Patents Examined by Gary Gracia
-
Visible-light communication-based encryption, decryption and encryption/decryption method and system
Patent number: 9768958Abstract: Embodiments of the present invention provide a method and system of encryption, decryption, and encryption and decryption based on visible light communication. A transmit end performs a logical operation on an original data signal and a pseudocode signal varying with a unit interval to obtain a scrambling code signal, and sends the scrambling code signal in a form of a visible light signal. A receive end receives the visible light signal sent by the transmit end, and converts the visible light signal into a digital signal; and decodes the digital signal and a pseudocode signal varying with a unit interval, so as to obtain the original data signal. The visible light signal transmitted between the transmit end and the receive end is not original data, but a scrambling code signal varying with a unit interval, thereby improving security of the photonic Internet of Things.Type: GrantFiled: May 7, 2013Date of Patent: September 19, 2017Assignee: KUANG-CHI INNOVATIVE TECHNOLOGY LTD.Inventors: Ruopeng Liu, Lin Luan, Guangjin Xiao -
Patent number: 9769125Abstract: An information administration system configured of: a component information management apparatus (4) including a component information storing unit (41) storing component information after sectionalizing the component information into public information and non-public information, and also sectionalizing the non-public information into information for designing and information for manufacturing, and an encryption processing unit (42) encrypting the non-public information; a designing information management apparatus (2) including a first component information receiving unit (24) receiving the component information, a first decryption unit (25) decrypting non-public component information for designing, and a designing information storing unit (22) storing designing information that is designed by adding the received component information thereto; and a manufacturing apparatus (3) including a second decryption unit (33) decrypting the received non-public component information for manufacturing, and a drive contType: GrantFiled: January 23, 2015Date of Patent: September 19, 2017Assignees: ZUKEN INC., FUJI MACHINE MFG CO LTD, FUKUOKA UNIVERSITYInventors: Hajime Tomokage, Hidemichi Kawase, Hiroshi Matsuoka, Hirohiko Matsuzawa, Kazuhiro Kusunoki, Hiroshi Yamazaki
-
Patent number: 9767261Abstract: A method, system and computer program product are provided for implementing block extent granularity authorization initialization processing in Coherent Accelerator Processor Interface (CAPI) adapters. A master owning client and CAPI Server Register space assigned to the Master Owning Client are identified. Address mapping is created for the Master Owning Client to access the assigned CAPI Server Register space. The Master Owning Client is enabled to send commands to the CAPI adapter, other CAPI clients are prevented from sending commands to the CAPI adapter via the CAPI Server Register space assigned to the Master Owning Client.Type: GrantFiled: February 23, 2015Date of Patent: September 19, 2017Assignee: International Business Machines CorporationInventors: Brian E. Bakke, Adrian C. Gerhard, Daniel F. Moertl
-
Patent number: 9767296Abstract: A method for requesting access rights for an object of a computerized system, comprising invoking in a remote computer linkable to the computerized system an add-on program configured for notifying an owner of the object of the computerized system according to received contact data of the owner of the object, thereby requesting from the owner of the object access rights to the object independently of the computerized system, and an apparatus for performing the same.Type: GrantFiled: January 22, 2014Date of Patent: September 19, 2017Assignee: VARONIS SYSTEMS, INCInventors: Yakov Faitelson, Ohad Korkus, David Bass
-
Patent number: 9762570Abstract: Information processing system includes a first certification device which executes a first temporary certification, creates a first temporary certificate, transmits it to an external device, carries out a first formal certification and creates the first formal certificate, a second certification device which executes a second temporary certification based on the first temporary certification, creates a second temporary certificate, transmits it to the external device, carries out a second formal certification and creates the second formal certificate, and a processing device which verifies a validity of the first formal certificate corresponding to the first temporary certificate and a validity of the second formal certificate corresponding to the second temporary certificate from the user, in response to a information processing request from the user and determines to execute the information processing corresponding to the information processing request based on the verification result.Type: GrantFiled: March 6, 2015Date of Patent: September 12, 2017Assignee: FUJITSU LIMITEDInventors: Makoto Omori, Shinichiro Nishizawa, Yasushi Toriwaki, Takashi Yoshino, Hisashi Sugawara, Masaki Nagao, Kosuke Tao, Keiko Ishii, Tsuyoshi Taneishi, Kenichi Yamashita, Mitsuhiro Sato, Atsushi Wataki
-
Patent number: 9762566Abstract: Technologies are provided in embodiments to manage an authentication confirmation score. Embodiments are configured to identify, in absolute session time, a beginning time and an ending time of an interval of an active user session on a client. Embodiments are also configured to determine a first value representing a first subset of a set of prior user sessions, where the prior user sessions of the first subset were active for at least as long as the beginning time. Embodiments can also determine a second value representing a second subset of the set of prior user sessions, where the prior user sessions of the second subset were active for at least as long as the ending time. Embodiments also determine, based on the first and second values, a decay rate for the authentication confidence score of the active user session. In some embodiments, the set is based on context attributes.Type: GrantFiled: January 30, 2017Date of Patent: September 12, 2017Assignee: Intel CorporationInventors: Micah Sheller, Conor Cahill, Jason Martin, Brandon Baker
