Network Patents (Class 726/3)
-
Patent number: 11470051Abstract: Techniques are described that enable a user to create and use a secret user account on a social networking system that is undiscoverable by other user accounts unless invited to interact by the secret account. In some cases, a social networking system receives a request to create a secret account, and creates the secret account. The social networking system may provide, in association with the secret account, account settings for the secret account that cause the social networking system to exclude the secret account from search results on the social networking system, and obscure activity by the secret account from a first user account. The social networking system may cause presentation of a control in a user interface associated with the secret account to invite a second user account to interact with the secret account.Type: GrantFiled: June 18, 2020Date of Patent: October 11, 2022Assignee: Meta Platforms, Inc.Inventors: Laycee Berkas, Elizabeth Inglese, Tyler Bradin Gross
-
Patent number: 11468576Abstract: A method for tracing individuals through physical spaces that includes registering cameras in groupings relating a physical space. The method further includes performing local video monitoring including a video sensor input that outputs frames from inputs from recording with the cameras in the groupings, a face detection application for extracting faces from the output frames, and a face matching application for matching faces extracted from the output frames to a watchlist, and a local movement monitor that assigns tracks to the matched faces. The method further includes performing a global monitor including a biometrics monitor for preparing the watchlist of faces, the watchlist of faces being updated when a new face is detected by the cameras in the groupings, and a global movement monitor that combines the outputs from the assigned tracks to the matched faces to launch a report regarding individual population traveling to the physical spaces.Type: GrantFiled: February 18, 2021Date of Patent: October 11, 2022Inventors: Kunal Rao, Utsav Drolia, Murugan Sankaradas, Srimat Chakradhar
-
Patent number: 11463445Abstract: A content server can extend enterprise content management to a leading system in an efficient, automated, and seamless manner by leveraging the permission information provided by the leading system. The content server can sync the permission information with the leading system, evaluate user-manager relations, role-based rule definitions, and user-group associations defined in the leading system, and determine and/or update role memberships for workspaces created in the content server for users in the leading systems. In this way, even though the content server and the leading system have very different types of roles and permission models, the content server can evaluate complex relationships and role-based rules and intelligently, correctly, and quickly assign the right people to the right roles in the right workspaces in the content server.Type: GrantFiled: September 14, 2020Date of Patent: October 4, 2022Assignee: OPEN TEXT SA ULCInventors: Thomas Demmler, Szabolcs Gyula Mile
-
Patent number: 11455653Abstract: Server access channel correlation information for multiple web access sessions is captured. The server access channel correlation information includes, for each web access session, a session-originating server access channel identifier of a server access channel that originated the web access session, and at least one cross-session correlation identifier usable to correlate sets of web access sessions and usable to correlate the sets of web access sessions with orders. In association with an order placed by a consumer during one of the web access sessions, integrated server access channel correlation information is captured that documents each server access channel that originated each web access session associated with the order.Type: GrantFiled: April 16, 2019Date of Patent: September 27, 2022Assignee: International Business Machines CorporationInventor: Paul M. Nangle, III
-
Patent number: 11449633Abstract: A mobile application privacy analysis system is described, where the system scans a mobile device to identify files associated with a particular SDK and generates a tokenized name for the SDK. The tokenized name includes tokens representing the SDK vendor and one or more functions of the SDK. Using the tokenized name, the system then determines corresponding categories for each functionality token and score for each such category. Based on the scores, the system determines the most significant category and assigns that category to the SDK for use in privacy analysis. The system may also, or instead, determine a vendor category using the vendor token and assign that category to the SDK. Weighting factors may be applied to the scores for the categories associated with the functionality tokens and vendor tokens.Type: GrantFiled: January 10, 2022Date of Patent: September 20, 2022Assignee: OneTrust, LLCInventors: Kevin Jones, Pratik Doshi, Jonathan Blake Brannon, Prabhu Kumar
-
Patent number: 11452023Abstract: A user device may be provisioned with a list of paths for connecting to a network. A method may include determining that the user device has attached to a visited network and sending the visited network an indication of connectivity capabilities associated with the network. The method may include receiving an indication of one or more paths established from the visited network to the network based on capabilities of the visited network. The one or more paths may be included in the list of paths. The method may include transmitting data to or from the user device via a first path of the one or more paths.Type: GrantFiled: November 10, 2020Date of Patent: September 20, 2022Assignee: Verizon Patent and Licensing Inc.Inventors: Ye Huang, Miguel A. Carames, Jignesh Patel, Sudhir Patel, Michael R. Waters, Gregory D. Roberts
