Network Patents (Class 726/3)
  • Patent number: 12041082
    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.
    Type: Grant
    Filed: February 27, 2023
    Date of Patent: July 16, 2024
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Yeeling Lam
  • Patent number: 12041095
    Abstract: A computer method and system for mitigating Domain Name System (DNS) misuse using a probabilistic data structure, such as a cuckoo filter. Intercepted is network traffic flowing from one or more external hosts to a computer network, the intercepted network traffic including a DNS request that requests a Resource Record name in a DNS zone file. A determination is made as to whether the DNS request is requesting resolution at a protected DNS Name Server. A hash value is calculated for the requested Resource Record name if it is determined the DNS request is requesting resolution at the protected DNS Name Server. A determination is then made as to whether the calculated hash value for the requested Resource Record name is present in the probabilistic data structure. The DNS request is forwarded to the protected server if the requested Resource Record name is determined present in the probabilistic data structure.
    Type: Grant
    Filed: July 14, 2023
    Date of Patent: July 16, 2024
    Assignee: ARBOR NETWORKS, INC.
    Inventors: Brian St. Pierre, Sean O'Hara, Edmund J. Gurney, III
  • Patent number: 12034730
    Abstract: A computing system for detecting shadow applications operating in devices used by an organization, the system including a memory and a processor configured to monitor incoming email messages received by email accounts of the organization, identify, from the incoming email messages, a first list of software services used by identities of the organization, collect from identity provider services a second list of software services used by identities of the organization via the identity provider services, identify a list of unsanctioned applications that appear in the first list and do not appear in the second list of software services, and update a database based on the list of unsanctioned applications.
    Type: Grant
    Filed: March 21, 2024
    Date of Patent: July 9, 2024
    Assignee: RECOLABS LTD.
    Inventors: Tal Shapira, Dana Hohenstein, Eyal Asulin
  • Patent number: 12034871
    Abstract: In a method for enabling a message receive end to quickly confirm a certificate status, a defined field of a certificate includes classification information of the certificate, and a defined field of a certificate revocation list includes classification information of a revoked certificate, so that the receive end can quickly narrow a searching or matching range in massive records of the certificate revocation list based on the classification information carried in the certificate of a transmit end.
    Type: Grant
    Filed: February 23, 2021
    Date of Patent: July 9, 2024
    Assignee: HUAWEI CLOUD COMPUTING TECHNOLOGIES CO., LTD.
    Inventors: Fei Li, Jintao Zhu, Chengdong He, Tao Bai
  • Patent number: 12028456
    Abstract: A computer-implemented system for authorizing access to one or more smart devices provided in a local environment is disclosed herein. The system comprises a client device, a local network node, and a remote network node. The remote network node is configured generate a link and send it to an address associated with a personal identifier of the client device, and in response to the client device having executed the link, the client device being configured to receive an authorization code. The authorization code is locally or remotely validated based on a challenge previously generated by the client device. An access token is generated and sent to the client device, thereby authorizing the client device access to the one or more smart devices in the local environment.
    Type: Grant
    Filed: April 28, 2022
    Date of Patent: July 2, 2024
    Assignee: Inter IKEA Systems B.V.
    Inventor: Ted Hallberg
  • Patent number: 12015915
    Abstract: This application provides a communication method and apparatus, and relates to the field of communication technologies. The method may include: A network device performs integrity protection on system information by using a first private key, and sends the system information, where the system information includes a first public key corresponding to the first private key and/or an index of the first public key. Correspondingly, a terminal device receives the system information from the network device, and if determining that the first public key is valid, the terminal device verifies integrity of the system information by using the first public key. According to this method, on one hand, the terminal device can effectively identify validity of the system information. On the other hand, because the system information includes the first public key and/or the index of the first public key, flexible update of an asymmetric key can be implemented.
    Type: Grant
    Filed: October 28, 2021
    Date of Patent: June 18, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Tingting Geng, Haiyan Luo, Le Yan, Qinghai Zeng
  • Patent number: 12010114
    Abstract: Upon determining a first user of an object is authorized via first biometric data, object components are controlled based on user data for the first user. A second user is permitted to access the object based on detecting a presence of the second user within a predetermined time of detecting an absence of the first user. Then, upon determining a delay parameter is satisfied, a user status of the second user is determined via second biometric data. The user status is one of authorized or not authorized. The object components are controlled based on the user status of the second user.
