Patents Examined by Courtney Fields
-
Patent number: 9838525Abstract: A non-transitory computer-readable medium having code stored thereon, the code includes instructions to receive an indication to communicatively couple a utility meter to an auxiliary device via a mobile electronic device, and capture a visual representation of a unique identifier of the utility meter via the mobile electronic device. The unique identifier includes an authentication mechanism configured to establish a first authentication and a second authentication of a user of the mobile electronic device. The code includes instructions to receive an acknowledgement to communicatively couple the mobile electronic device to the utility meter when the first authentication and the second authentication are satisfied.Type: GrantFiled: January 3, 2014Date of Patent: December 5, 2017Assignee: General Electric CompanyInventors: Steven Lee Bietz, Jesus Acosta-Cazaubon, Christopher Hett
-
Patent number: 9832181Abstract: A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple external systems that communicate with the social networking system to access information about the users of the social networking system. Login status of the user account on the social networking system is maintained. If the login status of the user account on the social networking system indicates that the user is not logged in, the user is required to provide authentication information. If the login status of the user account indicates that the user is logged in, social network information is provided to the user via an external system, subject to the privacy settings of users of the social networking system. If the user logs out from an external system, the user is also logged out from the social networking system.Type: GrantFiled: March 9, 2016Date of Patent: November 28, 2017Assignee: Facebook, Inc.Inventors: Michael Steven Vernal, Wei Zhu, James M. Leszczenski, Joshua E. Elman, David Brookes Morin, Charles Duplain Cheever, Ruchi Sanghvi
-
Patent number: 9819690Abstract: Technologies are generally described for methods and systems effective to generate an alert in a data center. In some examples, a device may detect an execution of a virtual machine in the data center. The device may also analyze traffic data at a port that may be in the data center. The traffic data may be associated with a communication from the virtual machine to a destination address through the port. The device may also compare the destination address with a data center address of the data center. The device may also generate the alert based on the comparison.Type: GrantFiled: October 30, 2014Date of Patent: November 14, 2017Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventors: Guang Yao, Shijie Xu, Qi Li, Xuefeng Song
-
Patent number: 9819942Abstract: The present invention discloses an encoding apparatus using a Discrete Cosine Transform (DCT) scanning, which includes a mode selection means for selecting an optimal mode for intra prediction; an intra prediction means for performing intra prediction onto video inputted based on the mode selected in the mode selection means; a DCT and quantization means for performing DCT and quantization onto residual coefficients of a block outputted from the intra prediction means; and an entropy encoding means for performing entropy encoding onto DCT coefficients acquired from the DCT and quantization by using a scanning mode decided based on pixel similarity of the residual coefficients.Type: GrantFiled: August 11, 2015Date of Patent: November 14, 2017Assignees: Electronics and Telecommunications Research Institute, Kwangwoon University Research Institute For Industry Cooperation, Industry-Academic Cooperation Group of Sejong UniversityInventors: Se-Yoon Jeong, Hae-Chul Choi, Jeong-Il Seo, Seung-Kwon Beack, In-Seon Jang, Jae-Gon Kim, Kyung-Ae Moon, Dae-Young Jang, Jin-Woo Hong, Jin-Woong Kim, Yung-Lyul Lee, Dong-Gyu Sim, Seoung-Jun Oh, Chang-Beom Ahn, Dae-Yeon Kim, Dong-Kyun Kim
-
Patent number: 9805184Abstract: A method of unlocking an electronic device based on motion recognitions generates motion information by detecting a user's motion, calculates optical flows based on the motion information, converts the optical flows into a code by sorting and grouping the optical flows based on predetermined reference directions, generates a comparison result indicating whether the code is consistent with a predetermined password by comparing the code with the predetermined password, and determines whether to unlock the electronic device based on the comparison result.Type: GrantFiled: March 3, 2015Date of Patent: October 31, 2017Assignee: Samsung Electronics Co., Ltd.Inventors: Kwang-Hyuk Bae, Kyu-Min Kyung, Tae-Chan Kim, Seong-Yeong Jeong, Shung-Han Cho
-
Patent number: 9800557Abstract: Embodiments relate to operating a data processing system. An aspect includes receiving a request for data storage by an application server, said request comprising restricted-access data. Another aspect includes processing the request in the first application server thereby extracting said restricted-access data from the request. Another aspect includes encrypting said restricted-access data with a cryptographic key associated with said privacy regime to a cipher representation. Another aspect includes defining a masking rule relative to the field designated for storage of the cipher representation, the masking rule defining a set of privacy regimes applicable to processing of the restricted-access data. Another aspect includes forwarding the cipher representation and the masking rule to the shared database by a database client.Type: GrantFiled: March 3, 2015Date of Patent: October 24, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Albert Maier, Volker Seemann, Johannes Schuetzner
-