-
Patent number: 11443307Abstract: This specification provides method for auditing authenticity of cross-border resource transfers, device, and electronic equipment. The method is implemented on a client device, and comprises: obtaining cross-border resource transfer information initiated by an initiator of a cross-border resource transfer; obtaining, in response to the cross-border resource transfer information, identification information corresponding to proof information that is stored in a blockchain and corresponds to the cross-border resource transfer information; generating a cross-border resource transfer request based on the cross-border resource transfer information and the identification information; and sending, to an auditor of cross-border resource transfers, the cross-border resource transfer request, causing the auditor to perform, based on the proof information that is stored in the blockchain and corresponds to the identification information, an authenticity verification on the cross-border resource transfer information.Type: GrantFiled: June 25, 2021Date of Patent: September 13, 2022Assignee: ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD.Inventors: Lingao Sun, Ying Peng
-
Patent number: 11436307Abstract: A method and system to utilize a user's activities pattern on a user equipment (UE) device as an additional authentication parameter are disclosed. The method includes monitoring, at the UE device, activities of the UE device, and generating, at the UE device, at least one pattern based on analysis of the monitored activities of the UE device. The method further includes receiving, at the UE device, a request to access a protected application. The method includes comparing, at the UE device, an activity of the UE device with an activity determined from the at least one pattern and a corresponding time data associated with the request to access the protected application. The method further includes determining, at the UE device, a level of authentication necessary to grant access to the protected application based on the comparing.Type: GrantFiled: May 4, 2020Date of Patent: September 6, 2022Assignee: Capital One Services, LLCInventors: Vincent Pham, Jeremy Goodsitt, Anh Truong, Austin Walters, Galen Rafferty, Reza Farivar
-
Patent number: 11438454Abstract: A verification and authorization method, system, and computer program product include verifying, via a receiving device that receives a verification sound packet, an identity of a trusted caller via the verification sound packet, the verification sound packet including an asymmetrically encrypted payload sent by the trusted caller.Type: GrantFiled: March 31, 2020Date of Patent: September 6, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel Gruhl, Alfredo Alba, Linda Ha Kato, Chad Eric DeLuca, Anna Lisa Gentile, Petar Ristoski, Steven R. Welch
-
Patent number: 11431492Abstract: Security of network traffic may be increased by utilizing a mutable password to encrypt and decrypt content stored inside an executable utilizing a mutable password (e.g., where a password changes based on an equation when the executable is run). For example, the present password may be associated with a variable, the variable may be modified when the executable is run using the present password, and a subsequent password may be generated based on the modified variable.Type: GrantFiled: June 25, 2020Date of Patent: August 30, 2022Assignee: AT&T Intellectual Property I, L.P.Inventor: Joseph Soryal
-
Patent number: 11423406Abstract: A triaged approach is implemented to detect and prevent electronic attacks against online entities and to reduce latency. Transaction requests are classified into different tiers and are treated differently based on the tier status. For example, transaction requests to conduct transactions with an entity are received from a client system. Characteristics such as rate or amounts of transactions of the transaction requests are analyzed. The characteristics are compared against specified threshold limits to assess whether the specified threshold limits are exceeded. Based on an assessment that at least one of the specified threshold limits is exceeded, a set of computer instructions is selected from different sets of computer instructions for execution on the client system. A result of an execution is received from the client system. Based on the result of the execution, a determination is made whether the transaction requests appear to have originated from a machine-automated submission process.Type: GrantFiled: December 16, 2019Date of Patent: August 23, 2022Assignee: PAYPAL, INC.Inventors: Bradley Wardman, Sundar Amalan Vincent
-
Patent number: 11425137Abstract: Methods, apparatus, systems and articles of manufacture to implement centralized authentication for granting access to services are disclosed. Example apparatus disclosed herein to perform device authentication at a first service are to access a profile based on an identification code included in an authentication request from a second service, the profile corresponding to a device associated with the identification code, the identification code assigned to the device by the first service. Disclosed example apparatus are also to assign a selected one of a plurality of trust levels to the device based on activity information associated with the device, location information specified for the device in the profile, and mobility information specified for the device in the profile. Disclosed example apparatus are further to transmit authentication information for the device to the second service responsive to the authentication request, the authentication information including the selected one of the trust levels.Type: GrantFiled: May 29, 2020Date of Patent: August 23, 2022Assignee: AT&T Intellectual Property I, L.P.Inventor: Dale W. Malik