    Type: Grant
    Filed: April 5, 2022
    Date of Patent: June 11, 2024
    Assignee: Ford Global Technologies, LLC
    Inventors: Ryan Edwin Hanson, John Robert Van Wiemeersch
  • Patent number: 12010284
    Abstract: An image forming apparatus is provided with a storage, a controller, an image forming part, a first interface configured to receive an image forming job, and a second interface to which a portable storage device is connectable. When the particular storing function is enabled, image data is stored in the portable storage in response to receipt of the print job, and an image is formed in accordance with the image data stored in the portable storage. When the particular storing function is disabled, the image data related to the print job is stored in the storage of the image forming apparatus in response to receipt of the print job, and an image is formed in accordance with the image data stored in the storage of the image forming apparatus.
    Type: Grant
    Filed: December 5, 2022
    Date of Patent: June 11, 2024
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Sho Ogura
  • Patent number: 12001384
    Abstract: A processing element array includes N processing elements (PE) arranged linearly, N?2, and an operating method of the PE array includes: performing a first data transmission procedure, where an initial value of I is 1 and the first data transmission procedure includes: operating, by an ith PE, according to a first datum stored in itself, and sending the first datum to other PEs for their operations, adding 1 to I when I<N, and performing the first data transmission procedure again, performing a second data transmission procedure when I is equal to N, which includes: operating, by the Jth PE, according to a second datum stored in itself, and sending the second datum to other PEs for their operations, reducing J by 1 when J>1 and the (J?1)th PE has the second datum, and performing the second data transmission procedure again.
    Type: Grant
    Filed: November 17, 2022
    Date of Patent: June 4, 2024
    Assignees: INVENTEC (PUDONG) TECHNOLOGY CORPORATION, INVENTEC CORPORATION
    Inventors: Yu-Sheng Lin, Trista Pei-Chun Chen, Wei-Chao Chen
  • Patent number: 12003520
    Abstract: A method for scalable vulnerability detection is provided. The method includes selecting at least a workload of a plurality of workloads deployed in a first cloud environment for inspection, wherein the workload includes a first volume; generating in a remote cluster an inspection node, the inspection node including at least a first disk, wherein the remote cluster provisions inspection nodes in response to demand for inspection nodes; generating a persistent volume (PV) on which the at least a first disk is mounted, wherein the at least a first disk is generated from a snapshot of the first volume; and generating a persistent volume claim (PVC) of the PV for an inspector workload, wherein the inspector workload is configured to inspect the PV for an object, and wherein inspector workloads are provisioned in response to demand for inspector workloads.
    Type: Grant
    Filed: September 15, 2023
    Date of Patent: June 4, 2024
    Assignee: Wiz, Inc.
    Inventors: Yarin Miran, Ami Luttwak, Roy Reznik, Avihai Berkovitz, Moran Cohen, Yaniv Shaked, Yaniv Joseph Oliver
  • Patent number: 12003605
    Abstract: A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both.
    Type: Grant
    Filed: March 11, 2023
    Date of Patent: June 4, 2024
    Assignee: BRIGHT DATA LTD.
    Inventors: Derry Shribman, Ofer Vilenski
  • Patent number: 12003961
    Abstract: Techniques for facilitating onboarding to a non-public network is provided. Provisioning parameters may be provided to User Equipment (UE) from a Default Credential Server (DCS) via a secure communication tunnel. Additionally or alternatively, provisioning parameter container(s) including readable provisioning parameters for an Onboarding Network (ONN), and secure provisioning parameters for the UE, may be transmitted to the UE via the ONN. The disclosed methods and apparatuses enable the UE to onboard to a non-public network using the provisioning parameters, and to verify the integrity of the provisioning parameters and ensure the provisioning parameters are not modified by an unauthorized device.
    Type: Grant
    Filed: October 29, 2021
    Date of Patent: June 4, 2024
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Markus Staufer, Rainer Liebhart, Devaki Chandramouli, Markus Sakari Isomäki, Pekka Juhani Korja
  • Patent number: 12003538
    Abstract: An authentication system includes an authentication module and a user history database storing order information that includes, for each of multiple logins of the first user to a web property, at least one of: an indication of an order of hypertext transfer protocol (HTTP) headers that were previously received at the authentication module during the login, and an indication of an order of navigator object properties that were previously returned to the authentication module during the login. The authentication module is configured to: receive, from a web browser of a first entity attempting to log in to the web property, credentials of the first user; determine order information of the first entity's web browser; perform a comparison operation based on the order information of the first user and that of the first entity, and determine whether to allow the first entity to log in based on the comparison operation.
    Type: Grant
    Filed: December 16, 2022
    Date of Patent: June 4, 2024
    Assignee: CHARLES SCHWAB & CO., INC.
