371 patents
Page 2 of 19
Utility
Mechanism to determine cellular signal reputation of a location and intelligently manage lack of connectivity
31 Oct 23
A technique for collecting and using signal reputation data, comprising obtaining a plurality of signal reputation data corresponding to a plurality of locations, categorizing the signal reputation data into groups, calculating signal circles for at least some of the groups based on a representative signal value for the corresponding group, calculating a signal reputation score for each signal circle, determining a best signal circle for a user mobile device within a predetermined distance of dead zones, and sending the best signal circle to the user mobile device based at least in part on the signal reputation score and a location of the user mobile device.
Raja Sinha, Dattatraya Kulkarni, Srikanth Nalluri, Anjan Kumar Nayak, Tirumaleswar Reddy Konda, Susmita Nayak, Purushothaman B, Harsha R. Joshi
Filed: 25 Oct 21
Utility
Methods, systems, apparatus and articles of manufacture to obfuscate metered data using a mask
24 Oct 23
A technique allows a smart meter to receive a mask.
Igor Tatourian, Rita H. Wouhaybi, Hong Li, Tobias M. Kohlenberg
Filed: 30 Jul 21
Utility
Methods and Apparatus to Detect Deepfake Content
19 Oct 23
Methods, apparatus, systems and articles of manufacture are disclosed to detect deepfake content.
Utkarsh Verma, Sherin M. Mathews, Amanda House, Carl Woodward, Celeste Fralick, Jonathan King
Filed: 22 Jun 23
Utility
Methods and apparatus to defend against adversarial machine learning
17 Oct 23
Methods, apparatus, systems and articles of manufacture to defend against adversarial machine learning are disclosed.
Sherin M. Mathews, Celeste R. Fralick
Filed: 30 Jan 23
Utility
Methods, apparatus, and systems for an encryption mode via a virtual private network
10 Oct 23
Methods, apparatus, systems and articles of manufacture for communicating encrypted data via a virtual private network are disclosed.
Tirumaleswar Reddy Konda, Shashank Jain, Himanshu Srivastava
Filed: 2 Dec 20
Utility
Computing platform security methods and apparatus
3 Oct 23
Computing platform security methods and apparatus are disclosed.
Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
Filed: 28 Jan 20
Utility
Methods, systems, and media for detecting new malicious activity from IOT devices
3 Oct 23
Methods, systems, and media for detecting malicious activity from user devices are provided.
Sasa Rasovic
Filed: 2 Nov 20
Utility
Distributed communication between internet of things devices
12 Sep 23
Technologies for a distributed Internet of Things (IoT) system including a plurality of IoT devices are disclosed.
Gabriel G. Infante-Lopez, Robert J. Firby
Filed: 3 Aug 21
Utility
Analysis priority of objects from cross-sectional variance
12 Sep 23
There is disclosed in one example a computing apparatus, including: a processor and a memory; a data store having stored thereon trained models MGLOBAL and MENT, wherein model MGLOBAL includes a clustering model of proximity and prevalence of a first body of computing objects, and MENT includes a clustering model of proximity and prevalence of a second body of computing object; and instructions encoded within the memory to instruct the processor to: receive an object under analysis; apply a machine learning model to compute a global variance score between the object under analysis and MGLOBAL; apply the machine learning model to compute an enterprise variance score between the object under analysis and MENT; compute from the global variance score and the enterprise variance score a cross-sectional variance score; and assign the object under analysis an analysis priority according to the cross-sectional variance score.
Sorcha Bairbre Healy, Gerard Donal Murphy, Steven Grobman
Filed: 30 Sep 19
Utility
Systems, methods, and media for analyzing structured files for malicious content
12 Sep 23
Mechanisms for analyzing a structured file for malicious content are provided, comprising: parsing the structured file into a plurality of portions; selecting a selected portion of the portions; checking the selected portion to determine if at least one pre-condition is met; and in response to determining that the at least one pre-condition is met: decoding the selected portion to form a decoded portion; and checking the decoded portion to determine if it is malicious.
Qiang Liu, Chong Xu, Praveen Kumar Amritaluru, Mayank Bhatnagar
Filed: 4 Feb 21
Utility
Cooperative mitigation of distributed denial of service attacks originating in local networks
12 Sep 23
Example methods, apparatus, systems and articles of manufacture to implement cooperative mitigation of distributed denial of service attacks originating in local networks are disclosed.
