Patents Examined by Eric W Shepperd
-
Patent number: 10972276Abstract: Aspects define a union mixed secure virtual machine image to include an encrypted code virtualization machine for code machine instructions of a first retrieved package; and an unsecure virtualization hypervisor that includes a non-encrypted code virtualization machine for code machine instructions of a second retrieved package and a non-encrypted data storage device.Type: GrantFiled: August 9, 2019Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventors: Juscelino Candido De Lima Junior, Breno H. Leitao, Fabio M. Tanada
-
Patent number: 10958639Abstract: Systems for providing secure access to systems are provided. A computing device may receive a request to access functionality which may include login credentials of a user. Upon receiving the request to access functionality, the computing device may execute a scan of an area surrounding the computing device to detect any wearable devices within proximity of the computing device that are linked to the computing device. The authenticating information and, in some examples, detected, linked wearable device, may be validated. Based on the validation, authentication response data may be generated and transmitted to an authentication computing platform which may cause the authentication computing platform to validate the authentication response data and cause the computing device to connect to a client interface computing platform.Type: GrantFiled: February 27, 2018Date of Patent: March 23, 2021Assignee: Bank of America CorporationInventors: Michael Toth, Hitesh Shah
-
Patent number: 10958657Abstract: A computer system receives a first information detailing a TLS fingerprint. A computer system determines an amount of bad transactions associated with the TLS fingerprint, wherein a bad transaction is a transaction involved in one or more fraudulent activities. The computer system determines whether the amount of bad transactions associated with the TLS fingerprint exceeds a threshold amount.Type: GrantFiled: June 25, 2019Date of Patent: March 23, 2021Assignee: PayPal, Inc.Inventors: Yuval Arie Bercovich, Ido Kantor, Maayan Liat Zohar, Elad Bichman, Zahid Nasiruddin Shaikh
-
Patent number: 10951600Abstract: Various systems and methods for domain authentication are described herein. In an example, the method may include detecting a domain from a request of a tenant for access to a farm. The method may also include identifying a presence of a site ID from a database of the farm based on the domain. The method may also include sending an authentication request to a default site or a custom site, the authentication request managed through a site manager based on the identified presence of the site ID in the database of the farm. The method may also include routing traffic from the tenant to the farm in response to satisfaction of the authentication request.Type: GrantFiled: May 8, 2017Date of Patent: March 16, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Kalyan K. Kona, Patrick J. Simek, Le Chang, Roshane Silva, Prashant Gaurav
-
Patent number: 10938788Abstract: Some embodiments provide a method for configuring a gateway datapath that processes data messages between a logical network implemented in a datacenter and an external network. The method receives configuration data including security policy rules for a logical router implemented by the datapath that indicate whether to apply a security protocol to certain data messages transmitted from a particular interface of the logical router. The method identifies a particular security policy rule that applies to data messages that (i) have a destination address in a set of destination addresses and (ii) meet at least one additional criteria. The method generates a static route, for a routing table used by the datapath to implement the logical router, that routes data messages with destination addresses in the set of destination addresses to the particular interface. The datapath applies the security policy rules for data messages transmitted from the particular interface.Type: GrantFiled: December 12, 2018Date of Patent: March 2, 2021Assignee: VMWARE, INC.Inventors: Yong Wang, Xinhua Hong, David J. Leroy, Kai-Wei Fan
-
Patent number: 10938806Abstract: The present disclosure provides a communication method and device. The method includes that: when an instruction for instructing transmitting user data via a direct communication connection is received, user verification information is acquired, the user verification information including verification data input through a first terminal; the user verification information is sent to a second terminal; when verification success information is received from the second terminal, a first direct communication connection is established with the second terminal; and the user data is sent to the second terminal via the first direct communication connection.Type: GrantFiled: November 13, 2017Date of Patent: March 2, 2021Assignee: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.Inventor: Haiquan Li
-