    Inventor: John Scott Kula
  • Patent number: 11997338
    Abstract: Devices, systems, and methods are provided for enhanced parsing of manifest files for streaming media. A method may include receiving, by a media player, a first media manifest including tags indicative of first temporal segments for media content; identifying, using a parser, a first tag indicative of a first temporal segment; identifying, using the parser, a second tag indicative of a second temporal segment; parsing, using the parser, the first tag; based on at least one of the parsing or a user preference indicative of a starting location for playback of first media content of the media content or a preferred bandwidth, refraining from parsing the second tag; retrieving, by the at least one processor, based on a time associated with the first temporal segment, an address of the first video content; and presenting, by the at least one processor, the first media content based on the address.
    Type: Grant
    Filed: August 16, 2021
    Date of Patent: May 28, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Kyle Koceski, Mairo Pedrini
  • Patent number: 11995050
    Abstract: A method for sketch computation is provided. The method may comprise receiving an input data stream from one or more client applications. The method may also comprise generating at least one segment from the input data stream. At least one segment may comprise a plurality of chunks. The method may further comprise computing a sketch of the at least one segment. The sketch may comprise a set of features that are representative of or unique to the at least one segment, such that the set of features corresponds to the at least one segment. The sketch may be useable for inline deduplication of at least one other input data stream received from the one or more client applications without (i) generation of a full index of the plurality of chunks or (ii) comparison of the at least one other input data stream to the full index.
    Type: Grant
    Filed: July 28, 2021
    Date of Patent: May 28, 2024
    Assignee: GRANICA COMPUTING, INC.
    Inventors: Santhosh Rahul Ponnala, Tarang Vaish
  • Patent number: 11989330
    Abstract: A permission management method and a terminal device are provided, where the permission management method is applied to the terminal device including a first display area and a second display area. The permission management method includes: determining a target permission management policy corresponding to a first application based on a display area in which the first application is located (101); and controlling permission management for the first application according to the target permission management policy (102); where the target permission management policy includes a first permission management policy corresponding to the first display area and/or a second permission management policy corresponding to the second display area.
    Type: Grant
    Filed: June 28, 2021
    Date of Patent: May 21, 2024
    Assignee: VIVO MOBILE COMMUNICATION CO., LTD.
    Inventor: Gen Li
  • Patent number: 11989253
    Abstract: A device for a website building system (WBS) includes a communication hub embedded in a page of a website built by the WBS to implement 2-way cross domain communication with direct addressing between at least two third party applications from different vendors, the at least two third party applications each having an instance within the page. The communication hub includes a smart identifier and addresser to identify and provide the direct addressing of source or target third party applications between the at least two third party applications and to maintain a table of all absolute addresses for the 2-way cross domain communication; and a communication policy enforcer to enforce a communication policy between the WBS and the at least two third party applications to filter non-conforming communication according to the communication policy; and a protocol translator to provide 2-way interface translation between the at least two third party applications.
    Type: Grant
    Filed: April 12, 2021
    Date of Patent: May 21, 2024
    Assignee: Wix.com Ltd.
    Inventor: Yoav Abrahami
  • Patent number: 11985114
    Abstract: The present disclosure includes secure device coupling. An embodiment includes a processing resource, memory, and a network management device communication component configured to, identifying a network attached device within a first domain. Generating a domain device secret corresponding to the first domain. Each network attached device within the first domain can share the same domain device secret. Coupling iterations may be performed for each device within the first domain can include: generating a network management device private key and public key. Providing, via short-range communication, the network management device public key and the domain device secret to a network attached device communication component included in each network attached device of the first domain.
    Type: Grant
    Filed: August 30, 2021
    Date of Patent: May 14, 2024
    Assignee: Micron Technology, Inc.
    Inventors: Antonino Mondello, Alberto Troia
  • Patent number: 11985128
    Abstract: Embodiments of the present invention provide computer-implemented methods, computer program products and computer systems. Embodiments of the present invention can monitor user activity for one or more user interactions performed while connected to a Virtual Private Network. Embodiments of the present invention can then identify potential risks associated with a user and respective user interactions. Embodiments of the present invention can then, in response to determining a respective user interaction of the one or more interactions is suspicious, generate a real time risk score for the respective user interaction. Embodiments of the present invention can then, in response to the generate real time risk score exceeding a threshold level of risk for the respective user interaction, initiate a secondary authentication protocol.