Patent number: 9787621Abstract: An identification message is sent from a sensor apparatus, over a wireless communication network, in response to a trigger event sensed by a sensor device in the sensor apparatus. The identification message includes a unique identifier of the sensor apparatus. The identification message is received at a network server. A pre-configured action profile associated with the unique identifier in the received identification message is accessed by the network server. A response action is caused to be executed based on information in the accessed action profile. The sensor apparatus is paired to a subscriber account before first use, thereby allowing secure initialization.Type: GrantFiled: May 15, 2014Date of Patent: October 10, 2017Assignee: The Button Corporation OyInventors: Juuso Pesola, Jari Leminen, Sami Pönkänen, Harri Rautio, Erkki Heilakka
-
Patent number: 9773128Abstract: Cryptographic techniques for encrypting images, and decrypting and reconstructing images, are provided to facilitate preventing unauthorized access to images. A holographic cryptographic component (HCC) can generate a global image comprising a scaled version of a source image and random content, generate a phase hologram representing the global image, and encrypt the phase hologram to generate an encrypted hologram based on a random phase mask, which can be the private encryption key. To reconstruct the source image, an HCC can overlay a phase mask, which can be a conjugate of the random phase mask, on the encrypted hologram to decrypt it, and can illuminate the decrypted hologram with a coherent light source. The source image is only reconstructed properly if the correct phase mask is used. If HCC applies the encryption process repetitively to the same source image, HCC can generate a different encrypted hologram in each run.Type: GrantFiled: October 16, 2014Date of Patent: September 26, 2017Assignee: CITY UNIVERSITY OF HONG KONGInventor: Peter Wai Ming Tsang
-
Patent number: 9762657Abstract: Embodiments of the present invention provide a system, method and computer program product for authenticating a mobile application. According to one embodiment the method comprises registering, by a computer processor of a computer system, the mobile application, wherein the registration includes receiving and storing information associated with the mobile application, receiving, by the computer processor, one or more application details associated with the mobile application from a computing device, comparing, by the computer processor, the received one or more application details associated with the mobile application with the stored information associated with the mobile application, generating, by the computer processor, a notification based on the comparison to indicate authenticity of the mobile application and sending the notification to the computing device.Type: GrantFiled: June 17, 2014Date of Patent: September 12, 2017Assignee: International Business Machines CorporationInventors: Venkata R. Jagana, Alwyn R. Lobo, Gopinath Rajagopal, Parvatina Rambabu
-
Patent number: 9740726Abstract: The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updates, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period.Type: GrantFiled: March 2, 2015Date of Patent: August 22, 2017Assignee: Infosys LimitedInventors: Sravan R, Mithun Paul, Ashutosh Saxena
-
Patent number: 9740870Abstract: An access control technology is described. Ownership control information is stored for an object in a computing system. Access control to objects in the computing system is based in part on accounts having ownership control of objects in the computing system. A first account with ownership control of the object is identified. Ownership control of the object is changed to a second account upon detection of a first security event. Ownership control of the object is restored to the first account upon detection of a second security event using the stored ownership control information.Type: GrantFiled: December 5, 2013Date of Patent: August 22, 2017Assignee: Amazon Technologies, Inc.Inventor: Isaac Jeremy Shepard
-
Patent number: 9736484Abstract: The present invention discloses an encoding apparatus using a Discrete Cosine Transform (DCT) scanning, which includes a mode selection means for selecting an optimal mode for intra prediction; an intra prediction means for performing intra prediction onto video inputted based on the mode selected in the mode selection means; a DCT and quantization means for performing DCT and quantization onto residual coefficients of a block outputted from the intra prediction means; and an entropy encoding means for performing entropy encoding onto DCT coefficients acquired from the DCT and quantization by using a scanning mode decided based on pixel similarity of the residual coefficients.Type: GrantFiled: August 11, 2015Date of Patent: August 15, 2017Assignees: Electronics and Telecommunications Research Institute, Kwangwoon University Research Institute For Industry Cooperation, Industry-Academia Cooperation Group of Sejong UniversityInventors: Se-Yoon Jeong, Hae-Chul Choi, Jeong-Il Seo, Seung-Kwon Beack, In-Seon Jang, Jae-Gon Kim, Kyung-Ae Moon, Dae-Young Jang, Jin-Woo Hong, Jin-Woong Kim, Yung-Lyul Lee, Dong-Gyu Sim, Seoung-Jun Oh, Chang-Beom Ahn, Dae-Yeon Kim, Dong-Kyun Kim
-
Patent number: 9736168Abstract: In accordance with embodiments, there are provided mechanisms and methods for security verification of communications to tenants of an on-demand database service. These mechanisms and methods for security verification of communications to tenants of an on-demand database service can enable embodiments to allow tenants to selectively implement security measures with respect to inbound communications, etc. The ability of embodiments to provide such feature may allow tenants to efficiently and effectively implement security measures for in-bound emails.Type: GrantFiled: May 13, 2015Date of Patent: August 15, 2017Assignee: salesforce.com, inc.Inventors: Michael P. Cadden, Richard Alan Stevens, Ron H. Kimble, Rasmus Mencke, Travis D. Corson, Susan Carol Shanabrook
