Ping Identity Corporation

United States of America

Back to Profile

1-100 of 153 for Ping Identity Corporation Sort by
Query
Aggregations
IP Type
        Trademark 81
        Patent 72
Jurisdiction
        United States 95
        World 38
        Canada 20
Date
2025 October 1
2025 August 3
2025 (YTD) 5
2024 4
2023 10
See more
IPC Class
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system 28
H04L 29/06 - Communication control; Communication processing characterised by a protocol 26
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems 16
H04L 9/40 - Network security protocols 15
G06F 9/54 - Interprogram communication 11
See more
NICE Class
09 - Scientific and electric apparatus and instruments 60
42 - Scientific, technological and industrial services, research and design 56
45 - Legal and security services; personal services for individuals. 31
41 - Education, entertainment, sporting and cultural services 12
35 - Advertising and business services 3
See more
Status
Pending 11
Registered / In Force 142
  1     2        Next Page

1.

PINGHELIX

      
Application Number 1882316
Status Registered
Filing Date 2025-04-25
Registration Date 2025-04-25
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Software as a service (SaaS) services, namely, hosting non-downloadable computer software for use by others that facilitates verifiable credentials and identity federation in the field of digital security and identification; software as a service (SaaS) services, namely, hosting non-downloadable computer software for use by others that provides identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; software as a service (SaaS) services, namely, hosting non-downloadable computer software for use by others that provides identity validation, namely, providing authentication of personal identification information via the internet; software as a service (SaaS) services, namely, hosting non-downloadable computer software for use by others that provides fraud detection services in the field of identity verification; software as a service (SaaS) services, namely, hosting non-downloadable computer software for use by others that provides credentialing and identity verification, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security; credentialing and identity verification services, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security. Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification.

2.

TRUST EVERY DIGITAL MOMENT

      
Application Number 1871693
Status Registered
Filing Date 2025-07-17
Registration Date 2025-07-17
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software for facilitating identity federation, multi-factor and strong authentication and access control for web, mobile and application programmable interfaces (API). Electronic signature verification services using technology to authenticate user identity; user authentication services using single sign-on technology for online software applications; providing user authentication services using single sign-on technology for online software applications; providing user authentication services using single sign-on technology for authentication between two or more entities in the field of digital security; software as a service (SaaS) services featuring software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interfaces (API).

3.

PING WELL-ARCHITECTED FRAMEWORK

      
Serial Number 99343327
Status Pending
Filing Date 2025-08-18
Owner Ping Identity Corporation ()
NICE Classes  ? 35 - Advertising and business services

Goods & Services

Business consulting services in the field of identity federation, multi-factor and strong authentication, access control for web, mobile, application programmable interfaces (API), and single sign-on technology for authentication between two or more entities in the field of digital security

4.

PINGONE PRIVILEGE

      
Serial Number 99343331
Status Pending
Filing Date 2025-08-18
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software for facilitating identity federation, multi-factor and strong authentication and access control for web, mobile and application programmable interfaces (API) Electronic signature verification services using technology to authenticate user identity; User authentication services using single sign-on technology for online software applications; Providing user authentication services using single sign-on technology for online software applications; Providing user authentication services using single sign-on technology for authentication between two or more entities in the field of digital security; Software as a service (SAAS) services featuring software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interfaces (API)

5.

TRUST EVERY DIGITAL MOMENT

      
Serial Number 99089699
Status Pending
Filing Date 2025-03-18
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software for facilitating identity federation, multi-factor and strong authentication and access control for web, mobile and application programmable interfaces (API) Electronic signature verification services using technology to authenticate user identity; User authentication services using single sign-on technology for online software applications; Providing user authentication services using single sign-on technology for online software applications; Providing user authentication services using single sign-on technology for authentication between two or more entities in the field of digital security; Software as a service (SAAS) services featuring software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interfaces (API)

6.

HELIX

      
Serial Number 98824753
Status Pending
Filing Date 2024-10-28
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates verifiable credentials and identity federation in the field of digital security and identification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides identity validation, namely, providing authentication of personal identification information via the internet; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides fraud detection services in the field of identity verification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides credentialing and identity verification, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security; credentialing and identity verification services, namely, authentication, issuance and validation of verifiable digital certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security; fraud detection services in the field of identity verification in the nature of monitoring of computer systems for detecting unauthorized access or data breach Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity, as part of personal background investigations; identity validation, namely, providing authentication of personal identification information via the internet, as part of personal background investigation

7.

PINGHELIX

      
Serial Number 98824756
Status Pending
Filing Date 2024-10-28
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates verifiable credentials and identity federation in the field of digital security and identification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides identity validation, namely, providing authentication of personal identification information via the internet; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides fraud detection services in the field of identity verification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides credentialing and identity verification, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security; credentialing and identity verification services, namely, authentication, issuance and validation of verifiable digital certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security; fraud detection services in the field of identity verification in the nature of monitoring of computer systems for detecting unauthorized access or data breach Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity, as part of personal background investigations; identity validation, namely, providing authentication of personal identification information via the internet, as part of personal background investigations

8.

Electronic identification verification methods and systems with storage of certification records to a side chain

      
Application Number 17752536
Grant Number RE049968
Status In Force
Filing Date 2022-05-24
First Publication Date 2024-05-14
Grant Date 2024-05-14
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Reshetnikov, Vladimir
  • Gadbois, Robert

Abstract

Method of certification including receiving user data at a device of a certifying entity. The method includes generating a salt that is unique. The method includes hashing the data combined with the salt to create a generated hashed data. The method includes generating a certification record based on signing the generated hashed data using a private key of the certifying entity to create a signed certification of the data. The method includes hashing the certification record. The method includes transmitting the hashed certification record to a blockchain for storing. The method includes receiving a certification tx-ID of the hashed certification record. The method includes generating a certification data block including the certification record and the certification tx-ID. The method includes storing the certification data block to a side chain.

IPC Classes  ?

  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06F 7/58 - Random or pseudo-random number generators
  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • G06Q 20/38 - Payment protocolsDetails thereof
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

9.

PINGONE NEO

      
Application Number 1778152
Status Registered
Filing Date 2023-09-21
Registration Date 2023-09-21
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates verifiable credentials and identity federation in the field of digital security and identity verification. Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates verifiable credentials and identity federation in the field of digital security and identification; credentialing and identity verification services, namely, issuing verifiable credentials and providing user authentication between two or more entities in the field of digital security.

10.

PINGONE NEO

      
Application Number 231275400
Status Pending
Filing Date 2023-09-21
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Downloadable computer software that facilitates verifiable credentials and identity federation in the field of digital security and identity verification. (1) Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates verifiable credentials and identity federation in the field of digital security and identification; identity verification services, namely, providing validation of one's proof of verified identity between two or more entities in the field of digital security.

11.

Methods, systems, and apparatus for credential format and protocol management

      
Application Number 18162472
Grant Number 11770418
Status In Force
Filing Date 2023-01-31
First Publication Date 2023-08-03
Grant Date 2023-09-26
Owner Ping Identity Corporation (USA)
Inventor
  • Geusz, Darrell
  • Aannestad, Bjorn
  • Khot, Gaurav
  • Shiverick, Alden

Abstract

In an embodiment, a method includes receiving, by a processor and from a user device associated with a user, a request to access a service associated with a first protocol. The method further includes receiving, by the processor, a virtual credential of the user authorized by an authorizing entity. The virtual credential is compliant with a second protocol different than the first protocol. The method further includes verifying, by the processor, that the virtual credential is authorized by the authorizing entity. The method further includes transforming, by the processor, the virtual credential to generate a transformed virtual credential compliant with the first protocol. The method further includes sending, by the processor, a representation of the transformed virtual credential to the service. The method further includes verifying, by the processor and after the sending, that the transformed virtual credential is valid.

IPC Classes  ?

12.

METHODS, SYSTEMS, AND APPARATUS FOR CREDENTIAL FORMAT AND PROTOCOL MANAGEMENT

      
Application Number US2023061646
Publication Number 2023/147586
Status In Force
Filing Date 2023-01-31
Publication Date 2023-08-03
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Geusz, Darrell
  • Aannestad, Bjorn
  • Khot, Gaurav
  • Shiverick, Alden

Abstract

In an embodiment, a method includes receiving, by a processor and from a user device associated with a user, a request to access a service associated with a first protocol. The method further includes receiving, by the processor, a virtual credential of the user authorized by an authorizing entity. The virtual credential is compliant with a second protocol different than the first protocol. The method further includes verifying, by the processor, that the virtual credential is authorized by the authorizing entity. The method further includes transforming, by the processor, the virtual credential to generate a transformed virtual credential compliant with the first protocol. The method further includes sending, by the processor, a representation of the transformed virtual credential to the service. The method further includes verifying, by the processor and after the sending, that the transformed virtual credential is valid.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04W 12/069 - Authentication using certificates or pre-shared keys

13.

