Patents Examined by Anthony Brown
  • Patent number: 9672357
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive script data, determine a checksum tree for the script data, compare each checksum of the checksum tree to one or more subtree checksums, and assign one or more classifications to the script data. In one example, the checksum tree is an abstract syntax tree.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: June 6, 2017
    Assignee: McAfee, Inc.
    Inventors: Christoph Alme, Slawa Hahn, Stefan Finke
  • Patent number: 9672349
    Abstract: A cloud service system may activate features or functionality based on agreement of at least two parties such as a system administrator and a compliance officer to mitigate compliance, security, or privacy impact on the service. The controllers may make the “enable feature” decision independently, but still have equal say in the outcome. In some examples, pre-established profiles may be provided to a controller such as a compliance officer to make decisions by selection on his/her behalf at a particular level of risk acceptance and/or to meet a particular regulatory standard/certification.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: June 6, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: David Nunez Tejerina, Arthur James Schwab, III, Paul Mattson, Erik Adams, Craig Farris
  • Patent number: 9674192
    Abstract: A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.
    Type: Grant
    Filed: June 11, 2013
    Date of Patent: June 6, 2017
    Assignee: Gigamon Inc.
    Inventors: Hung Nguyen, Jay Han Yu, Patrick Allen Riley, Hoang Nguyen Bao Nguyen
  • Patent number: 9667645
    Abstract: Described herein are methods, network devices and machine-readable media for conducting a simulated phishing attack on a first group of individuals, and performing an analysis of the group's performance to the simulated attack. In the analysis, an aggregate performance of the first group is compared with an aggregate performance of individuals from a second group. To ensure uniformity in the simulated phishing attacks, messages thereof may be constructed from template messages, the template messages having placeholders for individual-specific and company-specific information.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: May 30, 2017
    Assignee: PhishMe, Inc.
    Inventors: Rohyt Belani, Aaron Higbee, Scott Greaux
  • Patent number: 9665711
    Abstract: A first identifier associated with a first routine is received as input. A determination of whether a first list includes the first identifier is made. In response to the determination, a first action is performed in the event the first list includes the first identifier. A second action that is different from the first action is performed in the event the first list does not include the first identifier.
    Type: Grant
    Filed: December 6, 2013
    Date of Patent: May 30, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Bjorn Markus Jakobsson, Karl-Anders R. Johansson
  • Patent number: 9661010
    Abstract: Devices, methods, and systems for security log mining are described herein. One method includes combining, using a data fusion unit of an access control system, features of structured and non-structured data associated with system access events for a number of users into a combined data set, generating, using an anomaly detection engine of the access control system, a model of behavior for the number of users based on the combined data set, and comparing, using the anomaly detection engine of the access control system, real time behavior for the number of users to the model for the number of users to determine whether the real time behavior for the number of users is anomalous behavior for the number of users.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: May 23, 2017
    Assignee: Honeywell International Inc.
    Inventors: Kushagra Thakur, Chinmaya Kar, Chandrakantha Reddy, Mohammed Ibrahim Mohideen, Magesh Lingan, Adam Gibson
  • Patent number: 9660960
    Abstract: Some embodiments provide reconfigurable web application firewall (WAF) functionality across a distributed platform. Specifically, the WAF function at each distributed platform server is customizable on a per customer and per inbound message basis. When a server receives an inbound message, the server identities the content or services of which specific customer are implicated by the inbound message. The server screens the inbound message for attacks using a first set of rules and policies defined as part of a production profile from a WAF instance defined by the specific customer while contemporaneously testing the inbound message against a second set of rules and polices defined as part of an audit profile from the same WAF instance. In this manner, the specific customer tests the audit profile rules and policies while still receiving the protections of the production profile rules and policies.
    Type: Grant
    Filed: August 22, 2016
    Date of Patent: May 23, 2017
    Assignee: Verizon Digital Media Services Inc.
    Inventors: Vikas Phonsa, Hayes Kim, David Andrews
  • Patent number: 9654502
    Abstract: In one embodiment, a device (e.g., switch or registry) maintains a binding table for all internet protocol (IP) addresses in a particular subnet associated with the device, and in response to receiving a neighbor solicitation (NS) lookup message from a router for a particular address, determines whether the particular address is within the binding table. When the particular address is not within the binding table, the device causes the router to not store the particular address in a neighbor discovery (ND) cache at the router (e.g., by responding to clear the cache, or ignoring to prevent state from being created). In another embodiment, the ND-requesting router ensures that the particular address is not kept in an ND cache at the router in response to the device indicating that the particular address is not within its binding table (e.g., an explicit response to clear, or absence of instruction to store state).