-
Patent number: 11425124Abstract: A method for authorization of internet of things (“IoT”) identity bootstrapping includes receiving from a device, at a network access server (“NAS”) of a user and in response to an attestation request sent to the device, a vendor network address of a vendor server of a vendor and a device identifier for the device. The method includes authenticating the vendor using the vendor network address and, in response to authenticating the vendor, sending the device identifier to the vendor server. The method includes communicating device attestation packets between the vendor server and the device. The device attestation packets validate the device to the vendor server. The method includes receiving device attestation from the vendor server. The device attestation indicating validity status of the device to the NAS. The method includes, in response to the device attestation indicating validity of the device, transmitting a new device identity to the device.Type: GrantFiled: June 29, 2020Date of Patent: August 23, 2022Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD.Inventors: Bogdan Chifor, George-Andrei Stanescu, Radu Iorga, Corneliu-Ilie Calciu
-
Patent number: 11418447Abstract: Implementations are described herein for leveraging an “out-of-band” communication channel between nodes of a process automation system. In various implementations, an out-of-band communication channel may be established between two or more process automation nodes of a process automation system. The out-of-band communication channel may be outside of a process automation network through which the two or more process automation nodes are communicatively coupled with other process automation nodes of the process automation system. The two or more process automation nodes may cooperate with one or more of the other process automation nodes to implement an at least partially automated process. One or more characteristics of the process automation system may be monitored, and based on the monitoring, traffic may be selectively diverted from the process automation network to the out-of-band communication channel.Type: GrantFiled: April 29, 2021Date of Patent: August 16, 2022Assignee: YOKOGAWA ELECTRIC CORPORATIONInventors: David Emerson, Joseph Malm, Andrew Keller, Patrick Clay, Hidenori Sawahara, Vien Nguyen
-
Patent number: 11418570Abstract: A client device is tracked over a period of time using “refresh tokens” that are exchanged in conjunction with routine client-server communications. Each communication cycle between client and server includes a refresh token that is recorded at the server. The recorded refresh tokens are mapped to both server- and client-generated device identifiers. As communications between client and server occur, a chain of tokens, one for each communication cycle, is progressively recorded at the server. If the server receives a token that is outdated with respect to that which is otherwise expected based on the progression of the recorded chain, this suggests that the received communication was transmitted from a device that is a clone of another client device. A more robust device identification framework is therefore achieved by using a combination of device identifiers and tokens exchanged between client and server.Type: GrantFiled: May 4, 2020Date of Patent: August 16, 2022Assignee: Adobe Inc.Inventors: Sanjeev Kumar Biswas, Mayank Goyal, Sharad Srivastava
-
Patent number: 11418959Abstract: A method for the automatic pairing of a device wirelessly with a first secure WLAN provided by a pairing access point using first set of security credentials, involving: establishing automatically a connection between the device and a second WLAN provided by an available access point, and authenticating the device with the second WLAN using a second set of security credentials stored on the device; identifying the pairing access point using the second set of security credentials; creating a tunnel between the device and the pairing access point over the second WLAN; making a request from the device, via the tunnel, to a provisioning server on the pairing access point for transfer of the second set of security credentials, being the security credentials needed to pair with the first secure WLAN, from the pairing access point to the device; and using the second set of security credentials to configure the security settings for the first secure WLAN in the device.Type: GrantFiled: December 20, 2017Date of Patent: August 16, 2022Assignee: British Telecommunications Public Limited CompanyInventors: Simon Ringland, Francis Scahill
-
Patent number: 11416954Abstract: Systems and methods described herein may include a memory and a computing a system in communication with said memory. The computing system may be configured to receive data from network management systems. In one embodiment, the network management system includes a network gateway. Users at venues may access external network resources using the network management system. Further, the network management systems may extract device identifiers from network packets sent from user devices to request access to external network resources. In some embodiments, the network management system may provide transmission control protocol handshake completion data to user devices. In some embodiments, the computing system also receives one or more attributes associated with the venue, user data associated with the user device, and connection data associated with communication between the user device and said external network resource.Type: GrantFiled: November 16, 2018Date of Patent: August 16, 2022Assignee: Nomadix, Inc.Inventors: Christopher Farrar, Charles Reed, Nicolas Mercier, Kenneth Reed