    Type: Grant
    Filed: August 19, 2021
    Date of Patent: May 14, 2024
    Assignee: International Business Machines Corporation
    Inventors: Jacob Thomas Covell, Thomas Jefferson Sandridge, Alvin Zhang, Robert Huntington Grant
  • Patent number: 11979630
    Abstract: Systems and methods are presented herein for generating an augmented reality (“AR”) display with user interface (“UI”) elements that respond to changes in pupil characteristics in response to detecting device streaming content. A media stream playing on a device that is within a threshold distance of the AR device is detected. The source of the media stream is identified. The AR device queries the source of the media stream for a consumption option. An AR overlay is generated and comprises selectable UI elements corresponding to the consumption options. In response to receiving an input at a UI element, the AR overlay is generated based on the consumption option.
    Type: Grant
    Filed: December 1, 2021
    Date of Patent: May 7, 2024
    Assignee: Rovi Guides, Inc.
    Inventors: Saloni Sharma, Greeshma Jagadha Phani Lakshmi Alapati, Harshith Kumar Gejjegondanahally Sreekanth, Ishan Bhadula, Simranjeet Gill, Sourabh Kumar, Srikanth Channapragada, Vivek Sehgal, Reda Harb
  • Patent number: 11979419
    Abstract: Examples of techniques for threat detection in an industrial process system are described herein. An aspect includes determining a plurality of subsystems of an industrial process system. Another aspect includes, for each of the plurality of subsystems, constructing and training a respective deep autoencoder (DAE) model of the subsystem based on data corresponding to the industrial process system. Another aspect includes monitoring the industrial process system using the plurality of DAE models corresponding to the plurality of subsystems. Another aspect includes, based on the plurality of DAE models, determining a cyberattack in a subsystem of the plurality of subsystems.
    Type: Grant
    Filed: April 9, 2019
    Date of Patent: May 7, 2024
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Chengtao Wen, Mohamed El Amine Houyou, Juan L. Aparicio Ojea, Mathias Maurmaier, Martin Sehr, Tao Cui
  • Patent number: 11979541
    Abstract: A server is configured to perform obtaining a first request for information associated with an administrator of a communication device from an administrator's device, transmitting management information associated with the administrator to a management device in response to the first request, obtaining an information request for information to be used by the communication device therefrom, transmitting authentication information to use the communication device thereto, obtaining the authentication information and the management information from the terminal device, the authentication information obtained from the terminal device being information transmitted by the terminal device based on the authentication information received by the communication device, the management information obtained from the terminal device being information to be transmitted by the terminal device based on the management information received by the management device, and associating the management information obtained from the term
    Type: Grant
    Filed: February 3, 2023
    Date of Patent: May 7, 2024
    Assignee: BROTHER KOGYO KABUSHIKI KAISHA
    Inventor: Ken Saito
  • Patent number: 11973747
    Abstract: Systems and techniques for an adaptive authentication system are described herein. In an example, an adaptive authentication system is adapted to receive a request at a first entity from a second entity for secure data of a user, where the second entity is remote from the first entity. The adaptive authentication system may be further adapted to transmit a prompt to a user device associated with the user for authentication of the user and authentication of the request. The adaptive authentication system may be further adapted to receive a response to the prompt and authenticate the user and the request based on the response. The adaptive authentication system may be further adapted to transmit the secure data of the user to the second entity.
    Type: Grant
    Filed: May 12, 2023
    Date of Patent: April 30, 2024
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Harlan H. Bloom, Lizmari Brignoni, Mark David Castonguay, Lisa Munter Clarke, Upul D. Hanwella, Traci H. Nguyen, Erica Ulrich
  • Patent number: 11971860
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for providing an embedded web view of a folder in a content management system on a web page. For example, a user can request from a content management system code for embedding a web view of a content item or group of content items (e.g., folder) into a web page. After the code is embedded into the webpage, the web page can present a web view of the content item or group of content items that is dynamically updated when the content item or group of content items is updated. Thus, the user is relieved of the burden of updating the web page with new links to reflect changes in content items stored in the online content management system.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: April 30, 2024
    Assignee: Dropbox, Inc.
    Inventors: Roger Tu, Aisha Ferrazares, Jennifer Lee, Sang Tian
  • Patent number: 11963260
    Abstract: A method of ending a subscription performed in a network entity is disclosed. The method comprises receiving, from a device comprising an Embedded Universal Integrated Circuit Card, eUICC, a signed confirmation of a profile having been deleted in the device, the profile being associated with a subscription for the device; sending, to a Subscription Manager Data Preparation entity, a command for deletion of the profile; and deleting the user subscription and related profile in case an acknowledgement of the deletion of the profile is received from the Subscription Manager Data Preparation entity. Method in a device, method in a Subscription Manager Data Preparation entity, devices and entities, computer programs and computer program products are also provided.