Tirumaleswar Reddy Konda, Harsha R. Joshi, Himanshu Srivastava, Srikanth Nalluri, Dattatraya Kulkarni
Filed: 28 Jun 21
Utility
System for authenticating a phone number using a phone number certificate
22 Aug 23
An apparatus, related devices and methods, having a memory element operable to store instructions; and a processor operable to execute the instructions, such that the apparatus is configured to identify, on an electronic device, a phone number of an incoming caller device; request, via an out-of-band control channel, a digital certificate for the phone number from the incoming caller device; receive, via the out-of-band control channel, the digital certificate for the phone number from the incoming caller device; determine whether the digital certificate for the phone number is authentic; and indicate, on the electronic device, based on a determination that the digital certificate for the phone number is authentic or not authentic, whether the phone number is authentic or not authentic.
Harsha Ramamurthy Joshi, Shashank Jain, Piyush Pramod Joshi
Filed: 21 Oct 22
Utility
Methods and apparatus to detect deepfake content
15 Aug 23
Methods, apparatus, systems and articles of manufacture are disclosed to detect deepfake content.
Utkarsh Verma, Sherin M Mathews, Amanda House, Carl Woodward, Celeste Fralick, Jonathan King
Filed: 29 Sep 20
Utility
Methods and apparatus to create malware detection rules
8 Aug 23
Methods, apparatus, systems and articles of manufacture to create malware detection rules are disclosed.
Nicholas T. Smith
Filed: 19 Jun 19
Utility
Visual classification according to binary memory dump
8 Aug 23
There is disclosed in one example a method of detecting computer malware, including: receiving a binary object for analysis; allocating the binary object to a sandbox; within the sandbox, loading the binary object into an executable memory region; performing a memory dump of the executable memory region; and analyzing the memory dump for malware characteristics.
Brajesh Kumar, Sumit Lohani, Sidney Da Santa Rita Gomindes, Muralivardhan R. Pannala
Filed: 25 Sep 20
Utility
Automated and customized post-production release review of a model
8 Aug 23
A non-transitory computer readable medium includes computer executable instructions that, when executed, cause at least one processor to train a model to perform at least one of a prediction operation, a diagnostic operation, or a classification operation based on a training dataset, deploy the model in a production computer system to perform the at least one operation on field data, monitor signal data associated with the model, the signal data including specific or derived signal data representing characteristics of an ecosystem in which the model is deployed and new observations in incoming field data, monitor accuracy of the model by applying a statistical tool to a plurality of data points of the signal data, apply a secondary machine learning predictive engine to the plurality of data points of the signal data to predict future data points of the signal data, determine whether the signal data represents an unstable process by identifying future outlier data points from among the plurality of future data points of the signal data, select a rule corresponding to the future outlier data points, the rule to suggest at least one of a cause of the unstable process or an effect of the unstable process on the signal data, and generate an indication that a corrective action should be taken on the model based on a result of the determination, the indication to identify the rule and at least one of the cause of the unstable process or the effect of the unstable process on the signal data.
Lynda M. Grindstaff, Celeste R. Fralick
Filed: 4 Dec 20
Utility
Methods, systems, and media for dynamically separating internet of things devices in a network
8 Aug 23
Methods, systems, and media for dynamically separating Internet of Things (IoT) devices in a network are provided.
Himanshu Srivastava, Tirumaleswar Reddy Konda, Piyush P. Joshi, Harsha R Joshi, Srikanth Nalluri, Dattatraya Kulkarni, Siddaraya Revashetti
Filed: 8 Aug 22
Utility
Split tunnel-based security
25 Jul 23
There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; a network interface; an operating system including a native internet protocol (IP) stack; and a security agent, including instructions encoded within the memory to instruct the processor to: establish a split virtual private network (VPN) tunnel with a remote VPN service; receive outgoing network traffic; direct a first portion of the outgoing traffic to the VPN tunnel, including determining that the first portion includes an outgoing domain name service (DNS) request; and direct a second portion of the outgoing traffic to the native IP stack.
Harsha Ramamurthy Joshi, Shashank Jain, Himanshu Srivastava, Dattatraya Kulkarni, Srikanth Nalluri
Filed: 26 Jun 20
Utility
Policy enforcement for secure domain name services
25 Jul 23
There is disclosed in one example a gateway apparatus, including: a hardware platform including a processor and a memory; and instructions stored within the memory to instruct the processor to: provide a domain name system (DNS) server, the DNS server to provide an encrypted DNS service, and to cache resolved domain names; receive an outgoing network packet; determine a destination address of the outgoing network packet; and upon determining that the destination address was not cached, apply a security policy.
Tirumaleswar Reddy Konda, Shashank Jain, Piyush Pramod Joshi, Himanshu Srivastava
Filed: 25 Jan 21
Utility
Methods, systems, and media for protected near-field communications
18 Jul 23
Methods, systems, and media for protected near-field communications are provided.
Eoin Carroll
Filed: 31 May 22