By Authorizing Data Patents (Class 726/30)
  • Patent number: 12242985
    Abstract: Methods and apparatus for portable network interfaces to manage authentication and license enforcement. A system may include a plurality of resource instances including a producer instance configured to implement a network-accessible service, and an authentication coordinator. The coordinator may assign an interface record to the service, wherein the interface record comprises an IP address and a set of security properties. The coordinator may configure the security properties to allow a client to request an attachment of the interface record to a selected resource instance, such that the selected resource instance is enabled to transmit network messages from the IP address using one or more physical network interfaces of the selected resource instance. The producer resource instance initiates authentication operations for the service, including at least one authentication operation based on the IP address of the interface record.
    Type: Grant
    Filed: April 1, 2022
    Date of Patent: March 4, 2025
    Assignee: Amazon Technologies, Inc.
    Inventors: Christopher Richard Jacques de Kadt, James Alfred Gordon Greenfield
  • Patent number: 12241769
    Abstract: The present disclosure discloses a method for determining an abnormal device in a process of measuring energy of natural gas based on Internet of Things (IOT). The method may include obtaining a natural gas detection parameter detected by at least one detection device via a sense network platform in response to a query request; determining first energy data and second energy data by processing the natural gas detection parameter; determining whether the abnormal device exists by comparing the first energy data and the second energy data; in response to determining that the abnormal device exists, for each detection device, determining a probability that the detection device is abnormal based on related information of the detection device, the first energy data, and the second energy data; and determining the abnormal device based on the probability that the detection device is abnormal.
    Type: Grant
    Filed: August 24, 2023
    Date of Patent: March 4, 2025
    Assignee: CHENGDU QINCHUAN IOT TECHNOLOGY CO., LTD.
    Inventors: Zehua Shao, Haitang Xiang, Xiaojun Wei, Bin Liu
  • Patent number: 12244609
    Abstract: The present disclosure provides a method for determining the authenticity of an identity document that includes receiving, by an electronic device, an image of an identity document. The document image includes facial image data and personal data of a person associated with the identity document and an identity document number. Moreover, the method includes extracting the personal data and the document number from the identity document image. The extracted personal data includes at least a surname and the extracted identity document number includes groups of characters that represent personal data and information about an entity. Furthermore, the method includes decoding a first group of the characters using a soundex coding algorithm, identifying a surname that corresponds to the decoded first group of characters, comparing the identified surname against the surname in the extracted personal data, and determining the authenticity of the identity document using a result of the comparison.
    Type: Grant
    Filed: February 14, 2023
    Date of Patent: March 4, 2025
    Inventor: Raphael A. Rodriguez
  • Patent number: 12244711
    Abstract: Systems, methods, network devices, and machine-readable media disclosed herein include executing a secure algorithm for computing on a plurality of machines in a cluster by receiving a large input message and dividing the large input message into a plurality of initial input messages, computing an encryption of initial input messages, and evaluating a cluster computing circuit using a homomorphic encryption scheme.
    Type: Grant
    Filed: July 29, 2021
    Date of Patent: March 4, 2025
    Assignees: NTT Research, Inc., Cornell University
    Inventors: Rex Fernando, Ilan Komargodski, Runting Shi
  • Patent number: 12235998
    Abstract: A computing system includes a BIOS, a BMC coupled to the BIOS, and one or more hardware components. The BMC can receive commands from a user, and transition between a locked state and an unlocked state. When the BMC is in the unlocked state, the BMC responds to commands received from the user. When the BMC is in the locked state, the BMC ignores commands received from the user. The BMC is configured to receive an unlock command from a user that includes an unlock signature. The BMC is further configured to determine whether the unlock signature is authentic. If the unlock signature is authentic and the BMC is in the locked state, the BMC is configured to transition from the locked state to the unlocked state, to allow the user access to the hardware components of the computing system.
    Type: Grant
    Filed: July 28, 2022
    Date of Patent: February 25, 2025
    Assignee: QUANTA COMPUTER INC.
    Inventors: Cheng-Han Chen, Jyun-Jei Huang
  • Patent number: 12238164
    Abstract: Described herein are systems and methods that provide access of a cloud service workload to data of storage devices. A control plane identifies one or more arrays of the storage devices as to what the workload needs access. Discovering is performed by the control plane as to data access of the cloud service to the storage devices. Cloud service accounts which include compute resources used by the workload are identified by the control plane. The control plane provides access to the workload and the compute resources to the data using the data access of the cloud service.
    Type: Grant
    Filed: May 2, 2023
    Date of Patent: February 25, 2025
    Assignee: Dell Products L.P.