    Type: Grant
    Filed: June 2, 2021
    Date of Patent: April 16, 2024
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Patrik Salmela, Abu Shohel Ahmed, Kazi Wali Ullah
  • Patent number: 11962658
    Abstract: A system for providing network services is provided. The system includes a device configured to interface with the network to receive a container, where the container is configured to interface with an operating system of the device and a plurality of applications operating on the device. The container is further configured to interface with a network services provider of one or more network services and one or more third party service providers.
    Type: Grant
    Filed: April 3, 2023
    Date of Patent: April 16, 2024
    Assignee: RELIANCE JIO INFOCOMM USA, INC.
    Inventors: Nathan A. Smith, Mathew Oommen, Pallavur A. Sankaranaraynan
  • Patent number: 11956366
    Abstract: The present invention comprises a computer-implemented zero-trust authentication method that utilizes the Bitcoin Lightning Network, which is the sole protocol offering immediate, immutable, and cost-free Bitcoin settlement. A user requests access to the resource of a service provider and the user provides authentication material necessary to securely access the service provider. The service provider initiates a Hold Invoice via a cryptographic function to generate a pre-image hash, instructing the user to authorize release of Bitcoin in an amount stipulated by the Hold Invoice. Bitcoin is held in the Hold Invoice until an authentication attempt is either successful or unsuccessful. If successful, the user is issued an access token to login into the resource, the Hold Invoice is canceled and Bitcoin is released to the user. If unsuccessful, the pre-image is revealed, the user is denied access, and Bitcoin is transferred to the service provider as a settled payment transaction.
    Type: Grant
    Filed: October 28, 2023
    Date of Patent: April 9, 2024
    Inventor: James Michael Siers
  • Patent number: 11954434
    Abstract: Methods and apparatuses are described for automatic validation of a hybrid digital document. A server computing device downloads a hybrid digital document from a remote computing device, the hybrid digital document comprising an image content file and a hypertext content file. The server computing device determines content validation rules based upon one or more attributes associated with the hybrid digital document. The server computing device converts the image content file to a text content file. The server computing device validates one or more data elements in the text content file using the content validation rules. The server computing device validates one or more data elements in the hypertext content file using the content validation rules. The server computing device transmits a notification to the remote computing device indicating an outcome of the data elements validation.
    Type: Grant
    Filed: May 19, 2023
    Date of Patent: April 9, 2024
    Assignee: FMR LLC
    Inventors: Neha Pradeep Bhatt, Renuka Arumugam, Kirankumar Raka, Christopher Addison, Mahesh Venkat Adusumelli
  • Patent number: 11949718
    Abstract: An overlay to existing infrastructure that establishes trusted paths in a communication network to fulfill a fundamental need to identify and protect a trusted plane of devices and/or applications on a need specific basis is described. Establishing trusted paths operationally fulfills a fundamental need to identify and protect a trusted plane of devices and/or applications on a need specific basis as an overlay to the existing relatively unsecured network.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: April 2, 2024
    Assignee: ARRIS Enterprises LLC
    Inventors: Christopher Poli, Roger D Gahman
  • Patent number: 11936796
    Abstract: Described implementations obtain credential information including an encrypted digital identity (ID). The encrypted digital ID may include a public component of a credential and identity data. Furthermore, the credential information may include cryptographically obfuscated data based on the identity data and a private component of the credential. A proof is obtained that includes proof data. The proof data may confirm that the credential information was correctly generated. Verification of the proof data, and confirmation that the cryptographically obfuscated data is not associated in a collection of cryptographically obfuscated data, cause a computer-implemented service to issue a pseudonym. The pseudonym is usable to generate a relationship associated with a computer-implemented service.
    Type: Grant
    Filed: December 13, 2019
    Date of Patent: March 19, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Nicholas Alexander Allen, Matthew Stephen Bullock, Daniel Ron Simon
  • Patent number: 11934550
    Abstract: Provided is a process including: obtaining criteria to select plain-text values in a lower-trust database; selecting, based on the criteria, a first plain-text value; in response, determining a first reference value; storing the first plain-text value in a higher-trust database in a second entry identified by the first reference value; storing the first reference value in the first entry of the lower-trust database; selecting another instance of the first plain-text value stored requested to be stored in a third entry in the lower-trust database; and in response, storing the first reference value in the third entry.
    Type: Grant
    Filed: April 20, 2022
    Date of Patent: March 19, 2024
    Assignee: ALTR SOLUTIONS, INC.