-
Patent number: 11411742Abstract: Embodiments disclosed herein describe computing calculations based on two overlapping private sets between various parties. To conduct the calculation, an intersection of the overlapping private sets data lists is conducted without revealing the underlying data. A homomorphic encryption is conducted on the intersecting data elements to allow them to be compared.Type: GrantFiled: September 8, 2020Date of Patent: August 9, 2022Assignee: QED-IT SYSTEMS LTD.Inventors: Aurélien Renaud François Nicolas, Pablo Kogan, Daniel Messod Benarroch Guenun, Arbel Deutsch Peled, Ori Wallenstein
-
Patent number: 11410543Abstract: In some aspects, the disclosure is directed to methods and systems for easy and intuitive control over network configurations and security for transient or guest devices, and remote control of additional devices, either directly in some implementations, or indirectly via a hosted interface by a control device in other implementations, eliminating the need for pairing or otherwise establishing communications between the guest devices and the additional devices. This may improve network security overall and particularly encourage segregation of untrusted devices, while still providing enhanced functionality and control over other network devices in a secure manner.Type: GrantFiled: February 7, 2022Date of Patent: August 9, 2022Assignee: Arkade, Inc.Inventors: Joshua Allan Fuchs, Bob Steven Berns, Joel Abraham Kort
-
Patent number: 11405450Abstract: Techniques for implementing cloud services of a cloud service provider in a dedicated user account environment in a distributed computing system are disclosed. In some example embodiments, a computer-implemented method comprises: receiving, by a management system of a cloud service provider, a user request for creation of an instance of an application platform of the cloud service provider in a user environment within a distributed computing system, the user environment being dedicated to a user account hosted by the distributed computing system, the user request comprising credential data configured to provide the management system with limited permission for accessing the user environment, the limited permission restricting the management system from full administrative privileges in accessing the user environment; and deploying, by the management system, the instance of the application platform to a workload cluster in the user environment using the credential data to access the user environment.Type: GrantFiled: May 11, 2020Date of Patent: August 2, 2022Assignee: SAP SEInventors: Jannick Stephan Fahlbusch, Joerg Lenhard
-
Patent number: 11397794Abstract: Computer systems and methods are disclosed to implement a role manager that automatically analyzes code accessing various resources to generate a role with the necessary resource permissions to execute the code. In embodiments, the role manager may be implemented as part of a workflow orchestration or resource provisioning system that employs code requiring access to different types of resources. In embodiments, the role manager may analyze a code segment to identify the different resources accessed by the code segment and the permissions needed for each access, and generate a role that has the needed permissions. In embodiments, the role manager may automatically manage these roles based on changes to associated code segments. Advantageously, the disclosed role manager removes the need to manually create roles need by code segments ahead of time, and creates roles with minimal privileges required for the code, thereby simplifying achievement of system security.Type: GrantFiled: March 25, 2019Date of Patent: July 26, 2022Assignee: Amazon Technologies, Inc.Inventors: Ali Baghani, Patrick MacLaine Compton, Andrew Katz, Gabriel Mastey, Adam Alexander Emerson Wong
-
Patent number: 11392172Abstract: A wearable electronic device includes: a body and a connector. The body includes a display component. A display area of the display component is on the surface of the body and is configured to output display contents. The connector has a first accommodating space. When the body is fixed with the connector, the body is in the accommodating space. The connector can form a wearing ring. When the first accommodating space is empty, the body is separated from the connector. A first communication component is disposed in the body, and is configured for the communication between the body and external devices. A second communication component independent of the first communication component is disposed in in the connector, and is configured for the communication between the connector and external devices.Type: GrantFiled: September 15, 2020Date of Patent: July 19, 2022Assignee: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.Inventors: Yingchun Xie, Zheng Xing
-
Patent number: 11385881Abstract: A method for forming a virtualization system image. A specification of an expressed end state of a virtualization system image is analyzed. The specification is decomposed into lower level specifications and the lower level specifications are decomposed into idempotent operations. The virtualization system image corresponding to the expressed end state is assembled by processing the idempotent operations. The expressed end state, decomposed lower level intents, and decomposed idempotent operations are codified into a decomposition hierarchy. The decomposition hierarchy is query-able such that, for a given intent, an idempotent operation is returned. An idempotent operation code library is query-able such that, for a given idempotent operation, a corresponding set of executable code is returned. An image builder executes the executable code. When all of the idempotent operations have been successfully executed, the virtualization system image is complete.Type: GrantFiled: October 31, 2020Date of Patent: July 12, 2022Inventors: Joshua John Berry, Mohan Maturi, Shlomo Shlomi Vaknin