METHOD AND APPARATUS FOR SECURE AUTHENTICATION BASED ON PROXIMITY

      
Application Number US2023060883
Publication Number 2023/141493
Status In Force
Filing Date 2023-01-19
Publication Date 2023-07-27
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Weiner, Avish Jacob
  • Ne'Man, Ran
  • Sherry, Segev
  • Glick, Yuri
  • Solomon, Guy
  • Walters, Joseph Yuval

Abstract

In an embodiment, a set of dynamic proximity attribute (DPA) Risk Signals (RS) indicating whether a user is within a predetermined proximity of a registered user mobile device (RUMD) and a registered user device (RUD) is received from the RUMD and at an identity provider (IDP) communicably coupled to the RUMD based on short-range communication between the RUMD and the RUD. The RUMD is configured to monitor devices in short-range communication in a dynamic proximity area network (DPxAN) via an IDP application (IDPAmd) associated with the RUMD. A Risk Parameter Value (RPV) is determined according to at least the set of DPA RS received from the RUMD. A passwordless request to authenticate the user at the RUD on which a user access request originated is received from a Service Provider (SPn) by the IDP. An authentication response is sent from the IDP to the SPn based on the RPV.

IPC Classes  ?

  • H04W 12/06 - Authentication
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • H04W 12/08 - Access security
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

14.

Method and apparatus for secure authentication based on proximity

      
Application Number 18156668
Grant Number 12321437
Status In Force
Filing Date 2023-01-19
First Publication Date 2023-07-20
Grant Date 2025-06-03
Owner Ping Identity Corporation (USA)
Inventor
  • Weiner, Avish Jacob
  • Ne'Man, Ran
  • Sherry, Segev
  • Glick, Yuri
  • Solomon, Guy
  • Walters, Joseph Yuval

Abstract

In an embodiment, a set of dynamic proximity attribute (DPA) Risk Signals (RS) indicating whether a user is within a predetermined proximity of a registered user mobile device (RUMD) and a registered user device (RUD) is received from the RUMD and at an identity provider (IDP) communicably coupled to the RUMD based on short-range communication between the RUMD and the RUD. The RUMD is configured to monitor devices in short-range communication in a dynamic proximity area network (DPxAN) via an IDP application (IDPAmd) associated with the RUMD. A Risk Parameter Value (RPV) is determined according to at least the set of DPA RS received from the RUMD. A passwordless request to authenticate the user at the RUD on which a user access request originated is received from a Service Provider (SPn) by the IDP. An authentication response is sent from the IDP to the SPn based on the RPV.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

15.

Methods and systems for data traffic based adaptive security

      
Application Number 18051240
Grant Number 11843605
Status In Force
Filing Date 2022-10-31
First Publication Date 2023-07-20
Grant Date 2023-12-12
Owner Ping Identity Corporation (USA)
Inventor
  • Harguindeguy, Bernard
  • Subbarayan, Udayakumar
  • Rosenblum, Isidore
  • Poonthiruthi, Abduraheem
  • Gopalakrishnan, Anoop Krishnan
  • Kumar, Ashwani

Abstract

The present disclosure relates to traffic monitoring through one or more access control servers configured for (i) routing server resource request messages to resource server(s), (ii) extracting information identifying a target server resource from data packets corresponding to one or more received server resource request messages, and (iii) selectively transmitting the received server resource request message to a resource server. The security server(s) is configured to receive a server resource request message data extracted from a server resource request message and initiate a first security response, wherein the initiated first security response is dependent on analysis of the server resource request message data. Responsive to identifying an indicator of compromise or that an originating terminal corresponding to the server resource request is identified within a blacklist, the first security response comprises non-transmission of at least one server resource request message by the access control server to a resource server.

IPC Classes  ?

16.

AUTHENTICATION SYSTEM

      
Application Number 18095984
Status Pending
Filing Date 2023-01-11
First Publication Date 2023-07-13
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Halemane, Sukhesh
  • Pattanshetti, Mahantesh
  • Sharma, Suman

Abstract

We propose a method of authenticating a client device with a provider. The method includes receiving an authentication request from the client device at an authentication server. The method includes sending a challenge to a hardware-based security module of the client device based on the authentication request. The method includes receiving a response to the challenge and identifying the provider corresponding to the authentication request. The method includes authenticating the client device with the provider based on the authentication request and the response to the challenge.

IPC Classes  ?

17.

SYSTEMS, APPARATUS AND METHODS FOR SECURE ELECTRICAL COMMUNICATION OF BIOMETRIC PERSONAL IDENTIFICATION INFORMATION TO VALIDATE THE IDENTITY OF AN INDIVIDUAL

      
Application Number 18068083
Status Pending
Filing Date 2022-12-19
First Publication Date 2023-06-22
Owner Ping Identity Corporation (USA)
Inventor Ebrahimi, Armin

Abstract

An apparatus for validating an identity of an individual based on biometrics includes a memory and a processor operatively coupled to a distributed database and the memory. The processor is configured to provide biometric data as an input to a predefined hash function to obtain a first biometric hash value. The processor is configured to obtain, using a first pointer to the distributed database, a signed second biometric hash value. The processor is configured to define a certification of the biometric data in response to verifying that a signature of the signed second biometric hash value is associated with the compute device and verifying that the first biometric hash value corresponds with the second biometric hash value. The processor is configured to digitally sign the certification using a private key associated with the processor to produce a signed biometric certification and store the signed biometric certification in the distributed database.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04W 12/06 - Authentication
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • G06F 21/31 - User authentication
  • G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06F 21/33 - User authentication using certificates
  • H04L 9/40 - Network security protocols
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code

18.

PINGONE NEO

      
Serial Number 97856212
Status Registered
Filing Date 2023-03-24
Registration Date 2024-12-17
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates verifiable credentials and identity federation in the field of digital security and identity verification Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates verifiable credentials and identity federation in the field of digital security and identification; Credentialing and identity verification services, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security

19.

Methods and systems for deep learning based API traffic security

      
Application Number 17817577
Grant Number 11855968
Status In Force
Filing Date 2022-08-04
First Publication Date 2023-03-02
Grant Date 2023-12-26
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Angadi, Nagabhushana
  • Kumar, Ashwani
  • Sahu, Santosh
  • Poonthiruthi, Abdu Raheem
  • Sahu, Avinash Kumar
  • Kundottil, Yasar

Abstract

The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and computer program products for deep learning based API traffic analysis and network security. The invention provides an automated approach to threat and/or attack detection by machine learning based accumulation and/or interpretation of various API/application traffic patterns, identifying and mapping characteristics of normal traffic for each API, and thereafter identifying any deviations from the normal traffic parameter baselines, which deviations may be classified as anomalies or attacks.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

20.

Electronic identification verification methods and systems with storage of certification records to a side chain

      
Application Number 17732746
Grant Number 11799668
Status In Force
Filing Date 2022-04-29
First Publication Date 2022-12-22
Grant Date 2023-10-24
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Reshetnikov, Vladimir
  • Gadbois, Robert

Abstract

Method of certification including receiving user data at a device of a certifying entity. The method includes generating a salt that is unique. The method includes hashing the data combined with the salt to create a generated hashed data. The method includes generating a certification record based on signing the generated hashed data using a private key of the certifying entity to create a signed certification of the data. The method includes hashing the certification record. The method includes transmitting the hashed certification record to a blockchain for storing. The method includes receiving a certification tx-ID of the hashed certification record. The method includes generating a certification data block including the certification record and the certification tx-ID. The method includes storing the certification data block to a side chain.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06F 7/58 - Random or pseudo-random number generators
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

21.

PingOne DaVinci

      
Application Number 1695732
Status Registered
Filing Date 2022-07-19
Registration Date 2022-07-19
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application. Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification. Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification, identity verification services, namely, providing validation of a person's verified identity.

22.

Ping DaVinci

      
Application Number 1696149
Status Registered
Filing Date 2022-07-19
Registration Date 2022-07-19
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application. Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification. Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification, identity verification services, namely, providing validation of a person's verified identity.

23.

PingOne Authorize

      
Application Number 1696316
Status Registered
Filing Date 2022-07-19
Registration Date 2022-07-19
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification. Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification, identity verification services, namely, providing validation of a person's verified identity.

24.

Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual

      
Application Number 17738106
Grant Number 11544367
Status In Force
Filing Date 2022-05-06
First Publication Date 2022-10-27
Grant Date 2023-01-03
Owner Ping Identity Corporation (USA)
Inventor Ebrahimi, Armin

Abstract

An apparatus for validating an identity of an individual based on biometrics includes a memory and a processor operatively coupled to a distributed database and the memory. The processor is configured to provide biometric data as an input to a predefined hash function to obtain a first biometric hash value. The processor is configured to obtain, using a first pointer to the distributed database, a signed second biometric hash value. The processor is configured to define a certification of the biometric data in response to verifying that a signature of the signed second biometric hash value is associated with the compute device and verifying that the first biometric hash value corresponds with the second biometric hash value. The processor is configured to digitally sign the certification using a private key associated with the processor to produce a signed biometric certification and store the signed biometric certification in the distributed database.

IPC Classes  ?

  • G06F 21/33 - User authentication using certificates
  • H04L 9/40 - Network security protocols
  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

25.

PingAuthorize

      
Application Number 1685148
Status Registered
Filing Date 2022-07-19
Registration Date 2022-07-19
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application. Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification; identity verification services, namely, providing validation of a person's verified identity.