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: May 16, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Pascal Thubert, Eric Levy-Abegnoli, Vincent J. Ribiere
  • Patent number: 9654491
    Abstract: An apparatus filters data received through a network and outputs the filtered data to a protection target device. The apparatus includes a processor to execute a process including: comparing the received data with a predetermined pattern and outputting a result of comparison, the predetermined pattern being one of a plurality of patterns that are given to a test device configured to estimate a behavior of the protection target device, the target device exhibiting a predetermined behavior to the predetermined pattern; and intercepting the received data when the result of comparison is a positive result that indicates intercepting the data.
    Type: Grant
    Filed: April 7, 2015
    Date of Patent: May 16, 2017
    Assignee: FUJITSU LIMITED
    Inventors: Hisashi Kojima, Masahiro Nakada
  • Patent number: 9652624
    Abstract: Methods and apparatuses for protecting content in a storage device are described. In one method, a host device obtains from the storage device first information on a controller of the storage device and second information on a memory of the storage device. The host device also obtains third information calculated based on the first information and the second information, and permits access to encrypted content stored in the storage device based on the third information. The host device is configured to receive the encrypted content from the storage device.
    Type: Grant
    Filed: February 9, 2015
    Date of Patent: May 16, 2017
    Assignee: Samsung Electronics Co., Ltd
    Inventor: Bo-Gyeong Kang
  • Patent number: 9647845
    Abstract: Disclosed is a key download and management method, comprising: a device end authenticating the validity of an RKS server by checking the digital signature of a public key of an operating certificate of the RKS server; the RKS server generating an authentication token (AT); after being encrypted with a device identity authentication public key of the device end, returning a ciphertext to the device end; after being decrypted by the device end with a device identity authentication private key thereof, encrypting the ciphertext with the public key of the operating certificate and then returning same to a key server; after being decrypted with a private key of the operating certificate, the key server contrasting whether the decrypted authentication token (AT) is the same as the generated authentication token (AT); and if so, indicating that the POS terminal of a device is valid, thereby realizing bidirectional identity authentication.
    Type: Grant
    Filed: January 24, 2014
    Date of Patent: May 9, 2017
    Assignee: Fujian LANDI Commercial Equipment Co., Ltd
    Inventors: Chengyong Yao, Rongshou Peng, Luqiang Meng
  • Patent number: 9648014
    Abstract: Methods and apparatus for establishing secure communications are disclosed. An identifier is received from a personal object such as a ring. This identifier is received, for example, through a non-contact near field communication. The identifier is recognized and associated to a mobile terminal device of a user, the mobile terminal device being separate from the object. Then, a secure communication channel is established with the mobile terminal device over another connection that preferably provides a secure communication channel.
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: May 9, 2017
    Inventor: Christopher Tobin
  • Patent number: 9646173
    Abstract: In particular embodiments, one or more computing devices associated with a third-party system generate a web page comprising one or more references configured to cause a client device to send a request to a web site of a social-networking system to access a user comment, wherein the user comment is associated with content on a third-party web site hosted by the third-party system. The request comprises a first URL that references the web site of the social-networking system, and the first URL comprises a second URL that references the third-party web site and comprises a content identifier for the content, and the request is to cause the web site of the social-networking system to access the user comment in a data store of the social-networking system. The one or more computing devices associated with the third-party system may send the web page to the client device.
    Type: Grant
    Filed: March 4, 2016
    Date of Patent: May 9, 2017
    Assignee: Facebook, Inc.
    Inventors: Ray C. He, Austin Haugen, Catherine Cissy Lee, Evan Sharp
  • Patent number: 9639685
    Abstract: Systems, apparatuses and methods may provide for receiving one or more radio frequency identifier (RFID) codes from a passive wearable device and identifying gesture input in at least one of the RFID code(s). Additionally, access to a computing system may be granted if the gesture input corresponds to a known gesture. In one example, identifying the gesture input includes detecting a change in at least one of the RFID code(s) and the detected change is compared to an expected change associated with the known gesture.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: May 2, 2017
    Assignee: Intel Corporation
    Inventor: Glen J. Anderson
  • Patent number: 9635005
    Abstract: Systems and methods for tiered connection pooling are disclosed herein.
