Patents Examined by Courtney Fields
  • Patent number: 10122724
    Abstract: Concepts and technologies disclosed herein are for detecting and managing unauthorized use of cloud computing services from within an internal network of a business or other organization. A computer system may be configured to identify a plurality of Web resources that have been accessed by computing devices from within the internal network. The computer system may also be configured to obtain Internet protocol (“IP”) information from a network component of the internal network. The IP information may be used to determine whether each of the plurality of Web resources is a cloud computing service resource. The computer system may also be configured to block access to a cloud computing service resource of the plurality of Web resources upon determining that the IP information identifies the cloud computing service resource as being unauthorized.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: November 6, 2018
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Flemming Elleboe, Luis Francisco Albisu, Joseph Bentfield, Janet Kerns, Jonathan Sheriffs
  • Patent number: 10089627
    Abstract: A method for securing data and safeguarding its origin, in which the data are transmitted from a customer device to a center in an encrypted manner using digital keys and certificates. The encryption includes the steps of generating several key pairs at a center and transmitting keys, key-encrypted keys, and encrypted data to a customer device. The customer device is afterwards able to transmit data encrypted by a safe key to the center. The data may be a PIN code.
    Type: Grant
    Filed: January 28, 2013
    Date of Patent: October 2, 2018
    Assignee: FINALOGIC BUSINESS TECHNOLOGIES GmbH
    Inventors: Heinrich Beidl, Erwin Hrdy, Julius Schauerhuber
  • Patent number: 10078744
    Abstract: A portable device is provided. The portable device may include a display; an input device; a camera; a processor coupled to the display, the input device, and the camera; and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor, to implement a method comprising: receiving authentication data from the input device, determining whether the received authentication data matches authentication data associated with an authorized user, and displaying, on the display, a credential, an item, and data associated with the item.
    Type: Grant
    Filed: March 2, 2016
    Date of Patent: September 18, 2018
    Assignee: Visa International Service Association
    Inventor: Duane Matthew Cash
  • Patent number: 10075460
    Abstract: Any system with an interface may be attacked by a bad actor. If that interface is exposed to a network, the bad actor may launch a remote attack or cause other systems to attack the system. Many attacks exploit vulnerabilities that are unknown to the system operators (e.g., zero-day attacks). Power grid components, such as electricity meters, are increasingly networked and, therefore, increasingly attacked. By determining a pattern of behavior for a meter and then looking for a variation of the pattern, an attack may be identified. Once an attack is discovered, countermeasures may be launched to restore the system to normal operations, harden the system against future attack, and/or retaliate against the attacker.
    Type: Grant
    Filed: October 16, 2014
    Date of Patent: September 11, 2018
    Assignee: REMTCS INC.
    Inventors: Richard E. Malinowski, Tommy Xaypanya
  • Patent number: 10063546
    Abstract: A network access control method and apparatus. The network access control method includes configuring network access permission of a first application, where the network access permission includes allowing the first application to access a network resource using a first type of network access point, and the first type of network access point includes at least one first network access point, accessing a second network access point, where the second network access point belongs to the first type of network access point, and when the first application is running, allowing the first application to access the network resource using the second network access point, and when a third network access point is accessed, and when the third network access point does not belong to the first type of network access point, prohibiting the first application from accessing the network resource using the third network access point.
    Type: Grant
    Filed: November 13, 2014
    Date of Patent: August 28, 2018
    Assignee: HUAWEI DEVICE (DONGGUAN) CO., LTD.
    Inventors: Xi Huang, Yongfeng Tu, Huangwei Wu
  • Patent number: 10027628
    Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: July 17, 2018
    Assignee: Shape Security, Inc.
    Inventor: Justin Call
  • Patent number: 9998485
    Abstract: Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, and provide results of the automated analysis in an optimized way to an analyst. The automated analysis of the clustered data structures (also referred to herein as data clusters) may include an automated application of various criteria or rules so as to generate a compact, human-readable analysis of the data clusters. The human-readable analyses (also referred to herein as “summaries” or “conclusions”) of the data clusters may be organized into an interactive user interface so as to enable an analyst to quickly navigate among information associated with various data clusters and efficiently evaluate those data clusters in the context of, for example, a fraud investigation. Embodiments of the present disclosure also relate to automated scoring of the clustered data structures.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: June 12, 2018
    Assignee: PALANTIR TECHNOLOGIES, INC.