26.

DaVinci

      
Application Number 1685147
Status Registered
Filing Date 2022-07-19
Registration Date 2022-07-19
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application. Software as a service (SaaS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; software as a service (SaaS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification. Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification; identity verification services, namely, providing validation of a person's verified identity.

27.

Methods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions

      
Application Number 17680767
Grant Number 11783033
Status In Force
Filing Date 2022-02-25
First Publication Date 2022-09-15
Grant Date 2023-10-10
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Rosenblum, Isidore
  • Kundottil, Yasar
  • Gunuganti, Aditya
  • Sharma, Amit Kumar
  • Sahu, Avinash Kumar

Abstract

In some embodiments, a method includes receiving, at a processor of a server, a first application programming interface (API) call from a client device and providing an indication associated with the first API call as an input to a machine learning model such that the machine learning model identifies a set of parameters associated with a set of likely subsequent API calls. The method can further include receiving a second API call from the client device, identifying the second API call as an anomalous API call based on the second API call not meeting the set of parameters associated with the set of likely subsequent API calls, and sending a signal to perform a remedial action based on the identifying.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning
  • H04L 9/40 - Network security protocols
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 41/14 - Network analysis or design
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 40/216 - Parsing using statistical methods

28.

Methods and systems for recovering data using dynamic passwords

      
Application Number 17551585
Grant Number 11777726
Status In Force
Filing Date 2021-12-15
First Publication Date 2022-08-11
Grant Date 2023-10-03
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav

Abstract

A method for recovering data. The method including collecting identity factors at a user device, wherein hashes of the identity factors are configured to be stored at a server. The method including generating at the user device a dynamic password based on the identity factors and a Salt configured to be generated by the server and configured to be delivered to the user device. The method including generating at the user device a data key and encrypting the data key using the dynamic password to generate an encrypted data key configured to be stored at the server. The method including encrypting at the user device data items using the data key to generate encrypted data items configured to be stored at the server. As such, the data items are recoverable by presenting the identity factors to the server.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols

29.

ShoCard

      
Application Number 1656119
Status Registered
Filing Date 2021-07-27
Registration Date 2021-07-27
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document (s) and maintains that information securely within the mobile application; downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user. Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity verification and proofing to establish a real person's identity based on their biometric facial image and a government identification; software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user. Identity verification services, namely, providing validation of one's proof of verified identity between two or more entities in the field of digital security (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); identity verification services, namely, providing validation of one's proof of verified identity, namely, personal validation information related to health records and immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user.

30.

Method and system for authenticated login using static or dynamic codes

      
Application Number 17480673
Grant Number 11658961
Status In Force
Filing Date 2021-09-21
First Publication Date 2022-03-10
Grant Date 2023-05-23
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Reshetnikov, Vladimir
  • Gadbois, Robert

Abstract

Method of authentication including sending a login web page to a first device of a user including a scannable code having an envelope ID and a login challenge. The envelope ID generated by an identity manager is associated with a first envelope of data including a session ID. A confirmation login request is received from a second device associated with the user, and includes a second envelope of data comprising the session ID, a user ID, and a seal of the user ID registering the user ID with the identity manager. The confirmation login request to the login challenge is verified using the session ID, and the user is verified using the user ID and seal. User login is authorized upon successful verification of the login challenge and user, and a communication session having the session ID is established between the web server and the first device.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/31 - User authentication
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

31.

Methods and systems for API deception environment and API traffic control and security

      
Application Number 17375695
Grant Number 11924170
Status In Force
Filing Date 2021-07-14
First Publication Date 2022-02-10
Grant Date 2024-03-05
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Angadi, Nagabhushana
  • Kumar, Ashwani
  • Sahu, Santosh
  • Poonthiruthi, Abdu Raheem
  • Sahu, Avinash Kumar
  • Kundottil, Yasar

Abstract

The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and computer program products for Application Programming Interface (API) based flow control and API based security at the application layer of the networking protocol stack. The invention additionally provides an API deception environment to protect a server backend from threats, attacks and unauthorized access.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06N 20/00 - Machine learning

32.

Blockchain ID connect

      
Application Number 17226386
Grant Number 11722301
Status In Force
Filing Date 2021-04-09
First Publication Date 2022-01-27
Grant Date 2023-08-08
Owner Ping Identity Corporation (USA)
Inventor Ebrahimi, Armin

Abstract

A method for login, including making a login request to an entity through a federation server that generates a session identifier. A QR code is sent to the federation server to receive the session identifier. A secure envelope including user personal information is sent to the federation server to verify user registration with the federation server. A login token generated by the federation server is received and is associated with a smart contract generated by the federation server and stored on a blockchain. The login token is signed using user private key and sent to the blockchain for inclusion in the smart contract. A transaction identifier is received from the blockchain, and is sent to the federation server that generates a session record based on the login token. The federation server sends user verification to the entity to authorize a communication session between the user device and the entity.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

33.

Methods and systems for creating and recovering accounts using dynamic passwords

      
Application Number 17386787
Grant Number 11818265
Status In Force
Filing Date 2021-07-28
First Publication Date 2022-01-27
Grant Date 2023-11-14
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav

Abstract

A method for recovering data. Identity factors are collected at a device, wherein hashes of the identity factors are configured to be stored at a server. A dynamic password is generated at the device based on the identity factors and a Salt generated by the server and configured to be delivered to the device. A selfie is captured of a user. The device generates a symmetric key used to encrypt the selfie. The symmetric key is encrypted using the dynamic password. The encrypted symmetric key and the encrypted selfie are stored on the server. One or more data items are stored on the server. The dynamic password is recoverable by presenting the plurality of identity factors that are hashed to the server. The symmetric key is recoverable using the recovered dynamic password. The data items are recoverable by presenting the symmetric key and a second selfie of the user.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/08 - Key distribution
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 21/46 - Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

34.

PINGAUTHORIZE

      
Serial Number 97239343
Status Registered
Filing Date 2022-01-26
Registration Date 2024-12-03
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application Computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity

35.

PINGONE AUTHORIZE

      
Serial Number 97239340
Status Registered
Filing Date 2022-01-26
Registration Date 2024-04-23
Owner Ping Identity Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification; Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity in order to protect data stored on computers from unauthorized access; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity for the purposes of protecting data stored on computers from unauthorized access; identity validation for the purposes of protecting data from unauthorized access, namely, providing authentication of personal identification information via the internet; computer fraud detection services in the field of identity verification to protect data stored on computers from unauthorized access; Identity verification services, namely, providing validation of a person's verified identity in order to protect data stored on computers from unauthorized access; computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity

36.

DAVINCI

      
Serial Number 97234004
Status Pending
Filing Date 2022-01-23
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application, none of the foregoing relating to the provision of legal services, in particular, professional intellectual property legal services Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification; Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity for the purposes of protecting data stored on computers, including cloud-based environments, from unauthorized access; identity validation for the purposes of protecting data from unauthorized access, namely, providing authentication of personal identification information via the internet; computer fraud detection services in the field of identity verification to protect data stored on computers, including cloud-based environments, from unauthorized access; Identity verification services, namely, providing validation of a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity, none of the foregoing relating to the provision of legal services, in particular, professional intellectual property legal services

37.

PINGONE DAVINCI

      
Serial Number 97234000
Status Pending
Filing Date 2022-01-23
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification; Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity for the purposes of protecting data stored on computers, including cloud-based environments, from unauthorized access; identity validation for the purposes of protecting data from unauthorized access, namely, providing authentication of personal identification information via the internet; computer fraud detection services in the field of identity verification to protect data stored on computers, including cloud-based environments, from unauthorized access; Identity verification services, namely, providing validation of a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity.

38.

PING DAVINCI

      
Serial Number 97234003
Status Pending
Filing Date 2022-01-23
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification; Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity for the purposes of protecting data stored on computers, including cloud-based environments, from unauthorized access; identity validation for the purposes of protecting data from unauthorized access, namely, providing authentication of personal identification information via the internet; computer fraud detection services in the field of identity verification to protect data stored on computers, including cloud-based environments, from unauthorized access; Identity verification services, namely, providing validation of a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity.

39.

Scalable proxy clusters

      
Application Number 17491946
Grant Number 11582199
Status In Force
Filing Date 2021-10-01
First Publication Date 2022-01-20
Grant Date 2023-02-14
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Poonthiruthi, Abdu Raheem

Abstract

The invention enables high-availability, high-scale, high security and disaster recovery for API computing, including in terms of capture of data traffic passing through proxies, routing communications between clients and servers, and load balancing and/or forwarding functions. The invention inter alia provides (i) a scalable cluster of proxies configured to route communications between clients and servers, without any single point of failure, (ii) proxy nodes configured for implementing the scalable cluster (iii) efficient methods of configuring the proxy cluster, (iv) natural resiliency of clusters and/or proxy nodes within a cluster, (v) methods for scaling of clusters, (vi) configurability of clusters to span multiple servers, multiple racks and multiple datacenters, thereby ensuring high availability and disaster recovery (vii) switching between proxies or between servers without loss of session.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/58 - Association of routers
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 67/145 - Termination or inactivation of sessions, e.g. event-controlled end of session avoiding end of session, e.g. keep-alive, heartbeats, resumption message or wake-up for inactive or interrupted session
  • H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
  • H04L 67/1061 - Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
  • H04L 41/0813 - Configuration setting characterised by the conditions triggering a change of settings
  • H04L 67/01 - Protocols
  • H04L 67/56 - Provisioning of proxy services
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
  • H04L 67/1014 - Server selection for load balancing based on the content of a request
  • H04L 41/0893 - Assignment of logical groups to network elements
  • H04L 45/74 - Address processing for routing
  • H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering
  • H04L 47/20 - Traffic policing
  • H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
  • H04L 69/329 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
  • G06F 9/54 - Interprogram communication
  • H04L 41/28 - Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration

40.

