jefferson Sandridge, Alvin Zhang, Robert Huntington Grant
-
Patent number: 11979630Abstract: Systems and methods are presented herein for generating an augmented reality (“AR”) display with user interface (“UI”) elements that respond to changes in pupil characteristics in response to detecting device streaming content. A media stream playing on a device that is within a threshold distance of the AR device is detected. The source of the media stream is identified. The AR device queries the source of the media stream for a consumption option. An AR overlay is generated and comprises selectable UI elements corresponding to the consumption options. In response to receiving an input at a UI element, the AR overlay is generated based on the consumption option.Type: GrantFiled: December 1, 2021Date of Patent: May 7, 2024Assignee: Rovi Guides, Inc.Inventors: Saloni Sharma, Greeshma Jagadha Phani Lakshmi Alapati, Harshith Kumar Gejjegondanahally Sreekanth, Ishan Bhadula, Simranjeet Gill, Sourabh Kumar, Srikanth Channapragada, Vivek Sehgal, Reda Harb
-
Patent number: 11979419Abstract: Examples of techniques for threat detection in an industrial process system are described herein. An aspect includes determining a plurality of subsystems of an industrial process system. Another aspect includes, for each of the plurality of subsystems, constructing and training a respective deep autoencoder (DAE) model of the subsystem based on data corresponding to the industrial process system. Another aspect includes monitoring the industrial process system using the plurality of DAE models corresponding to the plurality of subsystems. Another aspect includes, based on the plurality of DAE models, determining a cyberattack in a subsystem of the plurality of subsystems.Type: GrantFiled: April 9, 2019Date of Patent: May 7, 2024Assignee: SIEMENS AKTIENGESELLSCHAFTInventors: Chengtao Wen, Mohamed El Amine Houyou, Juan L. Aparicio Ojea, Mathias Maurmaier, Martin Sehr, Tao Cui
-
Patent number: 11979541Abstract: A server is configured to perform obtaining a first request for information associated with an administrator of a communication device from an administrator's device, transmitting management information associated with the administrator to a management device in response to the first request, obtaining an information request for information to be used by the communication device therefrom, transmitting authentication information to use the communication device thereto, obtaining the authentication information and the management information from the terminal device, the authentication information obtained from the terminal device being information transmitted by the terminal device based on the authentication information received by the communication device, the management information obtained from the terminal device being information to be transmitted by the terminal device based on the management information received by the management device, and associating the management information obtained from the termType: GrantFiled: February 3, 2023Date of Patent: May 7, 2024Assignee: BROTHER KOGYO KABUSHIKI KAISHAInventor: Ken Saito
-
Patent number: 11973747Abstract: Systems and techniques for an adaptive authentication system are described herein. In an example, an adaptive authentication system is adapted to receive a request at a first entity from a second entity for secure data of a user, where the second entity is remote from the first entity. The adaptive authentication system may be further adapted to transmit a prompt to a user device associated with the user for authentication of the user and authentication of the request. The adaptive authentication system may be further adapted to receive a response to the prompt and authenticate the user and the request based on the response. The adaptive authentication system may be further adapted to transmit the secure data of the user to the second entity.Type: GrantFiled: May 12, 2023Date of Patent: April 30, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Harlan H. Bloom, Lizmari Brignoni, Mark David Castonguay, Lisa Munter Clarke, Upul D. Hanwella, Traci H. Nguyen, Erica Ulrich
-
Patent number: 11971860Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for providing an embedded web view of a folder in a content management system on a web page. For example, a user can request from a content management system code for embedding a web view of a content item or group of content items (e.g., folder) into a web page. After the code is embedded into the webpage, the web page can present a web view of the content item or group of content items that is dynamically updated when the content item or group of content items is updated. Thus, the user is relieved of the burden of updating the web page with new links to reflect changes in content items stored in the online content management system.Type: GrantFiled: December 28, 2015Date of Patent: April 30, 2024Assignee: Dropbox, Inc.Inventors: Roger Tu, Aisha Ferrazares, Jennifer Lee, Sang Tian
-
Patent number: 11963260Abstract: A method of ending a subscription performed in a network entity is disclosed. The method comprises receiving, from a device comprising an Embedded Universal Integrated Circuit Card, eUICC, a signed confirmation of a profile having been deleted in the device, the profile being associated with a subscription for the device; sending, to a Subscription Manager Data Preparation entity, a command for deletion of the profile; and deleting the user subscription and related profile in case an acknowledgement of the deletion of the profile is received from the Subscription Manager Data Preparation entity. Method in a device, method in a Subscription Manager Data Preparation entity, devices and entities, computer programs and computer program products are also provided.Type: GrantFiled: June 2, 2021Date of Patent: April 16, 2024Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Patrik Salmela, Abu Shohel Ahmed, Kazi Wali Ullah
-
Patent number: 11962658Abstract: A system for providing network services is provided. The system includes a device configured to interface with the network to receive a container, where the container is configured to interface with an operating system of the device and a plurality of applications operating on the device. The container is further configured to interface with a network services provider of one or more network services and one or more third party service providers.Type: GrantFiled: April 3, 2023Date of Patent: April 16, 2024Assignee: RELIANCE JIO INFOCOMM USA, INC.Inventors: Nathan A. Smith, Mathew Oommen, Pallavur A. Sankaranaraynan
-
Patent number: 11956366Abstract: The present invention comprises a computer-implemented zero-trust authentication method that utilizes the Bitcoin Lightning Network, which is the sole protocol offering immediate, immutable, and cost-free Bitcoin settlement. A user requests access to the resource of a service provider and the user provides authentication material necessary to securely access the service provider. The service provider initiates a Hold Invoice via a cryptographic function to generate a pre-image hash, instructing the user to authorize release of Bitcoin in an amount stipulated by the Hold Invoice. Bitcoin is held in the Hold Invoice until an authentication attempt is either successful or unsuccessful. If successful, the user is issued an access token to login into the resource, the Hold Invoice is canceled and Bitcoin is released to the user. If unsuccessful, the pre-image is revealed, the user is denied access, and Bitcoin is transferred to the service provider as a settled payment transaction.Type: GrantFiled: October 28, 2023Date of Patent: April 9, 2024Inventor: James Michael Siers
-
Patent number: 11954434Abstract: Methods and apparatuses are described for automatic validation of a hybrid digital document. A server computing device downloads a hybrid digital document from a remote computing device, the hybrid digital document comprising an image content file and a hypertext content file. The server computing device determines content validation rules based upon one or more attributes associated with the hybrid digital document. The server computing device converts the image content file to a text content file. The server computing device validates one or more data elements in the text content file using the content validation rules. The server computing device validates one or more data elements in the hypertext content file using the content validation rules. The server computing device transmits a notification to the remote computing device indicating an outcome of the data elements validation.Type: GrantFiled: May 19, 2023Date of Patent: April 9, 2024Assignee: FMR LLCInventors: Neha Pradeep Bhatt, Renuka Arumugam, Kirankumar Raka, Christopher Addison, Mahesh Venkat Adusumelli