    Inventors: Pooja P. Prasannakumar, William J. Elliott, IV, Bahubali Jain
  • Patent number: 12217323
    Abstract: A vehicle data management system and data jurisdiction system manage vehicle data between multiple jurisdictions and enables a set of jurisdiction rules involving rules of various jurisdictions to be applied consistently. The vehicle data jurisdiction system can detect changes in jurisdiction of a vehicle based on various pieces of received vehicle information and applies appropriate jurisdiction rules from a set of jurisdiction rules. Various jurisdictions may have conflicting jurisdiction rules and, in such circumstances, the data jurisdiction system resolves potential conflicts between the rules using a jurisdiction rules resolution workflow. Based on the resolution of the conflict, the data jurisdiction system can migrate data of the vehicle to one or more other jurisdictions, or otherwise implement the correct rules determined by resolving the conflict.
    Type: Grant
    Filed: March 31, 2022
    Date of Patent: February 4, 2025
    Assignee: Amazon Technologies, Inc.
    Inventors: Roland Mesde, Alex Bessonov, Kyle Daniel Halbach, Nitin Giri, Edwin Ricardo Mendez Rodriguez, Matthew Jonathan Narksusook
  • Patent number: 12210655
    Abstract: Some disclosed methods involve controlling a display system to present one or more restricted access virtual buttons in a secure region. The restricted access virtual buttons may correspond to functionality of the apparatus or functionality of a software application for which access is restricted. Some disclosed methods involve controlling the display system to present one or more unrestricted access virtual buttons in a non-secure region. The unrestricted access virtual buttons may correspond to functionality of the apparatus or functionality of the software application for which access is not restricted. Responsive to the selection of a virtual button displayed in the secure region, some methods involve performing an authentication process and executing the functionality of the device or functionality of a software application for which access is restricted after successful authentication.
    Type: Grant
    Filed: July 19, 2022
    Date of Patent: January 28, 2025
    Assignee: QUALCOMM Incorporated
    Inventor: Gordon Thomas
  • Patent number: 12210454
    Abstract: A data storage interface layer provides access management and transformation of data stored in various backend storage clusters. The data storage interface can serve as a point of access for data accessors to access stored data via a consistent data access protocol, even when a data storage cluster on which requested data is stored may use a different protocol. The data storage interface can also provide in-line transformation of requested data and/or control of access to requested data.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: January 28, 2025
    Assignee: Amazon Technologies, Inc.
    Inventors: Sachin Suresh Bhat, Lionel Bitoun, LiJing Chen, Jaikit Dungarshi Savla, Daniel Wu, Jaden Wright, Adam Tessier, Sourabh Shrivastav, Rutvik Gopalkrishna Hora, Manjunath Tumkur Maheshchandra, Ramanathan Padinjarel Somanathan, Manoj Kumar Dhanger, Nitin Saini, Jeet Nishit Mehta, Ruonan Zhang, Harshaneel Harshal Gokhale, Ravneet Singh Sidhu
  • Patent number: 12197626
    Abstract: Securing protocol keys in a communication node comprises transferring a protocol access key stored in a secure enclave of a secure host platform to a secure key store in a communication platform via a secure transfer. The protocol access key which is plaintext is secure from access by a host processor of the secure host platform. A protocol key stored in the secure enclave is encrypted to an encrypted protocol key. The encrypted protocol key is transferred from the secure enclave to the communication platform over an unsecure bus. The encrypted protocol key is deciphered based on the protocol access key in the communication platform to form the protocol key. The protocol key which is plaintext is secured from access by the host processor, the communication controller, or both.
    Type: Grant
    Filed: December 14, 2021
    Date of Patent: January 14, 2025
    Assignee: NXP B.V.
    Inventor: Khurram Waheed
  • Patent number: 12200110
    Abstract: An ABE method with multiple tracing attribute authorities: performing, by a central authority, system initialization to generate a public parameter and disclosing the public parameter; performing, by each of attribute authorities, initialization to generate a key pair, and disclosing a public key in the key pair; performing, by a data owner, symmetric encryption on plaintext data, performing ABE on a symmetric key based on a hidden access structure, and generating an integrity verification value; requesting, by a data user, a decryption key to the attribute authority according to an own attribute; restoring, by the data user in response to decryption, an access structure, generating an outsourcing decryption key, sending the outsourcing decryption key to a cloud storage center for semi-decryption; generating, by the cloud storage center, a semi-decrypted ciphertext, and feeding the semi-decrypted ciphertext back to the data user; fully decrypting the semi-decrypted ciphertext according to a private decryption
    Type: Grant
    Filed: September 23, 2022
    Date of Patent: January 14, 2025
    Assignee: QILU UNIVERSITY OF TECHNOLOGY
    Inventors: Jiguo Yu, Suhui Liu, Yinglong Wang, Anming Dong
  • Patent number: 12192372
    Abstract: Systems and methods are described herein for providing provable provenance for assessment results. For example, an AI model and/or a dataset may be assessed using an assessment service to determine whether a bias exists within the AI model and/or the dataset. The results of the assessment may be provided to an auditing service to confirm the assessment results. The systems and methods described herein provide for provable provenance for the assessment results such that the auditing service can verify whether a model and validation dataset provided by a client are the same that were used during an assessment and have not been tampered with by a malicious party.
    Type: Grant
    Filed: May 12, 2022
    Date of Patent: January 7, 2025
    Assignee: CREDO.AI CORP.