Large data transfer using visual codes with feedback confirmation

      
Application Number 17370731
Grant Number 11544487
Status In Force
Filing Date 2021-07-08
First Publication Date 2021-12-30
Grant Date 2023-01-03
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Chauhan, Bhavya

Abstract

A method of confirming receipt, including iteratively capturing by a receiving device visual codes in a series of visual codes displayed on a sending device. A corresponding captured visual code being from a display block that resulted from a partition of an original data file into display blocks, and wherein each display block is converted to a corresponding string and header including an ordered identifying display block number and a total count of the display blocks. Each corresponding string is converted to a corresponding visual code. Each of the captured visual codes is converted into a corresponding string and a header is read for the corresponding string. Captured display blocks are determined. A confirmation message is generated including information indicating which display blocks have been received. The confirmation message is sent over a wireless communication link to the sending device to reduce the number of visual codes being displayed.

IPC Classes  ?

  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06K 5/04 - Verifying the alignment of markings
  • G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

41.

Ping YOUniverse

      
Application Number 1627962
Status Registered
Filing Date 2021-10-25
Registration Date 2021-10-25
Owner Ping Identity Corporation (USA)
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; Arranging and conducting educational conferences in the field of security and identity management.

42.

Ping YOUniverse

      
Application Number 1628583
Status Registered
Filing Date 2021-10-25
Registration Date 2021-10-25
Owner Ping Identity Corporation (USA)
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; arranging and conducting educational conferences in the field of security and identity management.

43.

ShoCard

      
Application Number 1626900
Status Registered
Filing Date 2021-07-27
Registration Date 2021-07-27
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document (s) and maintains that information securely within the mobile application; downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user. Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity verification and proofing to establish a real person's identity based on their biometric facial image and a government identification; software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user. Identity verification services, namely, providing validation of one's proof of verified identity between two or more entities in the field of digital security; identity verification services, namely, providing validation of one's proof of verified identity, namely, personal validation information related to health records and immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user.

44.

PING YOUNIVERSE

      
Application Number 214983800
Status Registered
Filing Date 2021-10-25
Registration Date 2023-07-05
Owner Ping Identity Corporation (USA)
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

(1) Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; arranging and conducting educational conferences in the field of security and identity management.

45.

Ping YOUniverse

      
Application Number 214984600
Status Registered
Filing Date 2021-10-25
Registration Date 2023-07-05
Owner Ping Identity Corporation (USA)
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

(1) Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; Arranging and conducting educational conferences in the field of security and identity management.

46.

ShoCard

      
Application Number 214780600
Status Registered
Filing Date 2021-07-27
Registration Date 2023-06-21
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document (s) and maintains that information securely within the mobile application; downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user.

47.

SHOCARD

      
Application Number 217898500
Status Registered
Filing Date 2021-07-27
Registration Date 2023-06-21
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document (s) and maintains that information securely within the mobile application; downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user. (1) Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity verification and proofing to establish a real person's identity based on their biometric facial image and a government identification; software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user. (2) Identity verification services, namely, providing validation of one's proof of verified identity between two or more entities in the field of digital security; identity verification services, namely, providing validation of one's proof of verified identity, namely, personal validation information related to health records and immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user.

48.

Transferring data files using a series of visual codes

      
Application Number 16986817
Grant Number 11263415
Status In Force
Filing Date 2020-08-06
First Publication Date 2021-06-24
Grant Date 2022-03-01
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav

Abstract

Software on an image-capturing device iteratively captures a visual code in a series of visual codes displayed in a repeating progression on a screen of a mobile device. The visual code was generated from a display block that resulted from a partition of an original data file into a series of display blocks of at least a specified size. The software converts the visual code back into a display block and reads a header for the display block, discarding the display block if it has already been captured, as determined by the ordered identifying block number in a header. The software stops the iterative capturing when all of the display blocks in the series have been captured, as determined by the count in the header and coalesces the captured display blocks into the original data file, using an order determined by the ordered identifying block numbers.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages

49.

PING YOUNIVERSE

      
Serial Number 90765889
Status Registered
Filing Date 2021-06-10
Registration Date 2022-01-18
Owner Ping Identity Corporation ()
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; Arranging and conducting educational conferences in the field of security and identity management

50.

PingOne Verify

      
Application Number 1589278
Status Registered
Filing Date 2021-03-17
Registration Date 2021-03-17
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application. Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification. Identity verification services, namely, providing validation of a person's verified identity.

51.

PING YOUNIVERSE

      
Serial Number 90689284
Status Registered
Filing Date 2021-05-04
Registration Date 2022-01-18
Owner Ping Identity Corporation ()
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; Arranging and conducting educational conferences in the field of security and identity management

52.

PingOne Verify

      
Application Number 210497900
Status Registered
Filing Date 2021-03-17
Registration Date 2024-08-23
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification. (2) Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification, namely validating a person's identity based on their biometric facial image and providing validation of a person's verified identity based on a form of government identification; identity verification services, namely, providing validation of a person's verified identity based on their biometric facial image and providing validation of a person's verified identity based on a form of government identification.

53.

SHOCARD

      
Serial Number 90540828
Status Registered
Filing Date 2021-02-23
Registration Date 2023-11-28
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document(s) and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity verification and proofing to establish a real person's identity based on their biometric facial image and a government identification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user Identity verification services, namely, providing validation of one's proof of verified identity between two or more entities in the field of digital security; Identity verification services, namely, providing validation of one's proof of verified identity, namely, personal validation information related to health records and immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user

54.

SHOCARD

      
Serial Number 90540799
Status Registered
Filing Date 2021-02-23
Registration Date 2023-06-20
Owner Ping Identity Corporation ()
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document(s) and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user

55.

Methods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions

      
Application Number 16909272
Grant Number 11263321
Status In Force
Filing Date 2020-06-23
First Publication Date 2021-01-07
Grant Date 2022-03-01
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Rosenblum, Isidore
  • Kundottil, Yasar
  • Gunuganti, Aditya
  • Sharma, Amit Kumar
  • Sahu, Avinash Kumar

Abstract

In some embodiments, a method includes receiving, at a processor of a server, a first application programming interface (API) call from a client device and providing an indication associated with the first API call as an input to a machine learning model such that the machine learning model identifies a set of parameters associated with a set of likely subsequent API calls. The method can further include receiving a second API call from the client device, identifying the second API call as an anomalous API call based on the second API call not meeting the set of parameters associated with the set of likely subsequent API calls, and sending a signal to perform a remedial action based on the identifying.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 41/14 - Network analysis or design
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 40/216 - Parsing using statistical methods

56.

PINGONE VERIFY

      
Serial Number 90280609
Status Registered
Filing Date 2020-10-27
Registration Date 2022-07-12
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification Identity verification services, namely, providing validation of a person's verified identity

57.

Methods and systems for API proxy based adaptive security

      
Application Number 16881376
Grant Number 11641343
Status In Force
Filing Date 2020-05-22
First Publication Date 2020-10-22
Grant Date 2023-05-02
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Poonthiruthi, Abdu Raheem

Abstract

The invention concerns API proxy based adaptive security. The invention implements adaptive security for API servers, while avoiding data bottlenecks and maintaining client experience. The invention provides methods and configurations for API security that may be employed at proxies for implementing routing decisions involving client messages received at said proxies. The invention also involves generating or collecting at proxies, log information that captures data corresponding to received client messages and responses from API servers—which log information correlates communications between clients, proxies and backend API servers, and includes data relevant for purposes generating API metrics and identifying anomalies and/or indicators of compromise. The invention yet further provides security server clusters configured for generating API metrics and/or identify anomalies or indicators of compromise—which may be used by proxies to terminate existing connections and block subsequent requests or messages from clients associated with the identified anomalies or indicators of compromise.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/58 - Association of routers
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 67/145 - Termination or inactivation of sessions, e.g. event-controlled end of session avoiding end of session, e.g. keep-alive, heartbeats, resumption message or wake-up for inactive or interrupted session
  • H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
  • H04L 67/1061 - Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
  • H04L 41/0813 - Configuration setting characterised by the conditions triggering a change of settings
  • H04L 67/01 - Protocols
  • H04L 67/56 - Provisioning of proxy services
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
  • H04L 67/1014 - Server selection for load balancing based on the content of a request
  • H04L 41/0893 - Assignment of logical groups to network elements
  • H04L 45/74 - Address processing for routing
  • H04L 47/125 - Avoiding congestionRecovering from congestion by balancing the load, e.g. traffic engineering
  • H04L 47/20 - Traffic policing
  • H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
  • H04L 69/329 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
  • G06F 9/54 - Interprogram communication
  • H04L 41/28 - Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration

58.