-
Patent number: 9747459Abstract: A method for requesting access rights for an object of a computerized system comprising installing in the computerized system a code that associates an object with an owner of the object, thereby enabling to automatically request access rights for the object from an owner of the object, and an apparatus for performing the same.Type: GrantFiled: April 2, 2012Date of Patent: August 29, 2017Assignee: VARONIS SYSTEMS, INCInventors: Yakov Faitelson, Ohad Korkus, David Bass
-
Patent number: 9749271Abstract: Embodiments provide IP address partitioning features that can be used to source outbound email communications, but the embodiments are not so limited. In an embodiment, a computer-based method operates to identify and/or isolate one or more customers that may be misusing one or more IP addresses of a partition. A system of an embodiment is configured in part to divide a partition that includes one or more potentially misused IP addresses into one or more levels of sub-partitions as part of identifying offending or potentially offending customers. Other embodiments are included.Type: GrantFiled: August 26, 2016Date of Patent: August 29, 2017Assignee: Microsoft Technology Licensing, LLCInventors: David Nicholas Yost, Alexander Nikolayev
-
Patent number: 9749327Abstract: A flexible content sharing system may comprise a network based application built on a client device using information from dissociated user experience component (UXC), application logic and execution layer (ALEL), and content distribution system (CDS) payloads. An ALEL engine may communicate a request from the network based application to a CDS module. The CDS module may interface the ALEL engine and a CDS server. The ALEL engine can act as a gate keeper and securely communicates requests from client devices to the CDS server. The CDS server is configured to manage and alert the ALEL of any enterprise policies that may be applicable to the client devices connected to the ALEL engine which, in turn, notifies the client devices to comply with the enterprise policies. The CDS server may synchronize any change made to the content by any of the client devices running network based applications.Type: GrantFiled: January 24, 2017Date of Patent: August 29, 2017Assignee: Open Text SA ULCInventor: James Storm
-
Patent number: 9736118Abstract: In one implementation, the number of half open session initiation protocol (SIP) sessions per-destination (e.g., SIP device) or globally is limited by SIP application layer gateway (ALG) as a SIP DoS/DDoS countermeasure. Compared with traditional SIP DoS/DDoS countermeasures, the proposed solution is simple to implement and, thus, less likely to degrade SIP ALG performance. Moreover, this solution automatically adapts to DoS/DDoS attack arrival rate, while at the same time not degrading legal SIP traffic even if throttling is enforced for the SIP device.Type: GrantFiled: July 17, 2013Date of Patent: August 15, 2017Assignee: Cisco Technology, Inc.Inventors: Xin Li, Yin Wang, Yibin Zhang
-
Patent number: 9735958Abstract: A key ceremony application creates bundles for custodians encrypted with their passphrases. Each bundle includes master key share. The master key shares are combined to store an operational master key. The operational master key is used for private key encryption during a checkout process. The operational private key is used for private key decryption for transaction signing in a payment process. The bundles further include TLS keys for authenticated requests to create an API key for a web application to communicate with a service and to unfreeze the system after it has been frozen by an administrator.Type: GrantFiled: May 19, 2015Date of Patent: August 15, 2017Assignee: Coinbase, Inc.Inventors: Andrew E. Alness, James Bradley Hudon
-
Patent number: 9729316Abstract: A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.Type: GrantFiled: February 27, 2008Date of Patent: August 8, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hongxia Jin, Jeffrey Bruce Lotspiech
-
Patent number: 9722994Abstract: A user terminal, a password-based trading terminal, a system and a method for password-based authentication are provided. Wherein, the user terminal comprises a password generation module and a first near field communication module. The password generation module is configured to generate a password. The first near field communication module is configured to convert the generated password into near field communication label data, and then send the data to a password-based trading terminal through near field communication. The present application effectively ensures password security during the password-based authentication.Type: GrantFiled: May 11, 2012Date of Patent: August 1, 2017Assignee: ZTE CorporationInventors: Jie Yang, Qihong Fu, Yong Fan, Pan Wei, Dong Zhao, Yuan Zhu, Zhiping Zhang
-
Patent number: 9710664Abstract: A system for protecting data managed in a cloud-computing network from malicious data operations includes an Internet-connected server and software executing on the server from a non-transitory physical medium, the software providing a first function for generating one or more security tokens that validate one or more computing operations to be performed on the data, a second function for generating a hash for each token generated, the hash detailing, in a secure fashion, the operation type or types permitted by the one or more tokens, a third function for brokering two-party signature of the one or more tokens, and a fourth function for dynamically activating the one or more signed tokens for a specific time window required to perform the operations permitted by the token.Type: GrantFiled: September 7, 2012Date of Patent: July 18, 2017Assignee: Amrita Vishwa VidyapeethamInventors: Shiju Sathyadevan, P. Venkat Rangan, Krishnashree Achuthan