    Inventors: James Douglas Beecham, Christopher Edward Struttmann, Scott Nathaniel Goldfarb
  • Patent number: 11930138
    Abstract: A management apparatus that manages a plurality of image forming apparatuses, the management apparatus includes: a storage that stores histories of user operations on the image forming apparatuses for the plurality of image forming apparatuses, respectively; and a hardware processor that determines an image forming apparatus recommended to be operated from among the plurality of image forming apparatuses based on the histories of the user operations of the image forming apparatuses and outputs a notification indicating the determined recommended image forming apparatus.
    Type: Grant
    Filed: April 4, 2022
    Date of Patent: March 12, 2024
    Assignee: KONICA MINOLTA, INC.
    Inventor: Izuru Nomura
  • Patent number: 11928189
    Abstract: Provided are an information processing apparatus, an information processing method, and an electronic device capable of appropriately perform update of a license provided by an information processing apparatus and used in an electronic device. The electronic device includes a key generation unit that generates a device unique key that is a key unique to every device, and a license management unit that updates a license in a case where an extension code generated by a predetermined method on the basis of the device unique key, first data different for every installation of the license provided by an information processing apparatus, and second data different depending on the number of times of update of the license coincides with an input extension code.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: March 12, 2024
    Assignee: SONY CORPORATION
    Inventor: Yosuke Hiratsuka
  • Patent number: 11929985
    Abstract: Techniques and systems for optimizing and cleaning rules for network-based authentication transactions are provided herein. A network-based authentication system may determine a plurality of rules that were previously used to evaluate a plurality of transactions. The network-based authentication system may also generate a false positive rate for one or more of the plurality of rules, A cleaning coefficient for a first rule of the plurality of rules may be generated by the network-based authentication system. Based on the cleaning coefficient and the false positive rate, the network-based authentication system may identify one or more rules from the plurality of rules to eliminate from the plurality of rules. The network-based authentication system may eliminate the one or more rules to generate a modified set of rules. Using the modified set of rules, the network-based authentication system may authenticate a network transaction.
    Type: Grant
    Filed: March 24, 2023
    Date of Patent: March 12, 2024
    Assignee: The Western Union Company
    Inventors: Chaoyun Chen, Quan Li, Zifang Huang
  • Patent number: 11916887
    Abstract: According to an embodiment, a method receives one or more messages associated with connecting a client and a first host. At least one of the messages comprises an encrypted portion indicating the first host and at least one of the messages comprises a cleartext portion indicating a second host. The method determines first and second sets of links associated with the first and second host, respectively. The first set is determined based on monitoring a result of connecting the client and the first host. The second set is determined based on observing behavior associated with connecting to the second host. The method detects domain fronting in response to determining, based on comparing the first set of links and the second set of links, that the first host differs from the second host.
    Type: Grant
    Filed: January 27, 2023
    Date of Patent: February 27, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: David McGrew, Blake Harrell Anderson
  • Patent number: 11916894
    Abstract: A method including pre-authenticating, by an infrastructure device, a user device for obtaining communication services from a server, the pre-authenticating including determining a given duration of time and a communication parameter associated with a pre-authentication request received from the user device; and operating, by the infrastructure device, a port associated with the server in an activated mode for the given duration of time to enable the user device to transmit an authentication request indicating the communication parameter prior to an expiration of the given duration of time. Various other aspects are contemplated.
    Type: Grant
    Filed: March 25, 2022
    Date of Patent: February 27, 2024
    Assignee: UAB 360 IT
    Inventor: Adrianus Warmenhoven
  • Patent number: 11909418
    Abstract: A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. The computing device is operable to receive a memory access request for a data object stored within the DSN, determine a realm for the memory access request, determine an authorization service for the realm and generate an authorization request for the memory access request. The computing device is further operable to transmit the authorization request to an authorization service, receive an authorization request response from the authorization service, determine whether the memory access request is authorized and process the memory access request.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: February 20, 2024
    Assignee: Pure Storage, Inc.
    Inventors: Dustin M. Hendrickson, Manish Motwani
  • Patent number: 11907706
    Abstract: The disclosure provides for analyzing upgrade and migration readiness. Embodiments include receiving an indication to upgrade a software product and a selected upgrade path identifying a target-upgrade version. Embodiments include accessing an array of pre-upgrade procedures comprising code for identifying one or more conditions that must be met before the software product can be upgraded based on the accessed array being associated with the software product. Embodiments include executing one or more of the pre-upgrade procedures in advance of upgrading the software product. Embodiments include accessing one or more autonomous remediation scripts from the repository based on identification of one or more failed pre-upgrade procedures. Embodiments include executing the one or more autonomous remediation scripts to cure the one or more failed pre-upgrade procedures and initiating an upgrade of the software product based on identifying that the array of pre-upgrade procedures successfully completed execution.