PingCentral

      
Application Number 1552938
Status Registered
Filing Date 2020-01-15
Registration Date 2020-01-15
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation; multi-factor and strong authentication (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); access control for web, mobile and application programmable interface (API) all of the foregoing in the field of authorization policy services (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); directory, identity provisioning and identity administration services (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); identity services auditing and reporting (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); and other identity and access management services in the field of digital security and identity verification (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); software for API traffic security; software for API activity monitoring and attack detection and reporting; security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; software for computer network security; software for cloud-based computer security; software for monitoring computer networks; software for detecting computer network intrusion; software for monitoring and maintaining network security; computer software for use in the safeguarding of network data or network services; computer software for detecting security threat; computer software for analyzing attacker behavior within computer networks; computer software for discovering, documenting, and analyzing attacker tools and methods; computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; software for protecting computers and network services from attack; computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; software for implementing network packet. Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; arranging and conducting educational conferences; arranging, organizing and conducting collaborative meetings in the field of enterprise security solutions, namely, identity and access security, authentication services, directory services, enterprise mobility management, cloud governance and threat and fraud detection. Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity (terms too vague in the opinion of the International Bureau – Rule 13 (2) (b) of the Regulations); software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides a self-service portal for application owners and developers to centrally manage policies across all products, create policy templates, and manage the configuration of applications.

59.

Methods and systems for deep learning based API traffic security

      
Application Number 16894222
Grant Number 11411923
Status In Force
Filing Date 2020-06-05
First Publication Date 2020-09-24
Grant Date 2022-08-09
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Angadi, Nagabhushana
  • Kumar, Ashwani
  • Sahu, Santosh
  • Poonthiruthi, Abdu Raheem
  • Sahu, Avinash Kumar
  • Kundottil, Yasar

Abstract

The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and computer program products for deep learning based API traffic analysis and network security. The invention provides an automated approach to threat and/or attack detection by machine learning based accumulation and/or interpretation of various API/application traffic patterns, identifying and mapping characteristics of normal traffic for each API, and thereafter identifying any deviations from the normal traffic parameter baselines, which deviations may be classified as anomalies or attacks.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

60.

Method, server and system for criteria-based assured replication

      
Application Number 14265247
Grant Number 10776384
Status In Force
Filing Date 2014-04-29
First Publication Date 2020-09-15
Grant Date 2020-09-15
Owner Ping Identity Corporation (USA)
Inventor
  • Jackson, Patrick Edward
  • Ely, David Michael
  • Aannestad, Bjorn

Abstract

A method of replicating changes to a dataset includes receiving from a client a request for an operation on the dataset, dynamically selecting from a plurality of replication assurance policies a selected replication assurance policy for the operation, the selected replication assurance policy determining a selected assurance level, wherein the selection is based on at least one of an operation criteria or a connection criteria, submitting, to a first replica of the dataset, a command comprising the operation, and reporting to the client the result of the operation according to the selected assurance level.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

61.

Large data transfer using visual codes with feedback confirmation

      
Application Number 16697110
Grant Number 11062106
Status In Force
Filing Date 2019-11-26
First Publication Date 2020-08-20
Grant Date 2021-07-13
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Chauhan, Bhavya

Abstract

A method of confirming receipt, including iteratively capturing by a receiving device visual codes in a series of visual codes displayed on a sending device. A corresponding captured visual code being from a display block that resulted from a partition of an original data file into display blocks, and wherein each display block is converted to a corresponding string and header including an ordered identifying display block number and a total count of the display blocks. Each corresponding string is converted to a corresponding visual code. Each of the captured visual codes is converted into a corresponding string and a header is read for the corresponding string. Captured display blocks are determined. A confirmation message is generated including information indicating which display blocks have been received. The confirmation message is sent over a wireless communication link to the sending device to reduce the number of visual codes being displayed.

IPC Classes  ?

  • G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages

62.

Electronic identification verification methods and systems with storage of certification records to a side chain

      
Application Number 16697131
Grant Number 11323272
Status In Force
Filing Date 2019-11-26
First Publication Date 2020-08-20
Grant Date 2022-05-03
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Reshetnikov, Vladimir
  • Gadbois, Robert

Abstract

Method of certification including receiving user data at a device of a certifying entity. The method includes generating a salt that is unique. The method includes hashing the data combined with the salt to create a generated hashed data. The method includes generating a certification record based on signing the generated hashed data using a private key of the certifying entity to create a signed certification of the data. The method includes hashing the certification record. The method includes transmitting the hashed certification record to a blockchain for storing. The method includes receiving a certification tx-ID of the hashed certification record. The method includes generating a certification data block including the certification record and the certification tx-ID. The method includes storing the certification data block to a side chain.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06F 7/58 - Random or pseudo-random number generators

63.

PING INTELLIGENT IDENTITY

      
Application Number 1541011
Status Registered
Filing Date 2019-10-24
Registration Date 2019-10-24
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation; software for API traffic security; software for API activity monitoring and attack detection and reporting; security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; software for computer network security; software for cloud-based computer security; software for monitoring computer networks; software for detecting computer network intrusion; software for monitoring and maintaining network security; computer software for use in the safeguarding of network data or network services; computer software for detecting security threat; computer software for analyzing attacker behavior within computer networks; computer software for discovering, documenting, and analyzing attacker tools and methods; computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; software for protecting computers and network services from attack; computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; software for implementing network packet brokers, intrusion prevention systems and network load balancers; software for monitoring, analyzing or reporting of network information, data, and traffic. Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API); user authentication, identification and monitoring services, namely multi-factor and strong authentication, access control for web, mobile and application programmable interface (API) all of the foregoing in the field of authorization policy services; user authentication, identification and monitoring services, namely identity provisioning and administration services, identity services auditing and reporting and other identity and access management services in the field of digital security and identity verification.

64.

Methods and systems for API deception environment and API traffic control and security

      
Application Number 16788059
Grant Number 11075885
Status In Force
Filing Date 2020-02-11
First Publication Date 2020-06-04
Grant Date 2021-07-27
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Angadi, Nagabhushana
  • Kumar, Ashwani
  • Sahu, Santosh
  • Poonthiruthi, Abdu Raheem
  • Sahu, Avinash Kumar
  • Kundottil, Yasar

Abstract

The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and computer program products for Application Programming Interface (API) based flow control and API based security at the application layer of the networking protocol stack. The invention additionally provides an API deception environment to protect a server backend from threats, attacks and unauthorized access.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

65.

Scalable proxy clusters

      
Application Number 16686885
Grant Number 11140135
Status In Force
Filing Date 2019-11-18
First Publication Date 2020-05-21
Grant Date 2021-10-05
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Poonthiruthi, Abdu Raheem

Abstract

The invention enables high-availability, high-scale, high security and disaster recovery for API computing, including in terms of capture of data traffic passing through proxies, routing communications between clients and servers, and load balancing and/or forwarding functions. The invention inter alia provides (i) a scalable cluster of proxies configured to route communications between clients and servers, without any single point of failure, (ii) proxy nodes configured for implementing the scalable cluster (iii) efficient methods of configuring the proxy cluster, (iv) natural resiliency of clusters and/or proxy nodes within a cluster, (v) methods for scaling of clusters, (vi) configurability of clusters to span multiple servers, multiple racks and multiple datacenters, thereby ensuring high availability and disaster recovery (vii) switching between proxies or between servers without loss of session.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
  • H04L 12/771 - Router architecture
  • H04L 12/775 - Router architecture multiple routing entities, e.g. multiple software or hardware instances
  • H04L 29/14 - Counter-measures to a fault
  • H04L 12/741 - Header address processing for routing, e.g. table lookup
  • H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
  • H04L 12/813 - Policy-based control, e.g. policing
  • G06F 9/54 - Interprogram communication

66.

Blockchain ID connect

      
Application Number 16656477
Grant Number 10979227
Status In Force
Filing Date 2019-10-17
First Publication Date 2020-04-23
Grant Date 2021-04-13
Owner Ping Identity Corporation (USA)
Inventor Ebrahimi, Armin

Abstract

A method for login, including making a login request to an entity through a federation server that generates a session identifier. A QR code is sent to the federation server to receive the session identifier. A secure envelope including user personal information is sent to the federation server to verify user registration with the federation server. A login token generated by the federation server is received and is associated with a smart contract generated by the federation server and stored on a blockchain. The login token is signed using user private key and sent to the blockchain for inclusion in the smart contract. A transaction identifier is received from the blockchain, and is sent to the federation server that generates a session record based on the login token. The federation server sends user verification to the entity to authorize a communication session between the user device and the entity.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

67.

