Patents Examined by Jayesh Jhaveri
  • Patent number: 9825940
    Abstract: The present disclosure provides systems and techniques for improved back-end integration of third-party content and an administrative framework allowing for user experience management for a computer-based environment. Described herein, for example, are approaches to improving secure access to multiple web-based systems, integrating web-based content, and controlling timing of web interaction. The problems addressed herein relate to coordinating access and delivery of web content from and to multiple sources and multiple users in an integrated and time-controlled manner.
    Type: Grant
    Filed: February 17, 2015
    Date of Patent: November 21, 2017
    Assignee: Brain Chase Productions, LLC
    Inventors: Allan Robert Staker, Heather Clayton Staker, Danny Lee Lufkin, Andrea Richeson, Nicholas Aaron Weynand
  • Patent number: 9805765
    Abstract: A recording apparatus is disclosed. The recording apparatus includes a data input portion configured to input data, a first moving image signal recording portion configured to record, based on the input data, a first moving image signal having a first image quality attribute, a condition detector configured to detect that the input data satisfies a predetermined condition during recording of the first moving image signal, and a second moving image signal recorder configured to record, based on the input data, a second moving image signal having a second image quality attribute when the condition detector detects that the input data satisfies the predetermined condition.
    Type: Grant
    Filed: April 8, 2014
    Date of Patent: October 31, 2017
    Assignee: SONY CORPORATION
    Inventors: Takaharu Yamada, Atsushi Mae
  • Patent number: 9794242
    Abstract: The present disclosure provides a method for realizing logon to an application service website on an operation platform, including when a user terminal visits the application service website, receiving a first URL request sent from the application service website; obtaining logon information of an account of the application service website from the local according to the first URL request; and returning the logon information of the account to the application service website by invoking a first predefined function containing the logon information of the account, so that the application service website provides a web page for the user terminal to fast log on. The present disclosure also provides an apparatus for realizing logon to an application service website on an operation platform and an operation service platform.
    Type: Grant
    Filed: June 19, 2015
    Date of Patent: October 17, 2017
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Ningjun Dou, Jie Lin
  • Patent number: 9781109
    Abstract: A method, a terminal device, and a network device are provided. The method of the present invention includes acquiring, by a terminal device, a key, an identity of the terminal device, and identification information of one or more applications on the terminal device, where identification information of different applications on the terminal device is different from each other, and the identity of the terminal device includes International Mobile Equipment Identity (IMEI) and/or International Mobile Subscriber Identity (IMSI); generating, for identification information of one application by using a preset encryption algorithm according to the identity of the terminal device and the key, an encryption result corresponding to the application; and when the application runs on the terminal device, accessing a network by using the encryption result corresponding to the application. The present invention is applicable to protecting information security of a terminal device accessing a network.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: October 3, 2017
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Zhengde Zhai
  • Patent number: 9781153
    Abstract: Concepts and technologies are disclosed herein for local applications and local application distribution. According to one aspect of the concepts and technologies disclosed herein, an application authority system can receive a local application for distribution to a local router. The application authority system can perform an application approval process to approve the local application for distribution to the local router. The application authority system can cause the local application to be distributed to the local router. The local router can receive the local application and can distribute the local application to one or more devices via a local network.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: October 3, 2017
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Eric Pate
  • Patent number: 9769179
    Abstract: A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and the network connection status of the computing system is determined. If the computing system is offline, the user password and the OTP are stored in memory and the user is granted a first level of access to the computing system. Upon detecting that the network connection status of the computing system has changed to online, the user password and the OTP are provided to an authentication server for authentication. If the authentication of the user password and the OTP is successful, the user is granted a second level of access to the computing system, the second level of access being higher than the first level of access.
    Type: Grant
    Filed: May 16, 2016
    Date of Patent: September 19, 2017
    Assignee: Red Hat, Inc.
    Inventors: Dmitri V. Pal, Stephen J. Gallagher
  • Patent number: 9760708
    Abstract: [Object] To reduce the trouble of the authentication process necessary for cooperation between a plurality of devices or network services. [Solving Means] An information processing apparatus includes a communication unit, a storage unit, and a controller. The communication unit communicates with a first device, a second device, and a service on a network, the service having a resource on a user of the first device. The controller controls the communication unit so that the communication unit transmits, based on a request for obtaining an access right to the resource from the first device and permission information representing permission by the user with respect to the obtaining of the access right, a request for issuing an access token to the service, the access token representing the access right, and receives, from the service, the access token issued by the service.
