Patents Examined by Gary Garcia
  • Patent number: 9858420
    Abstract: A method and system for transmitting trustworthy data. A data file (F0) of raw data including content is received. Changes to the content of the data file F0 are tracked. The changes produce n changed versions of the data file (n?1). Changed version j of the data file is denoted as Fj for each positive integer j between 1 and n inclusive. Content that was changed in each version F1, . . . , Fn of the data file is determined. A trust index TXn associated with the changed version Fn of the data file is calculated, based on a cumulative number of changes between successive versions F0, F1, . . . , Fn of the data file. In response to a request received from a computing device for the data file Fn, the data file Fn and the tust index TXn are transmitted to the computing device.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Cedrine Madera, Alain Maneville
  • Patent number: 9825759
    Abstract: In one embodiment, a tunnel to be affected by configuration of a service in a network is identified and key information for the identified tunnel is obtained from a corresponding router. The tunnel is assigned to a key group based on the key information, and provisioning information associated with the tunnel on the router is updated based on the assigned key group in conjunction with configuration of the service. The updating of the provisioning information may comprise altering the key information on the router to include a key associated with the assigned key group. Also, one or more keys not associated with the assigned key group may be deleted from the router and from a management entity of the network.
    Type: Grant
    Filed: July 8, 2013
    Date of Patent: November 21, 2017
    Assignee: Alcatel Lucent
    Inventors: Denis A. Proulx, Carl Rajsic
  • Patent number: 9806948
    Abstract: A method of replicating firewall rules for a tenant that has several data compute nodes across a group of data centers. The method receives a first set of firewall rules that references first and second sets of objects in a first data center. The first set of objects includes identifiers that are recognized by the network manager of the first data center. The second set of objects includes identifiers that are not recognized by the first network manager. The first set of objects is translated into a set of global objects by searching a local inventory of objects. The second set of objects is translated into a set of global objects by searching a global inventory of objects. The first set of firewall rules is translated into a second set of firewall rules by using the translated objects and is replicated to the network managers of every data center.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: October 31, 2017
    Assignee: NICIRA, INC.
    Inventors: Uday Masurekar, Kaushal Bansal
  • Patent number: 9779423
    Abstract: Devices, systems, and methods of generating and managing behavioral biometric cookies. The system monitors user-interactions of a user, that are performed via an input unit of an end-user device; and extracts a set of user-specific characteristics, which are used as a behavioral profile or behavioral signature. The set of user-specific characteristics are further used as a behavioral biometric cookie data-item, allowing the system to distinguish between two human users that utilize the same electronic device; and allowing the system to distinguish between a human user and an automated script. The system further allows creation and utilization of behavioral sub-cookies that distinguish among multiple users of the same device. The system also allows creation of a cross-device behavioral cookie, to track browsing history of a single user across multiple electronic devices.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: October 3, 2017
    Assignee: BioCatch Ltd.
    Inventor: Avi Turgeman
  • Patent number: 9760715
    Abstract: A method is provided of protecting a computer against malware affection. The computer has a data storage and an operating system for managing the data storage. The method comprises providing a filter module in the operating system which operates to detect an attempt to store data in the data storage, to determine a data format of the data to be stored in the data storage, and to prevent storage of the data if the data format is determined to relate to a predefined type. The filter module may be provided as a file system filter driver in a kernel of the operating system. The filter module may be arranged to operate between an input/output manager of the operating system and a driver associated with the data storage. The input/output manager and driver associated with the data storage may form part of the kernel of the operating system.
    Type: Grant
    Filed: July 23, 2015
    Date of Patent: September 12, 2017
    Inventor: William Grant Rothwell
  • Patent number: 9418226
    Abstract: Apparatus for assessing threat to at least one computer network in which a plurality of systems (301, 302, 303, 304, 305, . . . 30n) operate is configured to determine predicted threat activity (13), to determine expected downtime of each system in dependence upon said predicted threat activity, to determine loss (12A, 12B, 12C, 12D, 12E, . . . , 12m) for each of a plurality of operational processes (31A, 31B, 31C, 31D, 31E, . . . 31m dependent on the downtimes of the systems, to add losses for the plurality of processes so as to obtain a combined loss (12SUM) arising from the threat activity.
    Type: Grant
    Filed: February 7, 2016
    Date of Patent: August 16, 2016
    Inventor: Phillip King-Wilson
  • Patent number: 9356938
    Abstract: This invention relates to a method (100) for creating, on a device (200), an authorized domain (102) for sharing a (103) of a content item (104) between a first person (105) and a second person (106). The method (100) alleviates the hassle of having end-users managing authorized domains. If the first person is bound (107) to the right (103), and the device is bound (108) to the first person (105), the device (200) grants (110) the second person (106) the right (103) in response to the device (200) associating (109) to the second person (106).
    Type: Grant
    Filed: January 27, 2006
    Date of Patent: May 31, 2016
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Johan Gerhard Herman Reuzel, Robert Paul Koster
  • Patent number: 9143523
    Abstract: Apparatus for assessing threat to at least one computer network in which a plurality of systems (301, 302, 303, 304, 305, . . . 30n) operate is configured to determine predicted threat activity (13), to determine expected downtime of each system in dependence upon said predicted threat activity, to determine loss (12A, 12B, 12C, 12D, 12E, . . . , 12m) for each of a plurality of operational processes (31A, 31B, 31C, 31D, 31E, . . . 31m) dependent on the downtimes of the systems, to add losses for the plurality of processes so as to obtain a combined loss (12SUM) arising from the threat activity.
    Type: Grant
    Filed: December 31, 2007
    Date of Patent: September 22, 2015
    Inventor: Phillipe Evrard
  • Patent number: 9077708
    Abstract: A second information processing system to communicate with a first information processing system includes an acquisition unit, an acceptance unit, a confirmation unit, and a setting unit. The acquisition unit acquires authentication information from the first information processing system and from a memory of the second information processing system. The acceptance unit accepts correspondence information indicating correspondence between first authentication information and second authentication information. The confirmation unit confirms, as a condition, whether the acquired authentication information in the first information processing system is identical to the accepted first authentication information and confirms, as a condition, whether the acquired authentication information in the second information processing system is identical to the accepted second authentication information.
    Type: Grant
    Filed: April 16, 2012
    Date of Patent: July 7, 2015
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yu Tamura
  • Patent number: 8214642
    Abstract: The invention relates to a method for distribution of a set of credentials from a credential issuer to a credential user. The credential user is provided with a user device. A first channel and a second channel are provided for communication between the user device and the credential issuer. A shared key is distributed between the user device and the credential issuer by means of the second channel. A binary representation of the set of credentials with a predefined maximum level of deviation from a uniform distribution is generated. The binary representation of the set of credentials is encrypted by means of the shared key. The encrypted set of credentials is distributed via the first channel from the credential issuer to the user device. The encrypted set of credentials is decrypted by the user device by means of the shared key.
    Type: Grant
    Filed: April 4, 2008
    Date of Patent: July 3, 2012
    Assignee: International Business Machines Corporation
    Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Thorsten Kramp, Thomas Weigold