-
Patent number: 9712321Abstract: A system and method is disclosed for performing unified broadcast encryption and traitor tracing for digital content. In one embodiment a media key tree is divided into S subtrees, the media key tree including media keys and initial values, which may be random values. The digital content is divided into a plurality of segments and at least some of the segments are converted into a plurality of variations. The random values are transformed into media key variations and a separate media key variant is assigned to each of the subdivided subtrees. A unified media key block including the media key tree is stored on the media.Type: GrantFiled: May 31, 2008Date of Patent: July 18, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hongxia Jin, Jeffrey Bruce Lotspiech
-
Patent number: 9712324Abstract: Embodiments of a method and apparatus for reducing or eliminating unauthorized access to secured files are generally described herein. In some embodiments, the method includes establishing a connection between a communication portion of the secured file and an authentication agent. The method may include requesting a decryption key from the authentication agent for accessing the secured file on a first computing device. The decryption key may be based on device information retrieved from devices in an authenticated environment of devices. The authenticated environment may be an environment in which the secured the was encrypted. The method may include destroying the secured file subsequent to receiving a message indicating that the requesting has failed.Type: GrantFiled: March 19, 2013Date of Patent: July 18, 2017Assignee: Forcepoint Federal LLCInventors: Matthew D. Neumann, Michael W. Smith
-
Patent number: 9692737Abstract: A system and method for controlling a production process for producing a product is provided in which overproduction may be inhibited by introducing a separation of duties within a production process. Typically a producer will contract out the various stages of a production process to multiple contractors. In general, separation of duties involves purposefully separating production stages, for silicon chips or other products, so that the end product has been handled or “touched”, by each subcontractor, in order for the end product to be fully functional.Type: GrantFiled: February 28, 2007Date of Patent: June 27, 2017Assignee: CERTICOM CORP.Inventors: Anthony J. Walters, Brian Neill, Tony Rosati, Ashok Vadekar, Daniel O'Loughlin
-
Patent number: 9692771Abstract: According to one aspect, a method of assessing typicality of a first name that includes a plurality of characters includes obtaining the first name, determining at least a first N-gram size, and extracting a first plurality of N-grams of the first N-gram size from the first name. The first plurality of N-grams is analyzed with respect to a model. Analyzing the first plurality of N-grams with respect to the model includes obtaining a first score. Finally, the method includes determining whether the first score indicates that the first name is typical.Type: GrantFiled: February 12, 2013Date of Patent: June 27, 2017Assignee: Symantec CorporationInventors: Jonathan Jeremiah Dinerstein, Christian Earnest Larsen, David Francis Meyer
-
Patent number: 9690929Abstract: A method for estimating the strength of a graphical password comprising two or more segments is disclosed. In some embodiments, this advantageous solution is achieved by implementing a multi-step process. In one step, the data processing system applies a first operation on a first segment to produce a transformed segment. In another step, the data processing system performs a comparison operation between the transformed segment and a second segment. In another step, the data processing system performs a penalty operation with respect to the first segment based on an outcome of the comparison operation. The penalty operation includes one or more of (1) calculating a penalty value, wherein the penalty value may be used in calculating a value representing the strength of the graphical password; and (2) disregarding the first or the second segment when calculating the value representing the strength of the graphical password.Type: GrantFiled: September 20, 2012Date of Patent: June 27, 2017Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Göran Selander, Mats Näslund, Freyr Saevarsson
-
Patent number: 9692758Abstract: A pre-registration procedure is utilized to create a user profile for a user of a multi-factor authentication (“MFA”) service. A client application installation procedure is utilized to install a client application on a computing device that is to be utilized as an authentication factor for the MFA service. A computing device enrollment procedure is utilized to enroll the computing device on which the client application was installed for the MFA service. A voice enrollment procedure is utilized to create a voice print for the user of the computing device that is to be utilized as an authentication factor for the MFA service. An authentication procedure is utilized to provide multi-factor authenticated access to a service, such as an online service that provides access to sensitive account information.Type: GrantFiled: April 7, 2015Date of Patent: June 27, 2017Assignee: AT&T Intellectual Property I, L.P.Inventors: Ilija Zeljkovic, Robert J. Andres, Jerry Birkes, Alton W. Drake, II, Juan A. Garay, Brian M. Novack, Amanda Joy Stent, Gary A. Toretti, Jay Wilpon, James Whitescarver