Methods and systems for creating and recovering accounts using dynamic passwords

      
Application Number 16656459
Grant Number 11082221
Status In Force
Filing Date 2019-10-17
First Publication Date 2020-04-23
Grant Date 2021-08-03
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav

Abstract

A method for recovering data. Identity factors are collected at a device, wherein hashes of the identity factors are configured to be stored at a server. A dynamic password is generated at the device based on the identity factors and a Salt generated by the server and configured to be delivered to the device. A selfie is captured of a user. The device generates a symmetric key used to encrypt the selfie. The symmetric key is encrypted using the dynamic password. The encrypted symmetric key and the encrypted selfie are stored on the server. One or more data items are stored on the server. The dynamic password is recoverable by presenting the plurality of identity factors that are hashed to the server. The symmetric key is recoverable using the recovered dynamic password. The data items are recoverable by presenting the symmetric key and a second selfie of the user.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 9/08 - Key distribution
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 21/46 - Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

68.

PING INTELLIGENT IDENTITY

      
Application Number 203986700
Status Registered
Filing Date 2019-10-24
Registration Date 2022-09-28
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API) all of the foregoing in the field of authorization policy services; downloadable computer software that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates multi-factor authentication and strong authentication in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; downloadable digital security software for secure transmission of user generated data, software applications, and computer systems accessed via application programmable interface (API) or the Internet; software for reporting programmatic interface traffic activity; downloadable software for reporting API traffic activity; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable computer software for analyzing attacker behavior within computer networks; downloadable computer software for discovering, documenting, and analyzing attacker tools and methods; downloadable computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; downloadable software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; downloadable software for securing API traffic across hybrid clouds; downloadable software for protecting computers and computer network services from cyber attack; downloadable computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; downloadable software for creating, centrally managing, maintaining, and executing firewall protection filters, content filters, and controlling access to computer networks; downloadable software for filtering network packet brokers, intrusion prevention systems and network load balancers; downloadable software for monitoring, analyzing and reporting of computer network security, user generated data, and computer network traffic in the field of digital security and identity verification. (1) Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API).

69.

PINGCENTRAL

      
Serial Number 88576466
Status Registered
Filing Date 2019-08-13
Registration Date 2021-03-23
Owner Ping Identity Corporation ()
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Downloadable computer software that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interface (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; downloadable security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable computer software for analyzing attacker behavior within computer networks; downloadable computer software for discovering, documenting, and analyzing attacker tools and methods; downloadable computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; downloadable software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; downloadable computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; downloadable software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; downloadable software for implementing network packet

70.

PingIntelligence

      
Application Number 1472676
Status Registered
Filing Date 2018-10-31
Registration Date 2018-10-31
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation, multi-factor and strong authentication and access control for web, mobile and application programmable interface (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification; software for API traffic security; software for API activity monitoring and attack detection and reporting; security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; software for computer network security; software for cloud-based computer security; software for monitoring computer networks; software for detecting computer network intrusion; software for monitoring and maintaining network security; computer software for use in the safeguarding of network data or network services; computer software for detecting security threat; computer software for analyzing attacker behavior within computer networks; computer software for discovering, documenting, and analyzing attacker tools and methods; computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; software for protecting computers and network services from attack; computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; software for implementing network packet brokers, intrusion prevention systems and network load balancers; software for monitoring, analyzing or reporting of network information, data, and traffic. Software as a service (SAAS) services, namely, hosting non- downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API).

71.

Methods and systems for recovering data using dynamic passwords

      
Application Number 16214029
Grant Number 11206133
Status In Force
Filing Date 2018-12-07
First Publication Date 2019-06-13
Grant Date 2021-12-21
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav

Abstract

A method for recovering data. The method including collecting identity factors at a user device, wherein hashes of the identity factors are configured to be stored at a server. The method including generating at the user device a dynamic password based on the identity factors and a Salt configured to be generated by the server and configured to be delivered to the user device. The method including generating at the user device a data key and encrypting the data key using the dynamic password to generate an encrypted data key configured to be stored at the server. The method including encrypting at the user device data items using the data key to generate encrypted data items configured to be stored at the server. As such, the data items are recoverable by presenting the identity factors to the server.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

72.

PING INTELLIGENT IDENTITY

      
Serial Number 88460848
Status Registered
Filing Date 2019-06-05
Registration Date 2020-08-18
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API) all of the foregoing in the field of authorization policy services; downloadable computer software that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; security software, being downloadable, for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; downloadable software for reporting API traffic activity; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable computer software for analyzing attacker behavior within computer networks; downloadable computer software for discovering, documenting, and analyzing attacker tools and methods; downloadable computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; downloadable software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; downloadable software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; downloadable computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; downloadable software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; downloadable software for implementing network packet brokers, intrusion prevention systems and network load balancers; downloadable software for monitoring, analyzing or reporting of network information, data, and traffic Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API)

73.

Method and system for authenticated login using static or dynamic codes

      
Application Number 16227632
Grant Number 11134075
Status In Force
Filing Date 2018-12-20
First Publication Date 2019-05-16
Grant Date 2021-09-28
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Reshetnikov, Vladimir
  • Gadbois, Robert

Abstract

Method of authentication including sending a login web page to a first device of a user including a scannable code having an envelope ID and a login challenge. The envelope ID generated by an identity manager is associated with a first envelope of data including a session ID. A confirmation login request is received from a second device associated with the user, and includes a second envelope of data comprising the session ID, a user ID, and a seal of the user ID registering the user ID with the identity manager. The confirmation login request to the login challenge is verified using the session ID, and the user is verified using the user ID and seal. User login is authorized upon successful verification of the login challenge and user, and a communication session having the session ID is established between the web server and the first device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/31 - User authentication
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

74.

Methods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions

      
Application Number 16158836
Grant Number 10699010
Status In Force
Filing Date 2018-10-12
First Publication Date 2019-04-18
Grant Date 2020-06-30
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Rosenblum, Isidore
  • Kundottil, Yasar
  • Gunuganti, Aditya
  • Sharma, Amit Kumar
  • Sahu, Avinash Kumar

Abstract

In some embodiments, a method includes receiving, at a processor of a server, a first application programming interface (API) call from a client device and providing an indication associated with the first API call as an input to a machine learning model such that the machine learning model identifies a set of parameters associated with a set of likely subsequent API calls. The method can further include receiving a second API call from the client device, identifying the second API call as an anomalous API call based on the second API call not meeting the set of parameters associated with the set of likely subsequent API calls, and sending a signal to perform a remedial action based on the identifying.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 40/216 - Parsing using statistical methods

75.

PingDataGovernance

      
Application Number 1454918
Status Registered
Filing Date 2018-10-19
Registration Date 2018-10-19
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification. Software as a service (SaaS) services, namely, hosting non- downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API).

76.

PingDirectory

      
Application Number 1454747
Status Registered
Filing Date 2018-10-19
Registration Date 2018-10-19
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification. Software as a service (SaaS) services, namely, hosting non- downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API).

77.

Methods and systems for API proxy based adaptive security

      
Application Number 16050915
Grant Number 10666621
Status In Force
Filing Date 2018-07-31
First Publication Date 2018-11-22
Grant Date 2020-05-26
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Poonthiruthi, Abdu Raheem

Abstract

The invention concerns API proxy based adaptive security. The invention implements adaptive security for API servers, while avoiding data bottlenecks and maintaining client experience. The invention provides methods and configurations for API security that may be employed at proxies for implementing routing decisions involving client messages received at said proxies. The invention also involves generating or collecting at proxies, log information that captures data corresponding to received client messages and responses from API servers—which log information correlates communications between clients, proxies and backend API servers, and includes data relevant for purposes generating API metrics and identifying anomalies and/or indicators of compromise. The invention yet further provides security server clusters configured for generating API metrics and/or identify anomalies or indicators of compromise—which may be used by proxies to terminate existing connections and block subsequent requests or messages from clients associated with the identified anomalies or indicators of compromise.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
  • H04L 12/771 - Router architecture
  • H04L 12/775 - Router architecture multiple routing entities, e.g. multiple software or hardware instances
  • H04L 29/14 - Counter-measures to a fault
  • H04L 12/741 - Header address processing for routing, e.g. table lookup
  • H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
  • H04L 12/813 - Policy-based control, e.g. policing
  • G06F 9/54 - Interprogram communication

78.

Scalable proxy clusters

      
Application Number 16050958
Grant Number 10484337
Status In Force
Filing Date 2018-07-31
First Publication Date 2018-11-22
Grant Date 2019-11-19
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Poonthiruthi, Abdu Raheem

Abstract

The invention enables high-availability, high-scale, high security and disaster recovery for API computing, including in terms of capture of data traffic passing through proxies, routing communications between clients and servers, and load balancing and/or forwarding functions. The invention inter alia provides (i) a scalable cluster of proxies configured to route communications between clients and servers, without any single point of failure, (ii) proxy nodes configured for implementing the scalable cluster (iii) efficient methods of configuring the proxy cluster, (iv) natural resiliency of clusters and/or proxy nodes within a cluster, (v) methods for scaling of clusters, (vi) configurability of clusters to span multiple servers, multiple racks and multiple datacenters, thereby ensuring high availability and disaster recovery (vii) switching between proxies or between servers without loss of session.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/715 - Hierarchical routing, e.g. clustered networks or inter-domain routing
  • H04L 12/771 - Router architecture
  • H04L 12/775 - Router architecture multiple routing entities, e.g. multiple software or hardware instances
  • H04L 29/14 - Counter-measures to a fault
  • H04L 12/741 - Header address processing for routing, e.g. table lookup
  • H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
  • H04L 12/813 - Policy-based control, e.g. policing
  • G06F 9/54 - Interprogram communication

79.