-
Patent number: 11385921Abstract: A system can allow collaboration between two or more tenants in a multi-tenant system. Each tenant can share a common access to a processing space and a data storage device. Each tenant can be assigned to a virtual environment having a dedicated portion of the data storage device. The system can create a database record in a first dedicated portion assigned to the first tenant. The database record can be displayed on a user interface of the first tenant and include a collaboration tool component embedded within the database record. The database record can be transmitted to a database and transmitted from the database to a second dedicated portion of the data storage device. The second dedicated portion can be assigned to a second tenant of the multi-tenant system.Type: GrantFiled: July 31, 2019Date of Patent: July 12, 2022Assignee: Salesforce, Inc.Inventor: Fahad Azeem
-
Patent number: 11381661Abstract: A method for creating a dynamic element in content performed by a dynamic element management system is disclosed. The method includes receiving a content request for the dynamic element from a client device, the content request comprising a uniform resource locator (URL) of an external data source from which to retrieve content for the dynamic element; identifying the data source based on the URL; forwarding the content request to the identified data source; receiving metadata corresponding to the content hosted by the data source; and forwarding the metadata to the client device for display in a dynamic element placeholder on the client device.Type: GrantFiled: August 4, 2021Date of Patent: July 5, 2022Assignees: ATLASSIAN PTY LTD., ATLASSIAN INC.Inventors: Phil Oye, Artur Pawel Bodera, Sherif Mansour
-
Patent number: 11375374Abstract: Systems and method are provided for a temporary network slice usage barring service within a core network. A network device in the core network receives a slice barring information message for an application function (AF). The slice barring information message includes a unique subscriber identifier associated with a user equipment (UE) device to be barred from a network slice and indicates a barring expiration time. The network device stores barring parameters based on the slice barring information message. The barring parameters include a slice identifier associated with the AF, the unique subscriber identifier, and the barring expiration time. The network device sends a barring instruction message to another network device associated with the network slice. The barring instruction message includes the unique subscriber identifier and the barring expiration time. The other network device enforces temporary barring of the UE device from the network slice based on the barring instruction message.Type: GrantFiled: March 24, 2021Date of Patent: June 28, 2022Assignee: Verizon Patent and Licensing Inc.Inventors: Suzann Hua, Ye Huang, Chien-Yuan Huang, Parry Cornell Booker
-
Patent number: 11374976Abstract: Embodiments of the present invention provide systems and methods for authentication of users and authorization of user actions, and distribution or transfer of resources based on multi-channel input via a user device or one or more auxiliary user devices, such as smart home devices. The system is further configured to perform one or more user activities, in an integrated manner, within a single interface of the user device, without requiring the user to operate disparate applications. Furthermore, the system is configured to receive user input through multiple communication channels such as a textual communication channel and an audio communication channel and store unique user patterns to form an authentication baseline for subsequent user communications.Type: GrantFiled: October 15, 2019Date of Patent: June 28, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: Christina Lillie, Justin Riley DuPont, Malathi Jivan, Heather Dolan, Poppy Marie Kimball
-
Patent number: 11368457Abstract: Techniques for intelligently deciding the optimal authenticator(s) from amongst those supported by an electronic device are described. The authentication system according to some embodiments may include a dynamic machine learner that incorporates the attributes of: (i) user behavior attributes (e.g., preferred authenticator); (ii) device attributes (e.g., hardware and software specifications, applications, etc.); and (iii) operating environment attributes (e.g., ambient light, noise, etc.), as well as the interplay between the aforementioned attributes over time to make the decision. In some embodiments, the authentication activities and patterns of other users of similar type (e.g., users exhibiting similar behavior across different operating environments) can also be learned and employed to improve the decision making process over time.Type: GrantFiled: July 30, 2018Date of Patent: June 21, 2022Assignee: Visa International Service AssociationInventors: Sunpreet Singh Arora, Kim R. Wagner, John F. Sheets, Lacey Best-Rowden
-