-
Patent number: 9733808Abstract: The aspects of the present disclosure allow an extremely simple way to interact with e.g. various Internet and mobile telecommunications related services, for example by a single button press. An identification message is sent from a sensor apparatus, over a wireless communication network, in response to a trigger event sensed by a sensor device comprised in the sensor apparatus. The identification message includes a unique identifier of the sensor apparatus. The identification message is received at a network server. A pre-configured action profile associated with the unique identifier in the received identification message is accessed by the network server. A response action is caused to be executed based on information in the accessed action profile.Type: GrantFiled: May 15, 2014Date of Patent: August 15, 2017Assignee: The Button Corporation OyInventors: Juuso Pesola, Jari Leminen, Sami Pönkänen, Harri Rautio, Erkki Heilakka
-
Patent number: 9730057Abstract: A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according to the BES, receiving a current group access data comprising a current group access key, and in a stage of accessing broadcast data, using the current group access data to access the broadcast data, and in a stage of renewing the current group access key, sending a first group message comprising at lease a next group access key encrypted so that only non-revoked decoders can access it, said group message being further encrypted by the current group access key, updating the current group access key with the next group access key.Type: GrantFiled: June 26, 2015Date of Patent: August 8, 2017Assignee: NAGRAVISION S.A.Inventors: Guy Moreillon, Alexandre Karlov
-
Patent number: 9703953Abstract: Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. An end-user device interacts and communicates with a server of a computerized server (a banking website, an electronic commerce website, or the like). The interactions are monitored, tracked and logged. User Interface (UI) interferences or irregularities are introduced; and the server tracks the response or the reaction of the end-user to such interferences. The system determines whether the user is a legitimate user, or a cyber-attacker or automated script posing as the legitimate user. The system utilizes classification of users into classes or groups, to deduce or predict how a group-member would behave when accessing the service through a different type of device. The system identifies user-specific traits that are platform-independent and thus can be further monitored when the user switches from a first platform to a second platform.Type: GrantFiled: April 1, 2015Date of Patent: July 11, 2017Assignee: BioCatch Ltd.Inventors: Avi Turgeman, Uri Rivner
-
Patent number: 9680651Abstract: Apparatus and method for secure data shredding in an imperfect data storage device. In some embodiments, a hash function is applied to multi-bit random sequence to generate an output hash. A combinatorial logic function logically combines the output hash with a secret to provide an output value. The random string is processed into a plurality of secret shares which are stored in a first location in a non-volatile memory and the output value is stored in a different, second location of the memory. The secret is subsequently shredded by applying an erasure operation upon the secret shares in the first location of the memory.Type: GrantFiled: October 27, 2014Date of Patent: June 13, 2017Assignee: Seagate Technology LLCInventor: William Erik Anderson
-
Patent number: 9672375Abstract: A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user interface device in communication with a computer by physical manipulation of the key article. Access to digital content via the computer may be unlocked in response to receiving the signal. In addition, a key may be represented by a pattern of unreadable errors in a computer-readable medium.Type: GrantFiled: January 30, 2015Date of Patent: June 6, 2017Inventor: Gary Stephen Shuster
-
Patent number: 9646355Abstract: Electronic signatures are authenticated utilizing near field communication (NFC) devices as proof of identity. An identification service collects an identification of a NFC device associated with a signer of a contract. The identification may be utilized as an access control mechanism that enables the signer to receive, view, or sign the contract. An electronic signature associated with the signer is received. The identification of the NFC device and the electronic signature of the signer are recorded in the contract and/or audit information associated with the contract.Type: GrantFiled: March 18, 2014Date of Patent: May 9, 2017Assignee: Adobe Systems IncorporatedInventor: Benjamin David Follis
-
Patent number: 9639449Abstract: An error detection device and method for a programming language is provided, the device including a program preparation unit configured to prepare a program by using a programming language, a logic converter configured to convert the prepared program to a sequence, a hash code calculator configured to detect a same logic relative to a sequence by dividing the converted sequence to a minimum unit of a plurality of program languages, calculating each hash code by the divided minimum unit of the plurality of program languages and comparing each calculated hash code, and an LCS (Longest Common Subsequence) calculator calculating an LCS relative to the sequence divided by the minimum unit of the plurality of program languages, and detecting a similar logic relative to the sequence by applying the calculated LCS to an LCS algorithm.Type: GrantFiled: August 19, 2013Date of Patent: May 2, 2017Assignee: LSIS CO., LTD.Inventor: Sang Hun Lee