    Inventor: Eli Chen
  • Patent number: 12189813
    Abstract: The present disclosure involves systems, software, and computer implemented methods for using multiple synonymous identifiers in data privacy integration protocols. One example method includes identifying a request to initiate a protocol in a multiple-application landscape for an object with an identifier. A determination is made that at least one context-using application participant of the protocol relies on a context-providing application participant of the protocol for resolving the identifier to a local identifier local to a context of the context-providing application participant. A resolution request is sent to context-providing application participants that can provide resolution for an identifier for at least one context-using application. A local identifier corresponding to the identifier that is local to the context of the context-providing application participant is received from each context-providing application participant.
    Type: Grant
    Filed: December 1, 2022
    Date of Patent: January 7, 2025
    Assignee: SAP SE
    Inventors: Benny Rolle, Matthias Vogel
  • Patent number: 12189759
    Abstract: Techniques are described herein for function-level limiting of privileges for a target application. Privileges dependencies for different functions of an application are determined based on static evaluation of the code base. A call graph with nodes representing the application functions is established, and the nodes are associated with the determined privilege dependencies. The graph is modified using iterative backward dataflow analysis to associate the nodes in the graph with privileges that are reachable from each node. Transition-edges are identified within the graph, where a transition-edge connects nodes having different sets of privileges. Function calls implementing the identified transition-edges are replaced, in instructions for the application (e.g., bytecode or machine code), with calls to wrapper functions.
    Type: Grant
    Filed: September 2, 2021
    Date of Patent: January 7, 2025
    Assignee: Oracle International Corporation
    Inventors: Matthias Neugschwandtner, Hugo Guiroux, Paul Elvinger
  • Patent number: 12177265
    Abstract: A system and method for deploying cybersecurity resources includes sourcing cybersecurity operations data that includes a plurality of distinct datasets derived from a handling of a target cybersecurity event; extracting, from the cybersecurity operations data, at least cybersecurity task feature data relating to a plurality of cybersecurity tasks and metadata, wherein each cybersecurity task of the plurality of cybersecurity tasks includes an identification of an operation executed when handling or the target cybersecurity event and an identification of an operator executing the operation; deriving timestamp data for each operation executed by a respective operator of each respective cybersecurity task of the plurality of cybersecurity tasks instantiating, by computer processors, a cybersecurity event data structure; using entries of the cybersecurity event data structure to compute allocation values for cybersecurity resources for handling impending cybersecurity events; and deploying, within a security ope
    Type: Grant
    Filed: May 20, 2024
    Date of Patent: December 24, 2024
    Assignee: Expel, Inc.
    Inventors: Jane Hung, Elisabeth Weber
  • Patent number: 12169549
    Abstract: An object is to lower the ratio of the number of users of an authentication service to the number of users of an application which uses the authentication service. A state of a first application is obtained by executing a second application. Whether to perform authentication processing is determined according to the state of the first application by executing the second application. Moreover, an instruction to perform the authentication processing is issued by executing the first application or the second application in a case where it is determined that the authentication processing is to be performed.
    Type: Grant
    Filed: July 29, 2022
    Date of Patent: December 17, 2024
    Assignee: Canon Kabushiki Kaisha
    Inventor: Tomoya Ishida
  • Patent number: 12170694
    Abstract: Embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media for data sharing. In example embodiments, a method for data sharing is provided. The method comprises, in response to receiving a first request to share data of a user from a data sharing agent, creating a data sharing smart contract for the user. The method further comprises publishing the data sharing smart contract to one or more data consumers. The method further comprises, in response to receiving a second request to access the data from a data consumer, generating, by executing the data sharing smart contract, an indication that the data consumer is authorized to access the data. In addition, the method further comprises sending the indication to the data consumer. In this way, end users are enabled to manage and share their personal data by themselves.
    Type: Grant
    Filed: December 29, 2018
    Date of Patent: December 17, 2024
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Zhiyuan Hu, Duan Chen, Yueming Yin, Zhigang Luo
  • Patent number: 12158878
    Abstract: An example operation may include one or more of receiving, by a document processor node, a document and a signed digital receipt identifying an owner of a version of the document associated with a blockchain transaction, verifying, by a document processor node, the version of the document based on the signed digital receipt, and executing a smart contract to enable a conflict-free document versioning based on a hash of the document recorded on a ledger of the blockchain.
    Type: Grant
    Filed: January 20, 2020
    Date of Patent: December 3, 2024
    Assignee: International Business Machines Corporation
    Inventors: Yedendra Shrinivasan, Krishna Chaitanya Ratakonda, Rak-Joon Choi
  • Patent number: 12153670
    Abstract: An illustrative method includes a data protection controller receiving, from a security threat monitoring application communicatively coupled to the data protection controller by way of a network, event data triggered by a detection by the security threat monitoring application of a security threat against a host attached to a storage element of a storage system remote from the host; and performing, based on the event data, a data protection operation with respect to the storage element.