Patent number: 11366685Abstract: A processing system including a processor, a first memory, a state machine configured to transition between a plurality of states, and an access filter. The first memory stores instructions that are executable by the processor, where execution of the instructions causes the processor to initiate transactions with one or more hardware resources. The access filter may filter the transactions initiated by the processor by selectively denying access to the hardware resources based at least in part on a current state of the state machine. The access filter may also filter transactions initiated by one or more of the hardware resources based at least in part on the current state of the state machine.Type: GrantFiled: November 15, 2019Date of Patent: June 21, 2022Assignee: SYNAPTICS INCORPORATEDInventors: Pontus Evert Lidman, Jingliang Li
-
Patent number: 11356423Abstract: In one embodiment, a network security device is configured to monitor data traffic between a first device and a second device. The network security device may be configured to intercept a first initial message of a first encrypted handshaking procedure for a first secure communication session between the first device and the second device, the first initial message specifying a hostname that has been encrypted using first key information associated with the network security device, decrypt at least a portion of the first initial message using the first key information to determine the hostname, re-encrypt the hostname using second key information associated with the second device, and send, to the second device, a second initial message of a second encrypted handshaking procedure for a second secure communication session between the network security device and the second device, the second initial message specifying the hostname re-encrypted using the second key information.Type: GrantFiled: January 14, 2020Date of Patent: June 7, 2022Assignee: Cisco Technology, Inc.Inventors: Jianxin Wang, Hari Shankar
-
Patent number: 11349874Abstract: Based on context received regarding a mobile communications device a server determines whether an existing network connection employed by the mobile communications device offers a level of security that is appropriate. When the server determines that the level of security is appropriate, the mobile communications device is allowed to continue using the network connection. Otherwise, the server directs the mobile communications device to terminate the network connection.Type: GrantFiled: January 17, 2019Date of Patent: May 31, 2022Assignee: LOOKOUT, INC.Inventors: Kevin Patrick Mahaffey, Timothy Strazzere, Brian James Buck
-
Patent number: 11349728Abstract: Resource allocation to workloads is disclosed. Telemetry data associated with existing or previously executed workloads is stored and used to develop models. Telemetry data from new workloads are collected and, using the models, a fingerprint is extracted and compared to the fingerprints of previous workloads. This allows the initial allocation of resources to the new workload to be improved and aids in resource allocation convergence.Type: GrantFiled: March 27, 2020Date of Patent: May 31, 2022Assignee: EMC IP HOLDING COMPANY LLCInventors: Eduardo Vera Sousa, Tiago Salviano Calmon, Vinicius Michel Gottin
-
Patent number: 11349853Abstract: Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system. The server may create a frequency score for a user, which predicts the frequency at which the user is to be hit with a malicious attack. The frequency score may be based on at least a job score, which may be represented by a value that is based on the type of job the user has, and a breach score that may be represented by a value that is based on the user's level of exposure to email.Type: GrantFiled: August 25, 2021Date of Patent: May 31, 2022Assignee: KnowBe4, Inc.Inventors: Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
-
Patent number: 11343236Abstract: Systems, methods, and devices for using a Uniform Resource Locator (URL) parameter to pass variables between authentication, authorization, and accounting (AAA) servers and a portal so as to intelligently select and display a different captive portal landing page on a user equipment (UE) device based on any combination of the geographic location of the UE device, the service set identifier (SSID) of the access point, the UE device's media access control (MAC) address.Type: GrantFiled: July 22, 2020Date of Patent: May 24, 2022Assignee: Charter Communications Operating, LLCInventors: Peter Andrew Ericksen, Jon Jasiunas, Donald Sherker
-
Patent number: 11341793Abstract: A communication device mounted at a vehicle, the communication device including: a blocking section that, in a case in which communication with a second mobile device that is different from a first mobile device that transmits key information for the vehicle is interrupted, performs a blocking process to block an unlocking of the vehicle or a starting of the vehicle that is performed based on received key information.Type: GrantFiled: February 13, 2020Date of Patent: May 24, 2022Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHAInventor: Hiroki Okada
-
Patent number: 11343677Abstract: To allow secure communications between a video capturing device and mobile devices, an association process includes providing a unique pattern, such as a QR code, to the mobile device in proximity to the video capturing device. The unique pattern is used by the mobile device to request pairing with the client device, either directly or via a cloud-based system. The QR code includes an identifier or “shared secret” that allows the client device to verify the pairing request originates from the mobile device in close proximity. The association process may also involve cryptographic keys to further secure communications and may also involve a process to retrieve a mobile app without additional user intervention. Once the devices are associated, they can communicate directly using wireless communications, such as cellular or WiFi, and transfer video data and other data automatically.Type: GrantFiled: January 2, 2019Date of Patent: May 24, 2022Assignee: Xirgo Technologies, LLCInventors: Andrew Hodge, Nathan Ackerman