Patent number: 10931453Abstract: Authentication of tokens and associated are used to provide a just-in-time key synchronization for user access to a service in a cloud computing environment which includes a plurality of availability zones with an identity service, a storage system, and a keystore. The encryption keys are distributed by the storage system based on a user access request containing a token with a payload and a current user cryptographic key. The token is then sent to the keystore to authenticate the user. The keystore authenticates the user and sends the token with the current cryptographic key to the storage system. The storage system receives the token with the current cryptographic key and grants access to the user for the service.Type: GrantFiled: March 5, 2018Date of Patent: February 23, 2021Assignee: International Business Machines CorporationInventors: Fernando J. Diaz, Shawn P. Mullen, Michael Perng, Karen Mariela Siles, Elvin Dalipe Tubillara
-
Patent number: 10924480Abstract: In one embodiment, an IoT server includes: processing circuitry, an I/O module operative to communicate with at least an IoT device and a vendor network server, and an onboarding application and operative to at least: receive an onboarding request from the IoT device via the I/O module, send a confirmation request to the vendor network server via the I/O module, where the confirmation request indicates a request to confirm an identity of the IoT device according to a connection to a network device authenticated by the vendor network server, receive a confirmation response from the vendor network server via the I/O module, where the confirmation response indicates whether the IoT device is connected to the network device, and if the confirmation response is a positive confirmation response that indicates that the IoT device is connected to the network device, onboard the IoT device for participation in an IoT-based system.Type: GrantFiled: February 28, 2018Date of Patent: February 16, 2021Assignee: Cisco Technology, Inc.Inventors: Santosh Ramrao Patil, Gangadharan Byju Pularikkal, Sourav Chakraborty, Madhusudan Nanjanagud
-
Patent number: 10911956Abstract: Methods, systems, and apparatuses are described for identifying unauthorized (e.g., rogue) access points. Authorized access points can detect the presence of rogue access points by determining signal strengths associated with other access points. A detected variance from an expected signal strength can indicate a presence of a rogue access point.Type: GrantFiled: November 10, 2017Date of Patent: February 2, 2021Assignee: COMCAST CABLE COMMUNICATIONS, LLCInventors: Ryan Van Antwerp, James Bradley Hein
-
Patent number: 10902242Abstract: Methods and systems are described for creating irrefutable binding data for a data file. An input sequence of data elements is derived based on information from the data file. A graphical representation of input regions corresponding to the input sequence of data elements is output on a display, superimposed on captured image data including a visible feature of a user associated with the data file. User input of each data element of the input sequence is captured by tracking the visible feature through the corresponding input regions, and the binding data is created from the captured images as the visible feature is tracked through the input regions.Type: GrantFiled: October 11, 2019Date of Patent: January 26, 2021Assignee: PQ SOLUTIONS LIMITEDInventors: Martin Tomlinson, Cen Jung Tjhai, Andersen Cheng
-
Patent number: 10891360Abstract: Certain implementations include systems and methods for improving knowledge-based-authentication (KBA) identity authentication questions.Type: GrantFiled: November 6, 2019Date of Patent: January 12, 2021Assignee: LexisNexis Risk Solutions Inc.Inventors: Tamir Nygate, Benny Rotem, Elina Yaakobovich
-
Patent number: 10887099Abstract: A processor-based method for secret sharing in a computing system is provided. The method includes encrypting shares of a new secret, using a previous secret and distributing unencrypted shares of the new secret and the encrypted shares of the new secret, to members of the computing system. The method includes decrypting at least a subset of the encrypted shares of the new secret, using the previous secret and regenerating the new secret from at least a subset of a combination of the unencrypted shares of the new secret and the decrypted shares of the new secret.Type: GrantFiled: February 18, 2019Date of Patent: January 5, 2021Assignee: Pure Storage, Inc.Inventors: Ethan L. Miller, Andrew R. Bernat
-
Patent number: 10872042Abstract: Some embodiments provide, for a particular device in a set of related devices, a method for backing up data synchronized between the set of related devices. The method stores the backup data encrypted with a set of data encryption keys. The method also stores the set of data encryption keys encrypted with a master recovery key. The method also stores several copies of master recovery key data, each copy of the master recovery key data encrypted with a public key of a different one of the related devices. The backup data is only recoverable by accessing a private key of any one of the related devices.Type: GrantFiled: February 5, 2018Date of Patent: December 22, 2020Assignee: Apple Inc.Inventors: Michael D. Ford, Jerrold V. Hauck, Matthew G. Watson, Mitchell D. Adler, Dallas B. De Atley, James Wilson