    Type: Grant
    Filed: December 3, 2021
    Date of Patent: November 26, 2024
    Assignee: Pure Storage, Inc.
    Inventors: Michael Anthony Richardson, Ronald Karr
  • Patent number: 12147510
    Abstract: In a method for securing a web browser, display instructions for displaying web content are received from a content server by a web browser operating on a client computing device. The web browser creates a document object using the display instructions and determines from the document object whether one or more of the display instructions meet font profiling criteria selected to identify attempts to profile font display characteristics of the web browser. Responsive to a determination that font profiling criteria are met, the web browser alters a character display of the document object and implements the document object for displaying the web content on the client computing device.
    Type: Grant
    Filed: May 15, 2023
    Date of Patent: November 19, 2024
    Assignee: CAPITAL ONE SERVICES, LLC
    Inventors: Abdelkader Benkreira, Michael Mossoba, Joshua Edwards
  • Patent number: 12150047
    Abstract: Disclosed is a 5th generation (5G) or a pre-5G communication system provided to support a higher data transmission rate than that of post-4th generation (4G) communication systems, such as long term evolution (LTE). A method of operating a network node in a wireless communication system is provided. The method includes receiving, from a plurality of first network nodes, network data, generating first recommendation operation information for a second network node based on the network data, and transmitting, to the second network node, a first analysis result message including the first recommendation operation information.
    Type: Grant
    Filed: January 12, 2023
    Date of Patent: November 19, 2024
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jungshin Park, Yoonseon Han, Sangsoo Jeong
  • Patent number: 12130893
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for privacy-preserving cross-domain experiment monitoring are described. In one aspect, a method includes receiving, by a first server of a MPC system, a request for digital content including a first secret share of an application instance identifier that identifies the application instance associated with the device. The first server conducts, in collaboration with a second server of the secure MPC system, a privacy-preserving selection process to select a winning digital component from a set of digital components. Each digital component has a corresponding unique experiment identifier and unique control identifier. A first secret share representing the winning digital component is generated. A response is generated and includes the first secret share of the selection result and data representing whether the application is in the experiment group or a control group for each digital component.
    Type: Grant
    Filed: April 5, 2022
    Date of Patent: October 29, 2024
    Assignee: Google LLC
    Inventors: Gang Wang, Marcel M. Moti Yung, Timothy David Lambert
  • Patent number: 12132620
    Abstract: A method and/or system for Artificial Intelligence assisted service catalogue generation for network service provisioning is disclosed. The method comprising receiving input data which comprises either or combination of one or more specification documents or one or more configuration changes in network functions and/or network components. The entities and attributes of the entities are extracted from the input data which are then reconciled with graph database representing network function model to determine modifications in the input data. The graph database is updated based on the modifications identified in the input data, and recommendations comprising model elements are generated using AI engines which are displayed at the service modeler interface for generation of the service catalogue for network service provisioning.
    Type: Grant
    Filed: March 25, 2022
    Date of Patent: October 29, 2024
    Assignee: Infosys Limited
    Inventors: Vishwanath Taware, Allahbaksh Mohammedali Asadullah, Ankur Goel, Ashay Kharpate, Gaurav Saxena, Praveen Santhakumari, Lalit Nayar
  • Patent number: 12111891
    Abstract: Systems and methods for optionally restricting the rendering of particular content items. An example method comprising: receiving a plurality of content rendering options supported by a client device; determining a content item to be rendered, the content item being associated with a restriction attribute; selecting a content rendering option supported by the client device in view of the restriction attribute; generating a token comprising data associated with the selected content rendering option and the content item; receiving a client request from the client device, wherein the client request is associated with the content item and indicates a chosen content rendering option; comparing the data of the token with the chosen content rendering option indicated by the client request to determine a match; and granting the client device access to perform the chosen content rendering option on the content item based on the outcome of the determination of the match.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: October 8, 2024
    Assignee: GOOGLE LLC
    Inventors: Justin Lewis, Richard Dominick Rapp
  • Patent number: 12114150
    Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be utilized to bring about accessing a data store to determine that signal packets have been received, via an electronic communications network, from a communications device that is to be verified. The communications device being co-located with a real-world identity. The method may additionally include electronically determining that a subscriber account identifier or a subscriber-unique alias is bound to an account held by the real-world identity and electronically tying the subscriber account identifier or the subscriber-unique alias to the real-world identity in response to electronically verifying the communications device after determining that the signal packets have been received from the communications device and in response to electronically determining that the subscriber account identifier or the subscriber-unique alias is bound to the account held by the real-world identity.
    Type: Grant
    Filed: December 21, 2021
    Date of Patent: October 8, 2024
    Assignee: Prove Identity, Inc.