PINGINTELLIGENCE

      
Application Number 192809900
Status Registered
Filing Date 2018-10-31
Registration Date 2022-09-29
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Downloadable computer software that facilitates identity federation; downloadable computer software that facilitates multi-factor authentication and strong authentication in the field of digital security and identity verification; downloadable computer software that facilitates access control for web, mobile and application programmable interface (API), all in the field of digital security and identity verification; downloadable computer software that facilitates authorization policy services authentication in the field of digital security and identity verification; downloadable computer software that facilitates directory, identity provisioning and identity administration services in the field of digital security and identity verification; downloadable computer software that facilitates identity services auditing and reporting in the field of digital security and identity verification; downloadable computer software that facilitates identity federation and access management services in the field of digital security and identity verification; Software for API traffic security; software for API activity monitoring and attack detection and reporting; security software for digital security and identity verification data, applications, and computer systems accessed via API; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; software for computer network security; software for cloud-based computer security; software for monitoring computer networks; software for detecting computer network intrusion; software for monitoring and maintaining network security; computer software for use in the safeguarding of network data or network services; computer software for detecting security threat; computer software for analyzing attacker behavior within computer networks; computer software for discovering, documenting, and analyzing attacker tools and methods; computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; software for protecting computers and network services from security breaches and cyber attacks; Computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; software for creating, centrally managing, maintaining, and executing firewall filters, content filters of computers and computer networks, and access control for web, mobile and application programmable interface (API); Software for implementing network packet brokers, intrusion prevention systems and network load balancers; software for monitoring, analyzing or reporting of global computer network digital security and identity information, data, and traffic (1) Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interface (API) (2) Identity verification services, namely, providing user authentication between two or more entities in the field of digital security

80.

Transferring data files using a series of visual codes

      
Application Number 16019411
Grant Number 10740584
Status In Force
Filing Date 2018-06-26
First Publication Date 2018-10-25
Grant Date 2020-08-11
Owner Ping Identity Corporation (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav

Abstract

Software on an image-capturing device iteratively captures a visual code in a series of visual codes displayed in a repeating progression on a screen of a mobile device. The visual code was generated from a display block that resulted from a partition of an original data file into a series of display blocks of at least a specified size. The software converts the visual code back into a display block and reads a header for the display block, discarding the display block if it has already been captured, as determined by the ordered identifying block number in a header. The software stops the iterative capturing when all of the display blocks in the series have been captured, as determined by the count in the header and coalesces the captured display blocks into the original data file, using an order determined by the ordered identifying block numbers.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages

81.

PINGDIRECTORY

      
Application Number 192652800
Status Registered
Filing Date 2018-10-22
Registration Date 2022-04-05
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Downloadable computer software that facilitates identity federation; downloadable computer software that facilitates multi-factor authentication and strong authentication in the field of digital security and identity verification; downloadable computer software that facilitates access control for web, mobile and application programmable interface (API), all in the field of digital security and identity verification; downloadable computer software that facilitates authorization policy services authentication in the field of digital security and identity verification; downloadable computer software that facilitates directory, identity provisioning and identity administration services in the field of digital security and identity verification; downloadable computer software that facilitates identity services auditing and reporting in the field of digital security and identity verification; downloadable computer software that facilitates identity federation and access management services in the field of digital security and identity verification (1) Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interface (API) (2) Identity verification services, namely, providing user authentication between two or more entities in the field of digital security

82.

PINGDATAGOVERNANCE

      
Application Number 192653000
Status Registered
Filing Date 2018-10-22
Registration Date 2022-05-16
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Downloadable computer software that facilitates identity federation; downloadable computer software that facilitates multi-factor authentication and strong authentication in the field of digital security and identity verification; downloadable computer software that facilitates access control for web, mobile and application programmable interface (API), all in the field of digital security and identity verification; downloadable computer software that facilitates authorization policy services authentication in the field of digital security and identity verification; downloadable computer software that facilitates directory, identity provisioning and identity administration services in the field of digital security and identity verification; downloadable computer software that facilitates identity services auditing and reporting in the field of digital security and identity verification; downloadable computer software that facilitates identity federation and access management services in the field of digital security and identity verification (1) Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interface (API) (2) Identity verification services, namely, providing user authentication between two or more entities in the field of digital security

83.

PINGINTELLIGENCE

      
Serial Number 88076420
Status Registered
Filing Date 2018-08-13
Registration Date 2021-01-19
Owner Ping Identity Corporation ()
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Downloadable computer software that facilitates identity federation; multi-factor and strong authentication; access control for web, mobile and application programmable interface (API) all of the foregoing in the field of authorization policy services; directory, identity provisioning and identity administration services; identity services auditing and reporting; and other identity and access management services in the field of digital security and identity verification; Software for API traffic security; software for API activity monitoring and attack detection and reporting; security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; software for computer network security; software for cloud-based computer security; software for monitoring computer networks; software for detecting computer network intrusion; software for monitoring and maintaining network security; computer software for use in the safeguarding of network data or network services; computer software for detecting security threat; computer software for analyzing attacker behavior within computer networks; computer software for discovering, documenting, and analyzing attacker tools and methods; computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; software for protecting computers and network services from attack; Computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; Software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; Software for implementing network packet brokers, intrusion prevention systems and network load balancers; Software for monitoring, analyzing or reporting of network information, data, and traffic

84.

Electronic identification verification methods and systems with storage of certification records to a side chain

      
Application Number 15893479
Grant Number 10498542
Status In Force
Filing Date 2018-02-09
First Publication Date 2018-08-09
Grant Date 2019-12-03
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav

Abstract

Method of certification including receiving user data at a device of a certifying entity. The method includes generating a salt that is unique. The method includes hashing the data combined with the salt to create a generated hashed data. The method includes generating a certification record based on signing the generated hashed data using a private key of the certifying entity to create a signed certification of the data. The method includes hashing the certification record. The method includes transmitting the hashed certification record to a blockchain for storing. The method includes receiving a certification tx-ID of the hashed certification record. The method includes generating a certification data block including the certification record and the certification tx-ID. The method includes storing the certification data block to a side chain.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06F 7/58 - Random or pseudo-random number generators

85.

Electronic identification verification methods and systems

      
Application Number 15890333
Grant Number 10498541
Status In Force
Filing Date 2018-02-06
First Publication Date 2018-08-09
Grant Date 2019-12-03
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Reshetnikov, Vladimir
  • Gadbois, Robert

Abstract

Method of certification including receiving user data at a certification device of a certifying entity, and receiving a registration tx-ID of the data, wherein the registration tx-ID was generated from a blockchain when receiving and storing a signed hash value of the data for registration signed using a private key of the user, wherein the hash value of the data was generated using a registration hash algorithm. The method includes generating a salt that is unique. The method includes hashing the data combined with the salt to create generated hashed data. The method includes signing the generated hashed data using a private key of the certifying entity to create a signed certification of the data. The method includes transmitting the signed certification of the data to a blockchain for storing. The method includes receiving a certification tx-ID of the signed certification of the data.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06F 7/58 - Random or pseudo-random number generators

86.

User identification management system and method

      
Application Number 15878353
Grant Number 10341123
Status In Force
Filing Date 2018-01-23
First Publication Date 2018-05-31
Grant Date 2019-07-02
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Ebrahimi, Armin
  • Weitzman, Jeff

Abstract

Systems and methods for managing the identity of a user are provided. One example includes receiving personal data identifying the user to define input data. The receiving of personal data is via an application that enables entry of said personal data for verifying the identity of the user by third parties. Then, executing a hash of the input data for generating a hash value. The method includes executing, responsive to input via a user accessible interface of the application, instructions for transmitting the hash value to a block chain over a network connection. The application is configured for receiving back from the block chain a transaction number corresponding to the hash value transmitted to the block chain. Then providing said personal data identifying the user and the transaction number to a third party for verifying the identity of the user. The third party is configured to generate a second hash value using at least part of the personal data. The third party is configured to use the transaction number to retrieve the hash value from the block chain and compare the second hash value with the hash value retrieved from the block chain. If said second hash value matches the retrieved hash value the identity of the user is considered verified by the third party.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

87.

Method, System and apparatus for synchronizing changes in a directory service

      
Application Number 15181015
Grant Number 09959286
Status In Force
Filing Date 2016-06-13
First Publication Date 2018-05-01
Grant Date 2018-05-01
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Ely, David
  • Coulbeck, Andrew
  • Thompson, Trevor
  • Snyder, James

Abstract

In a directory service, a sync request requesting changes to a dataset is received from a sync client, the sync request comprising a token, and sync requests containing tokens are sent to first and second directory servers. Changes are returned by the directory servers with tokens, and the changes are returned to the sync client with a unified token. In embodiments, the changes returned to the sync client are new to the sync client. Also disclosed is a method where a request for new changes to a dataset is received from a sync client, the request including a token, and a response that contains a token and changes that are new to the sync client is returned.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

88.