-
Patent number: 10848507Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.Type: GrantFiled: June 18, 2019Date of Patent: November 24, 2020Assignee: Rapid7, Inc.Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg
-
Patent number: 10819683Abstract: A method, system, and computer-usable medium are disclosed for performing deep packet inspection of network traffic, comprising: receiving a unit of one or more network packets, calculating a calculated fingerprint for data within the unit, determining a current inspection context, determining whether the calculated fingerprint and the current inspection context matches an entry stored in a cache, wherein the entry includes a stored fingerprint and a cached inspection context, and performing operations associated with deep packet inspection of the unit based on whether the calculated fingerprint and the current inspection context match the entry.Type: GrantFiled: November 20, 2017Date of Patent: October 27, 2020Assignee: Forcepoint LLCInventors: Valtteri Rahkonen, Kari Nurmela
-
Patent number: 10812516Abstract: A cyber security assessment platform is provided. The platform can assess the security posture of a network by deploying one or more scenarios to be executed on one or more assets on the network and analyzing the outcomes of the scenarios. A scenario can be configured to validate a device or network status, and/or mimic an unauthorized cyber-attack. Each scenario can include one or more phases defining an execution path. Related method, apparatus, systems, techniques and articles are also described.Type: GrantFiled: August 5, 2015Date of Patent: October 20, 2020Assignee: AttackIQ, Inc.Inventors: Stephan Chenette, Rajesh Kumar Sharma
-
Patent number: 10791124Abstract: A method and device for securing data of a message is provided. A method for encrypting a message of a user terminal device includes: receiving a message via a message input window; displaying the received message; encrypting the message by using a key index and an encryption key corresponding to a chatting window for the message based on an instruction for transmitting the message to another chatting party being received; and transmitting the encrypted message to the other chatting party.Type: GrantFiled: November 13, 2017Date of Patent: September 29, 2020Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Jun-bum Shin, Jin-su Kim, Kyoung-yong Lee, Sung-wook Kim, Hye-jin Shin
-
Patent number: 10776475Abstract: A method, computer system, and computer program product. Input element layout data based on a layout of input elements of an input device is retrieved in response to a received password input request. A positioning marker and a visualized overlay input device including an altered layout of input elements is generated based on the retrieved input element layout data. The visualized overlay input device and the positioning marker are rendered for display by a see-through display device for viewing of the visualized overlay input device in superposition with respect to the input device. An effective input configuration of the layout of input elements of the input device is generated to correspond to the altered layout of input elements for entry of the password input.Type: GrantFiled: November 13, 2017Date of Patent: September 15, 2020Assignee: International Business Machines CorporationInventor: Akira Ohkado
-
Patent number: 10771482Abstract: The disclosed computer-implemented method for detecting geolocation-aware malware may include (1) receiving, by a computing device, trajectory information for network traffic carrying geolocation-aware malware, (2) identifying, from the trajectory information, a target geolocation characteristic required to activate the geolocation-aware malware, (3) establishing, on an image of a user machine, an execution environment having the target geolocation characteristic, (4) running, on the image of the user machine, the geolocation-aware malware, and (5) analyzing functioning of the geolocation-aware malware to identify malicious activity by the geolocation-aware malware. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 14, 2017Date of Patent: September 8, 2020Assignee: CA, Inc.Inventor: Prashant Gupta
-
Patent number: 10764045Abstract: A system receives data of one or more types from one or more sources having distinct identities for storing the data in a distributed storage system. The system stores metadata associated with storing the data in data structures in the distributed storage system. The system selects a portion of the data and a portion of the metadata associated with storing the data in the distributed storage system. The system compresses the selected portions of the data and the metadata, encrypts the compressed data and metadata using a single key or using a separate key for each data type, and stores the encrypted compressed data and metadata in the distributed storage system. The system also encrypts unencrypted metadata and associated data during defragmentation procedure.Type: GrantFiled: June 30, 2017Date of Patent: September 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Rushi Srinivas Surla, Shane Kumar Mainali, Andrew Edwards, Maneesh Sah, Weiping Zhang