    Inventors: Jeffrey Naujok, Christopher Cunningham, Prashant Janakrai Desai, Rodger R. Desai
  • Patent number: 12107851
    Abstract: An authentication system for granting access to an account associated with a user. An authenticator of the authentication system including a processor and a memory, the authenticator configured to: receive a request for authentication that identifies the user; access an authentication account associated with the user, wherein the authentication account indicates a smart device associated with the user; activate a control parameter of the smart device, wherein the control parameter may cause an effect in a media sample from the smart device; receive the media sample from the smart device and determine if the effect corresponding to the control parameter is observed in the media sample; and in response to a determination that the effect is not observed in the media sample, indicate that the request for authentication is a fraudulent request.
    Type: Grant
    Filed: March 13, 2023
    Date of Patent: October 1, 2024
    Assignee: United Services Automobile Association (USAA)
    Inventors: Carlos J P Chavez, Sacha Melquiades De'Angeli, Oscar Guerra, David M. Jones, Jr., Gregory Brian Meyer, Christopher Russell, Arthur Quentin Smith
  • Patent number: 12099631
    Abstract: Embodiments herein facilitate a rule-based anonymization of an original dataset. The system may include a processor including a data privacy evaluator and a rules engine. The data privacy evaluator may receive at least one anonymized dataset corresponding to a predefined strategy of anonymization. The at least one anonymized dataset may include a variation from the original dataset by at least one of a privacy metric and a consistency metric. The data privacy evaluator may evaluate the at least one anonymized dataset and may generate a final output value based on a first output and a second output. The processor may assess the final output value with respect to a predefined threshold through the rules engine. If the final output value may be equal or higher than the predefined threshold, the system may permit an access to the anonymized dataset.
    Type: Grant
    Filed: August 31, 2021
    Date of Patent: September 24, 2024
    Assignee: ACCENTURE GLOBAL SOLUTIONS LIMITED
    Inventors: Laura Wendy Hélène Sylvie Angèle Degioanni, Richard Vidal, Laetitia Kameni, Yann Fraboni
  • Patent number: 12079356
    Abstract: An illustrative method includes a data protection system determining a metric associated with operations performed with respect to a storage system during a measurement interval, determining that the metric deviates by more than a threshold amount from a historical baseline metric associated with the storage system, and directing, based on the determining that the metric deviates by more than the threshold amount from the historical baseline metric, the storage system to generate a recovery dataset for data maintained by the storage system.
    Type: Grant
    Filed: August 23, 2021
    Date of Patent: September 3, 2024
    Assignee: Pure Storage, Inc.
    Inventors: Paul R Massiglia, Ronald Karr, John Colgrove
  • Patent number: 12069090
    Abstract: An objective of the present invention is to make a search for illegal (illegitimate) content more efficient. The illegitimate content relates to content posted by an unauthorized user without a legitimate ownership of the content. An illegitimate content search device according to the present invention comprises a phishing content sensing part for, using a profile of candidate content being potentially illegitimate content, sensing, from among the candidate content, phishing content being non-illegitimate content for guiding a user's viewing.
    Type: Grant
    Filed: February 22, 2019
    Date of Patent: August 20, 2024
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Hiroko Muto, Takahito Kawanishi, Osamu Yoshioka, Ryo Kitahara
  • Patent number: 12061914
    Abstract: In examples, a system for using interchangeable non-compute resources is provided. The system includes at least one processor and memory storing instructions that, when executed by the at least one processor, cause the system to: receive a first key corresponding to a first non-compute resource, define a first connection with the first non-compute resource based on the first key, receive a second key corresponding to a second non-compute resource, define a second connection with the second non-compute resource based on the second key, receive an indication corresponding to a selection of the first non-compute resource, and configure the system to interface with the first non-compute resource at a deployment of a generated application.
    Type: Grant
    Filed: June 6, 2022
    Date of Patent: August 13, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ryan A. Nowak, Aaron Brady Crawfis, Vinaya Damle, Karishma Chawla
  • Patent number: 12052656
    Abstract: A method comprises receiving, by a shim application of a user equipment (UE), an outbound communication from a first application destined for an external device, prior to transmitting the outbound communication to the external device, determining, by the shim application, whether to forward the outbound communication to the external device, via a radio interface of the UE, based on a first policy, receiving, by the shim application, an inbound communication destined for a second application from the external device, via the radio interface, determining, by the shim application, whether to forward the inbound communication to the second application based on a second policy, receiving, by the shim application, an inter-enclave communication from the first application destined for the second application, and determining, by the shim application, whether to forward the inter-enclave communication to the second application based on the second policy.
    Type: Grant
    Filed: January 5, 2022
    Date of Patent: July 30, 2024
    Assignee: T-Mobile Innovations LLC
    Inventors: Andrei Nicolae Cogan, Paul Farag, Michael Zwarts
  • Patent number: 12041184
    Abstract: A process of issuing a limited-use electronic certificate. In operation, a public key infrastructure (PKI) device receives a request for an electronic certificate from an end entity. The PKI device detects an anomaly with respect to the request received from the end entity. The PKI device generates, based on the detected anomaly, a limited-use electronic certificate. The PKI then issues the limited-use electronic certificate to the end entity. When the end entity determines that the issued certificate is a limited-use certificate with limited-use attributes such as a shortened validity period or lowered assurance level, the end entity provides a visual and/or audio prompt indicating the issuance of the limited-use certificate and further including one or more corrective actions to be performed to eliminate the anomaly prior to sending a new request for an electronic certificate to the PKI device.