    Type: Grant
    Filed: July 18, 2014
    Date of Patent: April 25, 2017
    Assignee: DOCUMENT STORAGE SYSTEMS, INC.
    Inventor: Ralph Katieb
  • Patent number: 9633185
    Abstract: A method of debugging a device which includes a plurality of processors is provided. The method includes verifying a request to initiate authentication that is provided to the device to a user; performing a challenge-response authentication operation between the user and the device in response to the request to initiate authentication being a request from a non-malicious user; activating or deactivating an access to a Joint Test Action Group (JTAG) port of each of the processors, based on access control information from the user; and permitting a debugging operation via an access that is activated.
    Type: Grant
    Filed: December 1, 2014
    Date of Patent: April 25, 2017
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jonghoon Shin, KyoungMoon Ahn, Mijung Noh, Yong Ki Lee, Sun-Soo Shin
  • Patent number: 9628488
    Abstract: According to an embodiment of the present invention, a system and method for transmitting sensitive data in a contact center environment comprising a transient datastore containing data, for each customer, defining a customer's profile including historical interactions with a host entity and account information, the customer profile containing sensitive and non-sensitive data; a computer processor, coupled to the computer store and programmed to: generate, using a computer processor, a transient key associated with a subset of data for the customer based on the current interaction data and a customer identity; transmit, using a computer processor, the transient key and non-sensitive data to the live agent; receive a request, the transient key and a requester identifier from a requesting component of the system, and identify a corresponding subset of data responsive to the transient key and the requester identifier.
    Type: Grant
    Filed: April 8, 2015
    Date of Patent: April 18, 2017
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Prashant Desai, Bryant R. Barrera
  • Patent number: 9628571
    Abstract: A method of identifying an action of a policy in association with communications between a client and one or more servers includes determining, by an intermediary, a policy action based on using a callout based policy. In one aspect, an intermediary receives communications between a client and one or more servers. The intermediary identifies a policy for the communications, the policy specifying a request and a server to communicate the request. Responsive to the policy, the intermediary transmits the request to the server. Based on the server response to the request, the intermediary determines an action of the policy. In another aspect, a system for the present method includes a an intermediary and a policy engine for identifying a policy to specify a request and a destination server. Responsive to a server response to the request, the intermediary determines an action of the policy.
    Type: Grant
    Filed: August 15, 2014
    Date of Patent: April 18, 2017
    Assignee: CITRIX SYSTEMS, INC.
    Inventors: Prakash Khemani, Anil Kumar
  • Patent number: 9621354
    Abstract: One embodiment of the present invention provides a system for delivering a content piece over a network using a set of reconstructable objects. During operation, the system obtains a metadata file that includes a set of rules; generates the set of reconstructable objects for the content piece based on the set of rules included in the metadata file; cryptographically signs the set of reconstructable objects to obtain a set of signed reconstructable objects; and delivers, over the network, the set of signed reconstructable objects along with the metadata file to a recipient, thereby enabling the recipient to extract and store a copy of the content piece and then to reconstruct the set of signed reconstructable objects from the stored copy of the content piece and the metadata file.
    Type: Grant
    Filed: July 17, 2014
    Date of Patent: April 11, 2017
    Assignee: CISCO SYSTEMS, INC.
    Inventor: Marc E. Mosko
  • Patent number: 9614719
    Abstract: A method for ensuring reliable communication between a security software client and cloud includes detecting whether communication between the security software client and the cloud is abnormal; determining whether network configuration is abnormal if the communication between the security software client and the cloud is abnormal; restoring the network configuration into default network configuration if the network configuration is abnormal, wherein the default network configuration is system configuration used when the communication between the security software client and the cloud is normal; determining whether the communication between the security software client and the cloud is abnormal after the network configuration is restored into the default network configuration; and prompting a user that the communication between the security software client and the cloud is abnormal if the communication between the security software client and the cloud is abnormal after the network configuration is restored i
    Type: Grant
    Filed: April 23, 2015
    Date of Patent: April 4, 2017
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Shuai Rao, Zixiao Nie