    Type: Grant
    Filed: January 26, 2013
    Date of Patent: September 12, 2017
    Assignee: SONY CORPORATION
    Inventor: Masato Shimakawa
  • Patent number: 9740840
    Abstract: Techniques are generally described for user authentication. Example techniques may include providing a data set including audio data and image data, wherein the audio data includes voice recordings of multiple people, wherein the image data includes at least a facial image of at least one of the multiple people, receiving a response to the data set from a user device, and determining whether the received response corresponds to at least a part of content of the voice recording of the one of the multiple people whose facial image is included in the image data.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: August 22, 2017
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventors: Tsutomu Miyasato, Noriaki Kuwahara, Rieko Kadobayashi, Masataka Ohira, Noriaki Mitsunaga
  • Patent number: 9729941
    Abstract: A system and method to watermark a compressed content encrypted by at least one content key, said content key as well as pre-marking data forming Conditional Access System (CAS) data, said CAS Data being encrypted by a transmission key and comprising at least one signature to authenticate all or part of the CAS Data, said compressed content being received by a client device comprising: a Descrambler having an input to receive the encrypted compressed content and an output to produce an compressed content, a Watermark (WM) inserter directly connected to the output of the Descrambler, said Descrambler and said WM inserter being connected with a Conditioner, said Conditioner executing the following steps: receiving the CAS Data, decrypting the CAS Data with the transmission key, verifying the signature of the CAS Data, and if the signature is valid, transferring the content key to the descrambler and the pre-marking data to the WM inserter, and watermarking by the WM inserter, the decrypted content received by t
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: August 8, 2017
    Assignee: NAGRAVISION S.A.
    Inventors: Didier Hunacek, Patrick Servet, Minh Son Tran, Pierre Sarda
  • Patent number: 9729320
    Abstract: A semiconductor includes a set of protected hardware resources, where at least one protected hardware resource stores a secure key. The semiconductor also includes a computation kernel and a memory to store a resource enablement module executed by the computation kernel. The resource enablement module selectively enables a protected hardware resource in response to a delivered key corresponding to the secure key.
    Type: Grant
    Filed: February 24, 2015
    Date of Patent: August 8, 2017
    Assignee: Cavium, Inc.
    Inventors: Amer Haider, Muhammad Raghib Hussain, Richard Eugene Kessler
  • Patent number: 9723090
    Abstract: A temporary external secured storage (or “TESS”) system utilizes a group of system tools to aid in the management of digital content. An artificial or virtual chain tool, manager tool and enhanced backup and restoration function tool help the TESS system to efficiently control digital content being managed through the system.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: August 1, 2017
    Inventor: Anthony Tan
  • Patent number: 9723363
    Abstract: Systems and methods are provided herein in relation to notifications about alternative viewing opportunities for recording and playback of media programs. In particular, the systems and methods provide users with information related to alternative recorded programming viewing opportunities for programs scheduled for recording by a user.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: August 1, 2017
    Assignee: Rovi Guides, Inc.
    Inventor: Jon P. Radloff
  • Patent number: 9715592
    Abstract: A security testing framework leverages attack patterns to generate test cases for evaluating security of Multi-Party Web Applications (MPWAs). Attack patterns comprise structured artifacts capturing key information to execute general-purpose attacker strategies. The patterns recognize commonalities between attacks, e.g., abuse of security-critical parameter(s), and the attacker's strategy relating to protocol patterns associated with those parameters. A testing environment is configured to collect several varieties of HTTP traffic. User interaction with the MPWA while running security protocols, is recorded. An inference module executes the recorded symbolic sessions, tagging elements in the HTTP traffic with labels. This labeled HTTP traffic is referenced to determine particular attack patterns that are to be applied, and corresponding specific attack test cases that are to be executed against the MPWA. Attacks are reported back to the tester for evaluation.
    Type: Grant
    Filed: October 16, 2015
    Date of Patent: July 25, 2017
    Assignee: SAP SE
    Inventors: Luca Compagna, Avinash Sudhodanan, Roberto Carbone, Alessandro Armando
  • Patent number: 9712500
    Abstract: A method for determining a compute amount contributed by a device is provided. The method comprises receiving encrypted data from a processor of a customer system and parsing the encrypted data into a plurality of encrypted subsets. Then, the method associates a token specific to the device with an encrypted subset of the plurality of encrypted subsets to produce a packaged subset. The packaged subset is sent to the device. In response, a processed packaged subset that includes the token is received. The compute time contributed by the device is determined from the token of the processed packaged subset.