    Type: Grant
    Filed: March 14, 2022
    Date of Patent: July 16, 2024
    Assignee: MOTOROLA SOLUTIONS, INC.
    Inventors: Pawel Wrobel, Andrzej Grzesik, Pawel Fafara
  • Patent number: 12032588
    Abstract: A method includes creating, by a first provider, a first listing referencing first shared data and comprising first access controls, wherein access to the first shared data by a second provider is filtered based on the first access controls, creating, by the second provider, a second listing referencing second shared data and the first shared data filtered based on the first access controls, and adding the second listing to a catalog in a data exchange, the catalog comprising metadata describing the second shared data.
    Type: Grant
    Filed: January 27, 2023
    Date of Patent: July 9, 2024
    Assignee: Snowflake Inc.
    Inventors: Pui Kei Johnston Chu, Benoit Dageville, Matthew J. Glickman, Christian Kleinerman, Prasanna Krishnan, Justin Langseth
  • Patent number: 12033123
    Abstract: In general terms this invention provides embodiment of systems that permit better usage of consumer generated data that permit the consumer methods to monetize the information and maintain control over the data at the time of its creation and at later times. Certain embodiments comprise a user whose interaction can cause a provider to create data regarding the interaction. The user can authenticate the data using encryption aspects and permit the user to self-publish data. The self-publishing can occur in a manner that only requires direct trust of the technology provider regarding the data validity. The invention may incorporate an Ethereum network. Embodiments of the system may verify, exchange, encrypt and decrypt data allowing purchasers to purchase the data or certain portions of it.
    Type: Grant
    Filed: May 28, 2019
    Date of Patent: July 9, 2024
    Assignee: Finco Services, Inc.
    Inventors: Trevor Marshall, Stuart Sopp, Aviv Gadot, Josh Stephens
  • Patent number: 12013949
    Abstract: In general, embodiments relate to a method for performing a local vulnerability check of an application upgrade to be downloaded, comprising: receiving an application upgrade download request from a client device; sending, by a client device upgrade manager, information related to the application upgrade download request to a local vulnerability validator; determining by the local vulnerability validator, based on impact score information, that a specific version of the application upgrade to be downloaded has vulnerabilities; sending the impact score information to the client device upgrade manager; and notifying, based on the impact score information, the client device that the application upgrade to be downloaded has vulnerabilities.
    Type: Grant
    Filed: January 24, 2022
    Date of Patent: June 18, 2024
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Shelesh Chopra, Lakshmi Saroja Nalam
  • Patent number: 11991295
    Abstract: A method, apparatus and computer program product generate and utilize a digital signature to identify an object of interest. The method includes providing a reference image depicting the object to a signature encoding module having a hypernetwork. An indication of the object within the reference image is also provided. The method includes generating, with the signature encoding module, the digital signature representing the object. The digital signature includes parameter(s) configured to define processing to be performed by another neural network. The method includes providing the digital signature and at least one query image to a query processing module having a neural network. The method includes identifying, by the query processing module, the object within the at least one query image based upon the digital signature by processing the at least one query image with the neural network of the query processing module in a manner defined by the parameter(s).
    Type: Grant
    Filed: December 7, 2021
    Date of Patent: May 21, 2024
    Assignee: HERE GLOBAL B.V.
    Inventor: Ofer Melnik
  • Patent number: 11979429
    Abstract: An applet may be downloaded or provided to a web browser when a user visits a site in order to protect data input by the user from being captured by malicious software, such as key loggers. The applet may present a user input field in the web browser and may generate a random sequence of low-level key stroke or mouse click events within the input field when the user enters information, such as a username and/or password. A listening key logger will receive a large amount of random data, whereas the applet will receive and buffer the actual user data that may be communicated to a remote site access by the user.
    Type: Grant
    Filed: April 3, 2023
    Date of Patent: May 7, 2024
    Assignee: United Services Automobile Association (USAA)
    Inventors: Teddy Joseph Edmond Voutour, Michael Frank Morris
  • Patent number: 11977616
    Abstract: Some embodiments include a method of providing security and privacy for a message sender. The method can include a messaging application determining that a messaging interface of the computing device is active and is revealing or about to reveal the electronic message. The messaging application can identify a recipient account of a messaging server system that is associated with the electronic message according to the electronic message or the messaging server system. The messaging application can then monitor a data feed from a sensor of the computing device to detect a biometric pattern that matches against a biometric profile model associated with the recipient account utilizing a biometric recognition process. In response to determining that the detected biometric pattern does not match the biometric profile model associated with the recipient account, the messaging application can activate a privacy shield to prevent content of the electronic message from being revealed.
    Type: Grant
    Filed: April 20, 2022
    Date of Patent: May 7, 2024
    Assignee: FaceToFace Biometrics, Inc.
