Patents Examined by Gary Garcia
-
Patent number: 9858420Abstract: A method and system for transmitting trustworthy data. A data file (F0) of raw data including content is received. Changes to the content of the data file F0 are tracked. The changes produce n changed versions of the data file (n?1). Changed version j of the data file is denoted as Fj for each positive integer j between 1 and n inclusive. Content that was changed in each version F1, . . . , Fn of the data file is determined. A trust index TXn associated with the changed version Fn of the data file is calculated, based on a cumulative number of changes between successive versions F0, F1, . . . , Fn of the data file. In response to a request received from a computing device for the data file Fn, the data file Fn and the tust index TXn are transmitted to the computing device.Type: GrantFiled: July 28, 2015Date of Patent: January 2, 2018Assignee: International Business Machines CorporationInventors: Cedrine Madera, Alain Maneville
-
Patent number: 9825759Abstract: In one embodiment, a tunnel to be affected by configuration of a service in a network is identified and key information for the identified tunnel is obtained from a corresponding router. The tunnel is assigned to a key group based on the key information, and provisioning information associated with the tunnel on the router is updated based on the assigned key group in conjunction with configuration of the service. The updating of the provisioning information may comprise altering the key information on the router to include a key associated with the assigned key group. Also, one or more keys not associated with the assigned key group may be deleted from the router and from a management entity of the network.Type: GrantFiled: July 8, 2013Date of Patent: November 21, 2017Assignee: Alcatel LucentInventors: Denis A. Proulx, Carl Rajsic
-
Patent number: 9806948Abstract: A method of replicating firewall rules for a tenant that has several data compute nodes across a group of data centers. The method receives a first set of firewall rules that references first and second sets of objects in a first data center. The first set of objects includes identifiers that are recognized by the network manager of the first data center. The second set of objects includes identifiers that are not recognized by the first network manager. The first set of objects is translated into a set of global objects by searching a local inventory of objects. The second set of objects is translated into a set of global objects by searching a global inventory of objects. The first set of firewall rules is translated into a second set of firewall rules by using the translated objects and is replicated to the network managers of every data center.Type: GrantFiled: July 28, 2015Date of Patent: October 31, 2017Assignee: NICIRA, INC.Inventors: Uday Masurekar, Kaushal Bansal
-
Patent number: 9779423Abstract: Devices, systems, and methods of generating and managing behavioral biometric cookies. The system monitors user-interactions of a user, that are performed via an input unit of an end-user device; and extracts a set of user-specific characteristics, which are used as a behavioral profile or behavioral signature. The set of user-specific characteristics are further used as a behavioral biometric cookie data-item, allowing the system to distinguish between two human users that utilize the same electronic device; and allowing the system to distinguish between a human user and an automated script. The system further allows creation and utilization of behavioral sub-cookies that distinguish among multiple users of the same device. The system also allows creation of a cross-device behavioral cookie, to track browsing history of a single user across multiple electronic devices.Type: GrantFiled: February 2, 2017Date of Patent: October 3, 2017Assignee: BioCatch Ltd.Inventor: Avi Turgeman
-
Patent number: 9760715Abstract: A method is provided of protecting a computer against malware affection. The computer has a data storage and an operating system for managing the data storage. The method comprises providing a filter module in the operating system which operates to detect an attempt to store data in the data storage, to determine a data format of the data to be stored in the data storage, and to prevent storage of the data if the data format is determined to relate to a predefined type. The filter module may be provided as a file system filter driver in a kernel of the operating system. The filter module may be arranged to operate between an input/output manager of the operating system and a driver associated with the data storage. The input/output manager and driver associated with the data storage may form part of the kernel of the operating system.Type: GrantFiled: July 23, 2015Date of Patent: September 12, 2017Inventor: William Grant Rothwell
-
Patent number: 9418226Abstract: Apparatus for assessing threat to at least one computer network in which a plurality of systems (301, 302, 303, 304, 305, . . . 30n) operate is configured to determine predicted threat activity (13), to determine expected downtime of each system in dependence upon said predicted threat activity, to determine loss (12A, 12B, 12C, 12D, 12E, . . . , 12m) for each of a plurality of operational processes (31A, 31B, 31C, 31D, 31E, . . . 31m dependent on the downtimes of the systems, to add losses for the plurality of processes so as to obtain a combined loss (12SUM) arising from the threat activity.Type: GrantFiled: February 7, 2016Date of Patent: August 16, 2016Inventor: Phillip King-Wilson
-
Patent number: 9356938Abstract: This invention relates to a method (100) for creating, on a device (200), an authorized domain (102) for sharing a (103) of a content item (104) between a first person (105) and a second person (106). The method (100) alleviates the hassle of having end-users managing authorized domains. If the first person is bound (107) to the right (103), and the device is bound (108) to the first person (105), the device (200) grants (110) the second person (106) the right (103) in response to the device (200) associating (109) to the second person (106).Type: GrantFiled: January 27, 2006Date of Patent: May 31, 2016Assignee: KONINKLIJKE PHILIPS N.V.Inventors: Johan Gerhard Herman Reuzel, Robert Paul Koster
-
Patent number: 9143523Abstract: Apparatus for assessing threat to at least one computer network in which a plurality of systems (301, 302, 303, 304, 305, . . . 30n) operate is configured to determine predicted threat activity (13), to determine expected downtime of each system in dependence upon said predicted threat activity, to determine loss (12A, 12B, 12C, 12D, 12E, . . . , 12m) for each of a plurality of operational processes (31A, 31B, 31C, 31D, 31E, . . . 31m) dependent on the downtimes of the systems, to add losses for the plurality of processes so as to obtain a combined loss (12SUM) arising from the threat activity.Type: GrantFiled: December 31, 2007Date of Patent: September 22, 2015Inventor: Phillipe Evrard
-
Patent number: 9077708Abstract: A second information processing system to communicate with a first information processing system includes an acquisition unit, an acceptance unit, a confirmation unit, and a setting unit. The acquisition unit acquires authentication information from the first information processing system and from a memory of the second information processing system. The acceptance unit accepts correspondence information indicating correspondence between first authentication information and second authentication information. The confirmation unit confirms, as a condition, whether the acquired authentication information in the first information processing system is identical to the accepted first authentication information and confirms, as a condition, whether the acquired authentication information in the second information processing system is identical to the accepted second authentication information.Type: GrantFiled: April 16, 2012Date of Patent: July 7, 2015Assignee: Canon Kabushiki KaishaInventor: Yu Tamura
-
Patent number: 8214642Abstract: The invention relates to a method for distribution of a set of credentials from a credential issuer to a credential user. The credential user is provided with a user device. A first channel and a second channel are provided for communication between the user device and the credential issuer. A shared key is distributed between the user device and the credential issuer by means of the second channel. A binary representation of the set of credentials with a predefined maximum level of deviation from a uniform distribution is generated. The binary representation of the set of credentials is encrypted by means of the shared key. The encrypted set of credentials is distributed via the first channel from the credential issuer to the user device. The encrypted set of credentials is decrypted by the user device by means of the shared key.Type: GrantFiled: April 4, 2008Date of Patent: July 3, 2012Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Thorsten Kramp, Thomas Weigold