    Type: Grant
    Filed: May 14, 2021
    Date of Patent: February 20, 2024
    Assignee: VMware, Inc.
    Inventors: Prashant Shelke, Ashish Agrawal
  • Patent number: 11907931
    Abstract: A method for managing a virtual electronic card is applicable to a secure chip installed in a first terminal, and the method includes: receiving a management request from a trusted mobile application on the first terminal, the management request being used to manage a target virtual electronic card on the secure chip, and permissions of the virtual electronic card being configured by a chip operating system of the secure chip; determining, from the secure chip, a target card management program corresponding to the target virtual electronic card, the different virtual electronic cards corresponding to the different card management programs; sending the management request to the target card management program; and calling, through the target card management program, a card management command corresponding to the management request in a card management system on the secure chip, to manage the target virtual electronic card.
    Type: Grant
    Filed: September 13, 2021
    Date of Patent: February 20, 2024
    Assignee: SHENZHEN GOODIX TECHNOLOGY CO., LTD.
    Inventor: Yanling Zhang
  • Patent number: 11902300
    Abstract: An approach for monitoring a data transmission system that uses a data transmission means such as a vehicle bus or a vehicle network of a motor vehicle. This system includes a monitoring device that transmits a request message to a transmitting device and to a receiving device. The transmitting device generates a particular transmitter response on the basis of the request message, where the transmitter response is transmitted to the monitoring device. The receiving device generates a particular receiver response on the basis of the request message, where the receiver response is transmitted to the monitoring device. The monitoring device receives the transmitter response and the receiver response and checks compliance with a trigger condition which depends on the transmitter response and the receiver response, the compliance of which indicates an event relevant to monitoring.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: February 13, 2024
    Assignee: AUDI AG
    Inventors: Markus Klein, Kamil Zawadzki, Changsup Ahn, Wolfgang Stadler, Karsten Schmidt
  • Patent number: 11902226
    Abstract: Access to a first instant messaging service using an online identity that is associated with a second instant messaging service is enabled. A profile is accessed. The profile indicates that another instant messaging service is to be provided with presence information regarding the use of the online identity to access the first instant messaging service. The other instant messaging service is provided with the presence information regarding the use of the online identity to access the first instant messaging service.
    Type: Grant
    Filed: December 29, 2020
    Date of Patent: February 13, 2024
    Assignee: Verizon Patent and Licensing Inc.
    Inventor: Larry L. Lu
  • Patent number: 11902330
    Abstract: A device may receive data identifying malicious behavior by a compromised endpoint device associated with a network and may receive user identity data identifying a user of the compromised endpoint device associated with the network. The device may receive endpoint device data identifying the compromised endpoint device and other endpoint devices associated with the network and may receive network device data identifying network devices associated with the network. The device may utilize the data identifying malicious behavior, the user identity data, and the endpoint device data to generate, based on an identity of the user, a security policy to isolate the malicious behavior. The device may cause the security policy to be provided to the network devices and the other endpoint devices based on the network device data and the endpoint device data.
    Type: Grant
    Filed: June 16, 2021
    Date of Patent: February 13, 2024
    Assignee: Juniper Networks, Inc.
    Inventor: Craig Dods
  • Patent number: 11899859
    Abstract: A system and method for remotely generating an original signature provided by a signatory as a user of a first mobile device are disclosed. According to one embodiment, the system comprises a cloud server having a signature transmission API, and a video stream module configured to facilitate a live video stream. The system further includes a pen plotter having a plotter controller communicatively coupled to the cloud server by the signature transmission API. The pen plotter has a mechanical arm configured to receive an ink pen, and a video capture device communicatively coupled to the video stream module of the cloud server and configured to capture video of the pen plotter and transmit to the video stream module.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: February 13, 2024
    Assignee: Aven Holdings, Inc.
    Inventors: Usman Ghani, Andrew Gray, Sadi Khan, Wendy Beth Oliver, Murtada Shah, Collin Wikman
  • Patent number: 11902848
    Abstract: A method (30) and system (10) for controlling wireless local area network (WLAN) user quality in a multi-access point environment is provided. In order to ensure good quality of service/user experience in a multi-access point Wi-Fi™ setup in which a user roams with a station (14), the access points (11, 12) continuously or at intervals assess the wireless environment's quality and report to a control entity (13). The control entity (13) determines, from the assessment data, alternative target access points (11, 12) that could be used in case the link quality of a current connection between an access point (11) and the station (14) falls below a pre-defined value. The control entity (13) then instructs the access point (11) to actively disconnect the station (14) and selects a new target access point (12) to accept the stations (14) connection request.