    Inventors: Eric Leuthardt, Scott Stern
  • Patent number: 11972269
    Abstract: Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) to provide device enhancements for software defined silicon implementations are disclosed. Example non-transitory computer readable medium includes instructions to cause one or more processors to at least generate a first stock keeping unit, associate the first stock keeping unit with a semiconductor device, the first stock keeping unit associated with a first set of features to be provided by the semiconductor device, command the semiconductor device to activate a feature not included in the first set of features to cause the semiconductor device to provide a second set of features, generate a second stock keeping unit for the semiconductor device, and associate the second stock keeping unit with the semiconductor device and the second set of features to be provided by the semiconductor device.
    Type: Grant
    Filed: December 30, 2022
    Date of Patent: April 30, 2024
    Assignee: INTEL CORPORATION
    Inventors: Katalin Klara Bartfai-Walcott, Arkadiusz Berent, Vasuki Chilukuri, Mark Baldwin, Vasudevan Srinivasan, Bartosz Gotowalski
  • Patent number: 11972023
    Abstract: Creating compatible anonymized data sets by performing with machine learning equipment that operates a machine learning model by defining data types of variables of a data set; identifying quasi-identifiers for the data set; defining reidentification sensitivity of all or any targeted subset of the individual variables and quasi-identifiers; defining missing data handling rules for the individual variables; defining allowed data transformations including generalization and use of synthesized data; optimizing quasi-identifier selection, use of synthesized data and a choice of data transformations to minimize information loss and maximize privacy metrics based on the data set; the allowed data transformations; and the missing data handling rules; training the machine learning model using the data set according to the defined data types; the optimized quasi-identifier selection; the optimized use of synthesized data; and the choice of data transformations; and anonymizing the data set using the training of the m
    Type: Grant
    Filed: May 20, 2020
    Date of Patent: April 30, 2024
    Assignee: University of Helsinki
    Inventors: Timo A. Miettinen, Janna Saarela, Teemu J. Perheentupa, Robert Mills, Mehreen Ali, Tuomo Pentikäinen
  • Patent number: 11968282
    Abstract: One embodiment is directed to an adapter entity comprising a Technical Report 069 (TR-069) protocol automatic configuration server (ACS) module configured to communicate with managed equipment included in a radio access network (RAN) using the TR-069 protocol. The adapter entity further comprises a Network Configuration Protocol (NETCONF) server configured to communicate with an Open Network Automation Platform (ONAP) Software Defined Network Radio instance (SDN-R) of an ONAP management and orchestration (MANO) environment using NETCONF. The adapter entity further comprises a TR-069-to-NETCONF mapper module, communicatively coupled to the TR-069 protocol ACS module and the NETCONF server, configured to dynamically map NETCONF requests and responses to and from TR-069 Protocol requests and responses. The adapter entity is configured to dynamically map NETCONF requests and responses to and from TR-069 Protocol requests and responses. Other embodiments and examples are disclosed.
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: April 23, 2024
    Assignee: CommScope Technologies LLC
    Inventors: Devaraj Sambandan, Shanthakumar Ramakrishnan, Ravi Setti, Sharath Chandra Chikka Kempegowda
  • Patent number: 11960612
    Abstract: A system receives a request from a user to execute a command on an air-gapped computer system. If a role-based access control system permits the user to execute the command, the system prompts a number of approvers to determine whether to approve of the user executing the command. If a required number of approvers have approved of the user executing the command, the system encodes the command and incorporates the encoded command in an encoded message. The system uses a simplex communication output device to communicate the encoded message to a simplex communication input device for the air-gapped computer system. The system enables execution of the command by requesting the air-gapped computer system to execute the command, or by providing the user with an access token, received from the air-gapped computer system, which enables the user to physically access the air-gapped computer system and execute the command.
    Type: Grant
    Filed: February 9, 2022
    Date of Patent: April 16, 2024
    Assignee: Dell Products L.P.
    Inventors: Amihai Savir, Stav Sapir, Naor Radami, Jehuda Shemer
  • Patent number: 11954205
    Abstract: A method for securing an electronic control unit (ECU). The method may include generating a granular security control adjustment authorization ticket (G-SCAAT) for securing the ECU according to a plurality of security parameters determined based on to a role selected for a corresponding user. The G-SCAAT may include security values to be used in controlling the ECU to operate according to the security parameters.
    Type: Grant
    Filed: June 24, 2022
    Date of Patent: April 9, 2024
    Assignee: GM Global Technology Operations LLC
    Inventors: Brian Farrell, Joseph E. Ploucha
  • Patent number: 11934562
    Abstract: Provided is a data processing device including: a noise removal unit that removes noise from data to which noise has been added, the data having been received from a terminal device; a measurement unit that measures the data for each data type constituting a data set and indicating a classification of the data; and a data set updating unit that updates the data set on the basis of a measurement result of the measurement unit.