    Inventors: David Cohen, Jason Ma, Bing Jie Fu, Ilya Nepomnyashchiy, Steven Berler, Alex Smaliy, Jack Grossman, James Thompson, Julia Boortz, Matthew Sprague, Parvathy Menon, Michael Kross, Michael Harris, Adam Borochoff
  • Patent number: 9977914
    Abstract: An electronic device. The electronic device comprises a memory comprising a confidential information region and a non-confidential information region, a processor, and an application stored in the memory. When executed by the processor, the application determines if a reboot has occurred after a most recent power-off boot, where a reboot takes place without removing power from the processor and memory and, in response to determining that the reboot occurred after the most recent power-off boot, prevents access of applications to the confidential information region in the memory.
    Type: Grant
    Filed: February 25, 2016
    Date of Patent: May 22, 2018
    Assignee: Sprint Communications Company L.P.
    Inventors: Lyle W. Paczkowski, William M. Parsel, Carl J. Persson, Matthew C. Schlesener
  • Patent number: 9973514
    Abstract: An invention relates to method and apparatus of a location assurance system and particularly, although not exclusively, the present invention also relates to method and apparatus for assuring location data integrity with minimum location disclosure. The present invention also relates to method and apparatus for assuring location data integrity with minimum location disclosure with protocols to authenticate both spatial and spatio-temporal predicates.
    Type: Grant
    Filed: October 26, 2015
    Date of Patent: May 15, 2018
    Assignee: Hong Kong Baptist University
    Inventors: Haibo Hu, Qian Chen, Jianliang Xu
  • Patent number: 9967157
    Abstract: Media content is provided using metric-apportioning. In accordance with one or more embodiments, remote-user interface circuits are authenticated and remote access is provided to different sets of media content via the interface. For each authenticated interface and a time-based period during which the interface accesses the media content, time-stamped usage data that characterizes use of the media content at the interface is communicated therewith. A usage metric characterizing usage of the media content is apportioned based upon the time-stamped usage data and stored weighting factor data for the media content.
    Type: Grant
    Filed: February 10, 2016
    Date of Patent: May 8, 2018
    Assignee: Next Issue Media
    Inventors: Keith Barraclough, David Irvine, Melanie Larson, Morgan P. Guenther, Gerri Johnson
  • Patent number: 9965401
    Abstract: A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level obfuscating technique on the first obfuscated code. In particular, the code may be a software code or a software module. Furthermore, the first level obfuscating technique and the second obfuscating may be different. In particular, the second level obfuscating technique may perform a deobfuscation.
    Type: Grant
    Filed: October 8, 2016
    Date of Patent: May 8, 2018
    Assignee: NXP B.V.
    Inventors: Philippe Teuwen, Ventzislav Nikov
  • Patent number: 9965606
    Abstract: Embodiments are directed to systems, methods and computer program products for providing user authentication based on historical user patterns. Embodiments of the present invention may be configured to communicate code executable by a computing device that causes the computing device to monitor user patterns of a user based on the user interacting with the computing device; receive baseline user patterns to identify the user; identify, from the baseline user patterns, one or more routine actions performed by the user operating the computing device; receive a request to perform a transaction, wherein the transaction is associated with a level of security that must be authenticated; receive identification user patterns of the user based on the user interacting with the computing device; determine a threshold score based on comparing the identification user patterns with the baseline user patterns; and alter the level of security.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: May 8, 2018
    Assignee: Bank of America Corporation
    Inventors: Elizabeth S. Votaw, Alicia C. Jones-McFadden, David M. Grigg, Peter John Bertanzetti, Michael E. Toth, Carrie Anne Hanson
  • Patent number: 9965937
    Abstract: Embodiments of the present disclosure relate to a data analysis system that may automatically generate memory-efficient clustered data structures, automatically analyze those clustered data structures, and provide results of the automated analysis in an optimized way to an analyst. The automated analysis of the clustered data structures (also referred to herein as data clusters) may include an automated application of various criteria or rules so as to generate a compact, human-readable analysis of the data clusters. The human-readable analyzes (also referred to herein as “summaries” or “conclusions”) of the data clusters may be organized into an interactive user interface so as to enable an analyst to quickly navigate among information associated with various data clusters and efficiently evaluate those data clusters in the context of, for example, a fraud investigation. Embodiments of the present disclosure also relate to automated scoring of the clustered data structures.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: May 8, 2018
    Assignee: Palantir Technologies Inc.