    Type: Grant
    Filed: June 2, 2022
    Date of Patent: February 13, 2024
    Assignee: INTERDIGITAL CE PATENT HOLDINGS
    Inventors: Koen Van Oost, Bart Vercammen, Kevin Gardner
  • Patent number: 11882110
    Abstract: Examples of renewal of security certificates of supplicant devices are described. In an example, a request to authenticate a supplicant device based on a security certificate is received by an authenticator device and from a supplicant device. The request comprises information relating to the security certificate which is expired. A login history of the supplicant device and presence of a valid account associated with the supplicant device in a directory database is determined. An authentication successful message is sent to the supplicant device based on the login history and presence of the valid account in the directory database. The supplicant device is redirected to a captive web portal for authentication of the supplicant device based on the login credential. In response to a successful authentication of the supplicant device in the captive web portal, a renewed security certificate for the supplicant device is provided.
    Type: Grant
    Filed: April 2, 2021
    Date of Patent: January 23, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Vikram Limaye, Jason Atkins, Preeti Bhagavan
  • Patent number: 11863586
    Abstract: Inline package name based supply chain attack detection and prevention is disclosed. An indication that a client device has made a request to a remote server for a package is received. A data appliance then performs an action responsive to the received indication. In an example implementation, the data appliance makes a determination of whether the request for the package is associated with a nonexisting package.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: January 2, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Ruian Duan, Daiping Liu, Jun Wang, Zihang Xiao
  • Patent number: 11853439
    Abstract: The present specification describes computer-implemented methods and systems for secure storage and transmission of data in a distributed network environment. In embodiments, each piece of data is transformed in to multiple pieces of metadata. Each piece of metadata is transmitted and stored on a different server, which is selected from separate pools of servers.
    Type: Grant
    Filed: December 28, 2021
    Date of Patent: December 26, 2023
    Assignee: Activision Publishing, Inc.
    Inventor: Philippe Louis Yves Paquet
  • Patent number: 11849157
    Abstract: The present disclosure relates to systems and methods for live streaming. The system may receive a play request associated with a live stream from a terminal device. The system may determine whether there are one or more cached fragments associated with the live stream, wherein the one or more cached fragments are cached from a stream source via a first protocol. In response to determining that there are one or more cached fragments associated with the live stream, the system may determine whether the play request is a request that the terminal device requests the live stream for the first time. In response to determining that the play request is the request that the terminal device requests the live stream for the first time, after a caching of a current fragment is completed, the system may transmit an index file corresponding to the current fragment and at least one of the one or more cached fragments to the terminal device via a second protocol.
    Type: Grant
    Filed: January 14, 2022
    Date of Patent: December 19, 2023
    Assignee: ZHEJIANG DAHUA TECHNOLOGY CO., LTD.
    Inventor: Shengfeng Zeng
  • Patent number: 11849318
    Abstract: A method of authenticating a device subscribed to a first wireless communication network on a second wireless communication network, the method including: deriving at a node within the first wireless communication network a set of one or more network keys for the second wireless communication network from one or more network keys of the first wireless communication network that uniquely identify the device within the first wireless communication network; communicating the derived set of one or more network keys to the device; storing a first copy of the derived set of one or more network keys within an identification module at the device and a second copy of the derived set of one or more network keys within a secure area of the device; and authenticating the device on the second wireless communication network using the second copy of the derived set of one or more network keys stored in the secure area of the device.
    Type: Grant
    Filed: March 18, 2019
    Date of Patent: December 19, 2023
    Assignee: BRITISH TELECOMMUNICATIONS PLC
    Inventors: Ruth Brown, Jonathan Hart
  • Patent number: 11849321
    Abstract: Systems and method are provided for a temporary network slice usage barring service within a core network. A network device in the core network receives a slice barring information message for an application function (AF). The slice barring information message includes a unique subscriber identifier associated with a user equipment (UE) device to be barred from a network slice and indicates a barring expiration time. The network device stores barring parameters based on the slice barring information message. The barring parameters include a slice identifier associated with the AF, the unique subscriber identifier, and the barring expiration time. The network device sends a barring instruction message to another network device associated with the network slice. The barring instruction message includes the unique subscriber identifier and the barring expiration time. The other network device enforces temporary barring of the UE device from the network slice based on the barring instruction message.
    Type: Grant
    Filed: May 20, 2022
    Date of Patent: December 19, 2023
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Suzann Hua, Ye Huang, Chien-Yuan Huang, Parry Cornell Booker