    Type: Grant
    Filed: December 26, 2019
    Date of Patent: March 19, 2024
    Assignee: SONY GROUP CORPORATION
    Inventor: Tetsuo Umeda
  • Patent number: 11917726
    Abstract: A system, method and apparatus for enabling environment tracking at a monitored location. A wireless sensor network can support a beacon that can be configured to broadcast information to devices at the monitored location. The broadcasted information can be recorded by devices to generate an environment log that can enable identification of conditions of an environment as reflected by sensor measurements at the monitored location.
    Type: Grant
    Filed: February 22, 2021
    Date of Patent: February 27, 2024
    Assignee: Senseware, Inc.
    Inventor: Julien G. Stamatakis
  • Patent number: 11917059
    Abstract: A system, method and apparatus to control memory devices over computer networks. For example, a server system establishes a secure authenticated connection with a client computer system to receive a request having a batch identification that is configured in the server system to identify a batch of multiple memory devices. After determining that the client computer system is eligible to control the multiple memory devices in the batch, the server system transmits to the client computer system a response. The response contains control data for each respective memory device in the batch. The control data is based on at least a cryptographic key stored in the server system in association with the respective memory device. Using the control data the client computer system submits a command with a digital signature to the respective memory device, which validates the digital signature prior to execution of the command.
    Type: Grant
    Filed: September 13, 2022
    Date of Patent: February 27, 2024
    Assignee: Lodestar Licensing Group LLC
    Inventors: Travis Duane Nelson, Lance W. Dover
  • Patent number: 11915236
    Abstract: Embodiments disclosed are directed to an immutable database with a bitemporal ledger for storing transactions in timelines for maintaining a record of all events and resources within the system. The bitemporal ledger may store a sequence of transactions which include a plurality of transactions previously received by the data processing system in a temporal sequence up to a current time. A new transaction is received and may be appended to the sequence of transactions based on temporal metadata associated with the transaction are received, The temporal metadata may include a valid-from time and a created-at time.
    Type: Grant
    Filed: November 1, 2021
    Date of Patent: February 27, 2024
    Assignee: Capital One Services, LLC
    Inventors: Philip Austin Kedy, Kenneth J. Schneider, Aaron Zhang
  • Patent number: 11914682
    Abstract: When a hash expected value, which is an expected value of a hash value of activation software, is stored in a storing unit (111), a security calculation unit (110) compares the hash value of the activation software with the hash expected value. A main calculation unit (109) activates the activation software when the hash value and the hash expected value match, and stops a process when both do not match. The main calculation unit (109) performs signature verification for the activation software when the hash expected value is not stored in the storing unit (111), and stores in the storing unit (111) as the hash value expected value, the hash value of the activation software as well as activates the activation software when the signature verification is successful. The main calculation unit (109) stops a process when the signature verification is not successful.
    Type: Grant
    Filed: March 3, 2021
    Date of Patent: February 27, 2024
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Teruyoshi Yamaguchi, Nobuhiro Kobayashi
  • Patent number: 11899827
    Abstract: A system for secure testing and provisioning of an integrated circuit (IC) includes, in part, a secure reconfigurable key provisioning architecture (SLEEVE) module disposed in the IC, and a secure asset provisioning hardware entity (SAPHE) module. The IC may include, in part, a modified IEEE 1500 wrapper to control its operation modes. The SLEEVE module may include, in part, an encoding/decoding module and an unlocking module. The encoding/decoding module may include, in part, a decode key stream cipher module, an encode key stream cipher module, Seed Key programmable linear-feedback shift registers (LFSRs), Initialization Vector (IV) LFSRs, and configuration registers. The encoding/decoding module may be configured to generate key bits for decoding and encoding inputs and outputs of the IC. The unlocking module may include, in part, a pattern matching block and a counter. The unlocking module may be configured to enable write access to the configuration registers.
    Type: Grant
    Filed: May 6, 2022
    Date of Patent: February 13, 2024
    Assignee: UNIVERSITY OF FLORIDA RESEARCH FOUNDATION, INCOPORATED
    Inventors: Swarup Bhunia, Atul Prasad Deb Nath, Kshitij Raj, Sandip Ray, Patanjali Sristi Lakshmiprasanna Sriramakumara
  • Patent number: 11900927
    Abstract: An example method includes obtaining, by a computing system, first audio data representing one or more initial utterances during an interactive voice session with an interactive voice system; generating, by the computing system, based on the first audio data, a prediction regarding whether a subsequent utterance of a user in the interactive voice session will contain sensitive information, wherein the subsequent utterance follows the one or more initial utterances in time; obtaining, by the computing system, second audio data representing the subsequent utterance; determining, by the computing system, based on the prediction and based on a risk profile of the interactive voice system, whether to transmit the second audio data to the interactive voice system; and based on the determination to transmit the second audio data to the interactive voice system, transmitting the second audio data to the interactive voice system.
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: February 13, 2024
    Assignee: OPTUM TECHNOLOGY, INC.
    Inventors: Devikiran Ramadas, Gregory J Boss, Ninad Sathaye, Raghav Bali, Nitin Dwivedi