-
Patent number: 11343239Abstract: A method for controlling third-party access of a protected data resource is disclosed. The method includes: receiving an access token associated with a first application, the access token indicating access permissions for the first application to access a user account at a protected data resource; receiving a first request to perform a first access operation of accessing the user account using the access token; determining whether the first access operation is permitted based on the access permissions; in response to determining that the first access operation is not permitted: modifying the first request to obtain a second request for performing a second access operation of accessing the user account using the access token, the second access operation complying with the access permissions for the first application; transmitting the second request to a server associated with the protected data resource.Type: GrantFiled: September 5, 2019Date of Patent: May 24, 2022Assignee: The Toronto-Dominion BankInventors: Milos Dunjic, David Samuel Tax, Gregory Albert Kliewer
-
Patent number: 11343319Abstract: The present invention discloses a method and a system for user authentication in an offline mobile calibration or checklist performing device. At first, the work is assigned online in a Calibration Management Software (CMS), where the relevant data is selected and sent to a mobile device. In the field environment as offline, the mobile device requests user credentials from the user, and if valid, the user is able to perform the assigned task. With each obtained result, credentials are asked for saving the results into the mobile device. When the user returns from the field, he/she connects the mobile device with the CMS, and transfers the obtained work data from the mobile device to the CMS.Type: GrantFiled: November 26, 2018Date of Patent: May 24, 2022Assignee: Beamex Oy AbInventors: Antti Mäkynen, Mathias Ray, Marko Stenbacka, Kennet Riska
-
Patent number: 11343259Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for dynamic stepped multi-level authentication. The invention is structured for progressively authenticating transmitted activity processing data over escalating authentication levels using electronic communications between network devices over separate communication channels. Specifically, the invention is structured to authenticate the first activity for a first authentication level based on determining a spatial congruence of the user device and the resource instrument device associated with the first activity. Moreover, the invention is structured to trigger a second authentication level requirement above the first authentication level based on at least the first authentication level and resource activity processing data.Type: GrantFiled: July 9, 2020Date of Patent: May 24, 2022Assignee: BANK OF AMERICA CORPORATIONInventors: Udaya Kumar Raju Ratnakaram, Puneetha Polasa
-
Patent number: 11341254Abstract: Securing data using random bits uses a TRNG disk with a plurality of random bits and a universally unique identifier (UUID). At least one TRNG disk copy is created, which is identical to the TRNG disk. The TRNG disk copy is stored in a separate physical location than the TRNG disk. Source data is received and encrypted with a block of random bits of the TRNG disk to produce encrypted data. The block of random bits of the TRNG disk has a bit offset which is a positional address of the block of random bits within the TRNG disk. The encrypted source data, the UUID, and the bit offset of the TRNG disk are communicated from a first location to at least a second location. The encrypted source data is decrypted at the second location using the UUID, the offset of the TRNG disk, and the TRNG disk copy.Type: GrantFiled: July 23, 2021Date of Patent: May 24, 2022Assignee: QUANTUM PROPERTIES TECHNOLOGY LLCInventors: Daniel M. Esbensen, Stephen M. Omohundro
-
Patent number: 11336670Abstract: An expert interface component can automatically connect a system user with a system support expert. A user interface module can present a threat-tracking graphical user interface and a query interface component integrated into the threat-tracking graphical user interface to a system user belonging to a client team to review a potential cyber threat and receive a query for assistance. The query interface component can allow the system user to digitally grab a visual data container displaying information and containing a data object. The query interface component can collect the visual data container from the threat-tracking graphical user interface into a collection window of the query interface component. A communication module provides an incident ticket containing the query and the visual data container to a system support expert at a remote platform.Type: GrantFiled: February 19, 2019Date of Patent: May 17, 2022Assignee: Darktrace Holdings LimitedInventors: Michael Beck, Jack Stockdale
-
Patent number: 11323434Abstract: A system and method allows an app to be used to signal a server to authenticate a user using two factor authentication. The app is one previously associated with a user account, optionally using a different form of two factor authentication.Type: GrantFiled: December 31, 2018Date of Patent: May 3, 2022Assignee: Charles Schwab & Co., Inc.Inventors: Riyaz Vali, Charles E. Gotlieb
-
Patent number: 11316750Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.Type: GrantFiled: October 22, 2020Date of Patent: April 26, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Qihong Shao, David John Zacks, Xinjun Zhang
-