Large data transfer using visual codes with feedback confirmation

      
Application Number 15784093
Grant Number 10509932
Status In Force
Filing Date 2017-10-14
First Publication Date 2018-04-26
Grant Date 2019-12-17
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Chauhan, Bhavya

Abstract

A method of confirming receipt, including iteratively capturing by a receiving device visual codes in a series of visual codes displayed on a sending device. A corresponding captured visual code being from a display block that resulted from a partition of an original data file into display blocks, and wherein each display block is converted to a corresponding string and header including an ordered identifying display block number and a total count of the display blocks. Each corresponding string is converted to a corresponding visual code. Each of the captured visual codes is converted into a corresponding string and a header is read for the corresponding string. Captured display blocks are determined. A confirmation message is generated including information indicating which display blocks have been received. The confirmation message is sent over a wireless communication link to the sending device to reduce the number of visual codes being displayed.

IPC Classes  ?

  • G06K 17/00 - Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups , e.g. automatic card files incorporating conveying and reading operations
  • G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G09C 5/00 - Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

89.

Methods and systems for API deception environment and API traffic control and security

      
Application Number 15792850
Grant Number 10587580
Status In Force
Filing Date 2017-10-25
First Publication Date 2018-04-26
Grant Date 2020-03-10
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Angadi, Nagabhushana
  • Kumar, Ashwani
  • Sahu, Santosh
  • Poonthiruthi, Abdu Raheem
  • Sahu, Avinash Kumar
  • Kundottil, Yasar

Abstract

The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and computer program products for Application Programming Interface (API) based flow control and API based security at the application layer of the networking protocol stack. The invention additionally provides an API deception environment to protect a server backend from threats, attacks and unauthorized access.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

90.

Methods and systems for deep learning based API traffic security

      
Application Number 15793671
Grant Number 10681012
Status In Force
Filing Date 2017-10-25
First Publication Date 2018-04-26
Grant Date 2020-06-09
Owner Ping Identity Corporation (USA)
Inventor
  • Subbarayan, Udayakumar
  • Harguindeguy, Bernard
  • Gopalakrishnan, Anoop Krishnan
  • Angadi, Nagabhushana
  • Kumar, Ashwani
  • Sahu, Santosh
  • Poonthiruthi, Abdu Raheem
  • Sahu, Avinash Kumar
  • Kundottil, Yasar

Abstract

The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and computer program products for deep learning based API traffic analysis and network security. The invention provides an automated approach to threat and/or attack detection by machine learning based accumulation and/or interpretation of various API/application traffic patterns, identifying and mapping characteristics of normal traffic for each API, and thereafter identifying any deviations from the normal traffic parameter baselines, which deviations may be classified as anomalies or attacks.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06N 20/00 - Machine learning
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

91.

PINGDIRECTORY

      
Serial Number 87890296
Status Registered
Filing Date 2018-04-24
Registration Date 2020-05-19
Owner Ping Identity Corporation ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the nature of Security Assertion Markup Language (SAML), OpenID Connect (OIDC), OAuth, WS-Fed, WS-Trust, Lightweight Directory Access Protocol (LDAP), System for Cross-domain Identity Management (SCIM), Fast Identity Online (FIDO), Universal Authentication Framework (UAF), FIDO Universal 2nd Factor (U2F), Web Authentication (WebAuthn), Client-to-Authenticator Protocol (CTAP), Open Authentication (OATH) protocols for one-time password (OTP), time-based one-time password (TOTP), HMAC-based One-Time Password (HTOP), and Public Key Cryptography Standards (PKCS) in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API)

92.

PINGDATAGOVERNANCE

      
Serial Number 87983017
Status Registered
Filing Date 2018-04-24
Registration Date 2020-05-26
Owner Ping Identity Corporation ()
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Downloadable computer software that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification

93.

PINGDATAGOVERNANCE

      
Serial Number 87890307
Status Registered
Filing Date 2018-04-24
Registration Date 2023-09-05
Owner Ping Identity Corporation ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the nature of Security Assertion Markup Language (SAML), OpenID Connect (OIDC), OAuth, WS-Fed, WS-Trust, Lightweight Directory Access Protocol (LDAP), System for Cross-domain Identity Management (SCIM), Fast Identity Online (FIDO), Universal Authentication Framework (UAF), FIDO Universal 2 nd Factor (U2F), Web Authentication (WebAuthn), Client-to-Authenticator Protocol (CTAP), Open Authentication (OATH) protocols for one-time password (OTP), time-based one-time password (TOTP), HMAC-based One-Time Password (HTOP), and Public Key Cryptography Standards (PKCS) in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API)

94.

IDENTIFY

      
Application Number 1372615
Status Registered
Filing Date 2017-09-22
Registration Date 2017-09-22
Owner Ping Identity Corporation (USA)
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; arranging and conducting educational conferences.

95.

Identity management service using a blockchain providing certifying transactions between devices

      
Application Number 15640795
Grant Number 10657532
Status In Force
Filing Date 2017-07-03
First Publication Date 2017-10-19
Grant Date 2020-05-19
Owner Ping Indentity Corporation (USA)
Inventor Ebrahimi, Armin

Abstract

Logic on a first remote device receives a first transaction number and personal data transmitted from a second remote device. The first transaction number was received from a distributed public database in response to a transmission, from the second remote device, of a signed hash value and a first public key associated with a first private key on the second remote device. The signed hash value was created by signing a hash value with the first private key and the hash value was generated by hashing the personal data with a hashing algorithm on the second remote device. The logic uses the first transaction number to retrieve the signed hash value and the first public key from the distributed public database. The logic hashes the personal data using the hashing algorithm to create a generated hash value and verifies the signed hash value against the generated hash value.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04W 12/06 - Authentication
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • G06F 21/31 - User authentication
  • G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06Q 20/38 - Payment protocolsDetails thereof
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity

96.

METHODS AND APPARATUS FOR ASSESSING AUTHENTICATION RISK AND IMPLEMENTING SINGLE SIGN ON (SSO) USING A DISTRIBUTED CONSENSUS DATABASE

      
Application Number US2017025048
Publication Number 2017/173099
Status In Force
Filing Date 2017-03-30
Publication Date 2017-10-05
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Bradley, John Thomas
  • Chase, David
  • Waite, David

Abstract

In some embodiments, a method includes receiving, from a client compute device and at a server, a request to access a resource. The request can include an identifier associated with the client compute device. The method can further include accessing risk information associated with the client compute device from an instance of a distributed database at the server using the identifier. The risk information is provided to the distributed database by a set of compute devices. Each compute device from the set of compute devices implements a different instance of the distributed database. The risk information can be analyzed to identify an access decision and a level of access to the resource can be granted to the client compute device based on the access decision.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake

97.

IDENTIFY

      
Application Number 185847900
Status Registered
Filing Date 2017-09-20
Registration Date 2019-12-05
Owner Ping Identity Corporation (USA)
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

(1) Educational services, namely conducting seminars, conferences and workshops in the fields of digital security and customer, employee and partner identity management; Training services in the field of digital security and customer, employee and partner identity management; Arranging and conducting educational conferences in the fields of digital security and customer, employee and partner identity management.

98.

IDENTIVERSE

      
Application Number 1364600
Status Registered
Filing Date 2017-07-24
Registration Date 2017-07-24
Owner Ping Identity Corporation (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software that facilitates identity federation in the field of digital security and identity verification. Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; arranging and conducting educational conferences. Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation in the fields of digital security, identification, best practices, and content distribution.

99.

Method and system for authenticated login using static or dynamic codes

      
Application Number 15449902
Grant Number 10587609
Status In Force
Filing Date 2017-03-03
First Publication Date 2017-09-07
Grant Date 2020-03-10
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav
  • Reshetnikov, Vladimir
  • Gadbois, Robert

Abstract

Method of authentication including sending a login web page to a first device of a user including a scannable code having an envelope ID and a login challenge. The envelope ID generated by an identity manager is associated with a first envelope of data including a session ID. A confirmation login request is received from a second device associated with the user, and includes a second envelope of data comprising the session ID, a user ID, and a seal of the user ID registering the user ID with the identity manager. The confirmation login request to the login challenge is verified using the session ID, and the user is verified using the user ID and seal. User login is authorized upon successful verification of the login challenge and user, and a communication session having the session ID is established between the web server and the first device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/31 - User authentication
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

100.

Transferring data files using a series of visual codes

      
Application Number 15208580
Grant Number 10007826
Status In Force
Filing Date 2016-07-12
First Publication Date 2017-09-07
Grant Date 2018-06-26
Owner PING IDENTITY CORPORATION (USA)
Inventor
  • Ebrahimi, Armin
  • Khot, Gaurav

Abstract

Software on an image-capturing device iteratively captures a visual code in a series of visual codes displayed in a repeating progression on a screen of a mobile device. The visual code was generated from a display block that resulted from a partition of an original data file into a series of display blocks of at least a specified size. The software converts the visual code back into a display block and reads a header for the display block, discarding the display block if it has already been captured, as determined by the ordered identifying block number in a header. The software stops the iterative capturing when all of the display blocks in the series have been captured, as determined by the count in the header and coalesces the captured display blocks into the original data file, using an order determined by the ordered identifying block numbers.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
  1     2        Next Page