    Type: Grant
    Filed: September 8, 2015
    Date of Patent: July 18, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew Dow, Eli M. Dow, James P. Gilchrist, Gabriel J. Perez Irizarry, Gary S. Littlefield, Katrin Nagel, Nickalaus A. Painter, Brian R. Prasky
  • Patent number: 9705883
    Abstract: The present invention provides a communications terminal and system and a rights management method, comprising: setting a rights list; listing unique identification information of user identity of each mobile terminal device that is allowed to access to the WiFi hot spot communications terminal; the communications terminal performing authentication on unique identification information in a mobile terminal authentication request; and establishing a connection. It is made convenient for the communications terminal to effectively manage access rights, and the management becomes simpler and easier to operate. Meanwhile, the communications terminal performs authentication on the unique identification information of the user identity, thereby making the authentication process more efficient and improving the security of the authentication process.
    Type: Grant
    Filed: June 19, 2013
    Date of Patent: July 11, 2017
    Assignee: ZTE Corporation
    Inventors: Hong Zhu, Xin Jia
  • Patent number: 9699042
    Abstract: Systems and methods of classifying sessions are disclosed. A particular method monitors user activity at one or more servers accessible via a network and capturing event entries in an activity log for user activity that is detected. The event entries include descriptive information regarding a user action, a client identifier and a session identifier. The method also includes attempting to classify sessions associated with a plurality of event entries of the activity log as legitimate use or illegitimate use of resources of the one or more servers. The method further includes identifying unclassified sessions. The method also includes determining a count of a number of unclassified sessions associated with a particular client identifier and determining a total number of sessions associated with the particular client identifier. The method further includes classifying the unclassified sessions as legitimate use or illegitimate use of the resources of the one or more servers.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: July 4, 2017
    Assignee: A9.com, Inc.
    Inventor: Tevye Rachelson Krynski
  • Patent number: 9697339
    Abstract: An online music networking system that utilizes the internet for coordinating the sharing and listening of music includes a computer having a processor connected to ta network such as the internet. The system includes a player database that includes player records associated with a plurality of “players” who wish to share music with others through the network. A music database includes music records associated with respective players in the player database. A listener database is includes listener records associated with a plurality of “listeners” who wish to listen to music that is associated with respective players. The player may select to listen to a selected one of his music files as a live stream through the internet. A listener may also listen to the same live stream by becoming a “follower” of the player or selected music file, but may not exercise any control over it.
    Type: Grant
    Filed: February 11, 2014
    Date of Patent: July 4, 2017
    Inventors: Tremaine Witter, Hans Dolce
  • Patent number: 9697362
    Abstract: In one aspect, the disclosure provides: A method comprising: assessing a plurality of researchers as a precondition for receiving an invitation to be a researcher of a distributed plurality of researchers, resulting in the distributed plurality of researchers wherein each researcher is associated with one or more tags in records that identify the researcher for one or more attributes; inviting a subset of the distributed plurality of researchers to participate in one or more computer vulnerability research projects directed to identifying computer vulnerabilities of one or more computers that are owned or operated by a third party, the subset of the distributed plurality of researchers selected based on the one or more tags in records that identify the researcher and a description of the computer vulnerabilities of the one or more computers; using a computer that is communicatively coupled to a particular researcher among the subset of the distributed plurality of researchers and a network under test among th
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: July 4, 2017
    Assignee: Synack, Inc.
    Inventors: Jay Kaplan, Mark Kuhr
  • Patent number: 9672379
    Abstract: Techniques described herein can be implemented as one or a combination of methods, systems or processor executed code to form embodiments capable of improved protection of data or other computing resources based at least in part upon limiting access to a select number of delegates. Limited access to cloud data based on customer selected or other criterion, reducing the possibility of security exposures and/or improving privacy is provided for.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: June 6, 2017
    Assignee: salesforce.com, inc.
    Inventor: Prasad Peddada
  • Patent number: 9674222
    Abstract: A method and system are described for detecting unauthorized access to one or more of a plurality of networked victim computers in a victim cloud. The networked victim computers connect to one or more DNS servers. The system includes one or more decoy bot computers, which are operated as victim computers in the victim cloud. The system also includes one or more decoy control computers, which are operated as control computers that communicate with victim computers in the victim cloud. Threats are identified by analyzing data traffic communicated with the decoy bot computers and decoy control computers for information suspected of having being sent from a victim's computer without proper authorization, and by monitoring whether behavior of a DNS server deviates from expected behaviors.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: June 6, 2017
    Assignee: Neustar, Inc.
    Inventor: Rodney L. Joffe