Patent number: 11315571Abstract: A method is disclosed. A digital assistant device receives a biometric sample from a user and then converts the biometric sample to a biometric template. The digital assistant device can scan for user devices in communication range of the digital assistant device, thereby receiving user device identifiers. The digital assistant device can transmit, to a server computer, an authentication request comprising the biometric template and at least one user device identifier. The digital assistant device can then receive a cryptogram request message comprising the at least one user device identifier, from the server computer. The digital assistant device can transmit, to a user device corresponding to the at least one user device identifier, the cryptogram request message and can then receive a cryptogram. The digital assistant device can then transmit the cryptogram to the server computer. The server computer verifies the cryptogram before further processing of a transaction.Type: GrantFiled: November 28, 2018Date of Patent: April 26, 2022Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Archana Reddy Manchireddy, Sumit Amar, Patrick Ryan Flanagan, Srinivas Bhagavathula, Miranda Morgan, Meryl Lazer
-
Patent number: 11317285Abstract: Various arrangements for wireless network provisioning using a pre-shared key (PSK) are presented. A plurality of wireless network access profiles that indicate a plurality of PSKs may be stored. An access point may receive, from a wireless device, a first value based at on the PSK. The access point can transmit the first value to a cloud-based provisioning system. A plurality of values based on the plurality of PSKs of the plurality of wireless network access profiles may be created and a match between a second value of the plurality of values and the transmitted first value may be identified. A third value may be provided to the access point based on the PSK of the wireless network access profile of the plurality of wireless network access profiles used to generate the value. Network access can then be granted based on the third value.Type: GrantFiled: September 22, 2020Date of Patent: April 26, 2022Assignee: DISH Network L.L.C.Inventors: Edward W. Neipris, Joshua David Wade, Tyler Nesper
-
Patent number: 11316833Abstract: A third party intermediary and a data protection method, system, and non-transitory computer readable medium, include executing a program, via the processor, using zero-knowledge verifiable computing to remove private content from a pre-approved version of a content to ensure privacy of a condition of a user from a provider of the content.Type: GrantFiled: March 26, 2020Date of Patent: April 26, 2022Inventors: Samuel Scott Adams, Susann Marie Keohane, James R. Kraemer, Jeb R. Linton
-
Patent number: 11310661Abstract: A communications apparatus includes a transceiver and a processor. The processor is configured to perform operations comprising: performing a Non Access Stratum (NAS) security mode command procedure to derive a set of NAS key(s); transmitting a NAS security mode complete message to a network device for informing that the NAS security mode command procedure is complete; receiving an RRCReconfiguration message indicating derivation of a set of Access Stratum (AS) keys from the network device when an acknowledge message associated with the NAS security mode complete message has not been received; and performing a NAS procedure to communicate with the network device by using the set of NAS key(s).Type: GrantFiled: February 14, 2020Date of Patent: April 19, 2022Assignee: MEDIATEK INC.Inventors: Yu-Lun Chang, Shih-Chieh Liao
-
Patent number: 11308002Abstract: Embodiments of systems and methods for detecting expected user intervention across multiple blades during a Keyboard, Video, and Mouse (KVM) session are discussed. In an embodiment, a chassis may include an Enclosure Controller (EC) coupled to a plurality of Information Handling Systems (IHSs) in a chassis, the EC comprising: a processor; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the EC to: select a first IHS to initiate a first KVM session; register for a notification from the first IHS while the first IHS performs one or more operations; switch to a second IHS to initiate a second KVM session; and during the second KVM session, receive the notification.Type: GrantFiled: March 12, 2019Date of Patent: April 19, 2022Assignee: Dell Products, L.P.Inventors: Balamurugan Gnanasambandam, Rajeshkumar Ichchhubhai Patel
-
Patent number: 11297099Abstract: A method, system and computer-usable medium for redisplaying data at a remote access client system from a secure computing environment. The redisplaying data includes receiving a request form the remote access client system for data, inspecting the request for potential unauthorized or malicious retransmission. Modifying the data, by filtering audio data or transforming graphical data prior to sending the requested data is performed to prevent the unauthorized or malicious retransmission.Type: GrantFiled: November 29, 2018Date of Patent: April 5, 2022Assignee: Forcepoint, LLCInventor: Anthony Tong
-
Patent number: 11290442Abstract: A HEMS controller receives, from each of a plurality of devices requesting registration in a HEMS, an electronic certificate of the device in a continuous registration mode in which a plurality of devices can be continuously registered in the HEMS. The HEMS controller 14 determines whether or not to permit registration in the HEMS for each device based on an attribute indicated by the electronic certificate of each of the plurality of devices.Type: GrantFiled: January 13, 2020Date of Patent: March 29, 2022Assignee: Panasonic Intellectual Properly Management Co., Ltd.Inventors: Yoichi Masuda, Tomoki Takazoe