    Inventors: David Cohen, Jason Ma, Bing Jie Fu, Ilya Nepomnyashchiy, Steven Berler, Alex Smaliy, Jack Grossman, James Thompson, Julia Boortz, Matthew Sprague, Parvathy Menon, Michael Kross, Michael Harris, Adam Borochoff
  • Patent number: 9942214
    Abstract: A computer-facilitated service receives a request, from a user client, to access a site provided by the service. The service may obtain, from the request, identifying information, which may be used to identify prior activity of the user client. This prior activity is used to determine whether the user client is to be provided with an interstitial user interface component, which may be configured to cause the user client to provide additional information about the client and to be successfully completable by an automated agent or other automated process. If an interstitial user interface component is provided, the service may receive, from the user client, this additional information, which may be used to determine whether the user client is using an automated agent to access the site.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: April 10, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Alexandru Burciu, Blair Livingstone Hotchkies, Valeriu Palos, Gabriel-Valeriu Rizuc, Sorin Alin Stoiana, Elena Zlavog
  • Patent number: 9930026
    Abstract: The disclosure generally describes computer-implemented methods, software, and systems, including a method for decryption of data stored in the cloud. A record is received from a cloud storage solution, wherein at least one data field in the received record is encrypted, and wherein each encrypted data field is associated with an encrypted field identifier. A client certification key associated with a user accessing the record and at least one encrypted field identifier are provided to a security server. At least one decryption key associated with at least one of the at least one encrypted field identifier is received. Using each of received decryption key, at least one encrypted data field is decrypted. The received record is presented to the user accessing the record.
    Type: Grant
    Filed: October 20, 2014
    Date of Patent: March 27, 2018
    Assignee: SAP SE
    Inventor: Itzhak Shoshan
  • Patent number: 9900149
    Abstract: A method of improving the efficiency of an encryption/decryption process implementing the NIST FIPS 197 standard which includes a substitution box (S-box) and an inverse substitution (inverse S-box), comprises concatenating the S-box and inverse S-box to form a combined lookup table, and folding the concatenated table to generate a folded lookup table. The folded lookup table may be indexed for an encryption operation and for a decryption operation using a signal indicative of whether encryption or decryption is used.
    Type: Grant
    Filed: August 14, 2014
    Date of Patent: February 20, 2018
    Assignee: Synopsys, Inc.
    Inventors: A. A. Jithra Adikari, Michael Borza
  • Patent number: 9894048
    Abstract: Communications methods and appliances are described. According to one embodiment, a communications method includes prior to deployment of an appliance, establishing a trusted association between the appliance and a certificate authority, during deployment of the appliance, associating the appliance with a communications address of a communications medium, using the certificate authority, creating a signed certificate including the communications address of the appliance, announcing the signed certificate using the appliance, after the announcing, extracting the communications address of the appliance from the signed certificate, and after the extracting, verifying the communications address of the appliance.
    Type: Grant
    Filed: February 7, 2013
    Date of Patent: February 13, 2018
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Rajesh K Shenoy, Keith E Moore
  • Patent number: 9892240
    Abstract: A system and method for providing content consumption data to users in a multi-device environment. Activity data from a plurality of UE devices associated with a subscriber account are obtained when one or more users tied to the subscriber account consume content on one or more UE devices. The activity data may be correlated with one or more pieces of information relating to the consumed content. When a journal request is received from a user operating a UE device associated with the subscriber account, a response is generated containing data for presentation in a journal format that includes correlated subscriber activity data for the subscriber account over a select period of time.
    Type: Grant
    Filed: April 1, 2015
    Date of Patent: February 13, 2018
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventor: Nicolas Pintaux
  • Patent number: 9886580
    Abstract: A method and information handling system (IHS) that optimizes boot time. The method includes a basic input output system (BIOS) performing an authentication check of drivers during an initial boot process. The results of the authentication check are stored along with an unified extensible firmware interface (UEFI) image for each driver in an authentication results data structure (ARDS). In response to receipt of a subsequent request to enable a secure boot of the IHS, when the initial boot process was performed with the secure boot disabled, the ARDS is accessed to determine if any of the drivers failed the authentication check. When none of the drivers have failed the authentication check, the boot process is continued using the UEFI images of the drivers. When at least one of the drivers has failed its authentication check, a notification is output indicating a failure of the authentication check.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: February 6, 2018
    Assignee: Dell Products, L.P.
    Inventors: Sundar Dasar, Yogesh P. Kulkarni, Sumanth Vidyadhara, Bill Munger, Raghavendra Venkataramudu
  • Patent number: 9847872
    Abstract: Systems and methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in memory. In addition, a determination may be made as to whether the unencrypted data includes a random distribution of the plurality of bits. An integrity action may be implemented, for example, when the unencrypted data includes a random distribution of the plurality of bits.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: December 19, 2017
    Assignee: Intel Corporation
    Inventors: David M. Durham, Men Long