Patents Examined by Khalil Naghdali
-
Patent number: 10956553Abstract: A method of unlocking an electronic device, an unlocking device and system and a storage medium are provided. The method includes: acquiring at least one image to be authenticated, in which the image to be authenticated is an RGB image or an infrared image; obtaining an RGB image authentication result of the image to be authenticated by RGB object authentication of the image to be authenticated in a case where the image to be authenticated is the RGB image, and obtaining an infrared image authentication result of the image to be authenticated by infrared object authentication of the image to be authenticated in a case where the image to be authenticated is the infrared image; and determining whether to unlock the electronic device according to at least one of the RGB image authentication result and the infrared image authentication result.Type: GrantFiled: September 28, 2018Date of Patent: March 23, 2021Assignee: BEIJING KUANGSHI TECHNOLOGY CO., LTD.Inventor: Yuan Kong
-
Patent number: 10958665Abstract: Methods and systems for tag-based identification include receiving a set of parameters at a user device from a remote server. A counterfeit-proof identification tag is read using a sensor in the user device using the set of parameters. Features of the counterfeit-proof identification tag are extracted in accordance with a feature extraction function, using a processor, to generate a tag bit sequence. A challenge function is applied to the extracted features to generate a result. The result is transmitted to the remote server to authenticate the counterfeit-proof identification tag. The counterfeit-proof identification tag is authenticated with a tag database at the remote server.Type: GrantFiled: September 6, 2019Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Jean-Olivier Plouchart, Wendy Chong, Alberto Valdes Garcia, Petros Zerfos
-
Patent number: 10951618Abstract: Security credentials issued by an entity, such as an identity broker, can have a limited lifetime. Access to resources or content under those credentials then can only be obtained for a limited period of time, limiting the ability of an unauthorized entity obtaining the credentials to utilize those credentials for access. Along with the credentials, a refresh token can be issued to a requesting client that can enable the limited lifetime of the credentials to be renewed up to a maximum lifetime of the credentials and/or the token. A service providing access can determine that the client has a valid copy of the refresh token when the credentials are about to expire, and if so can cause the lifetime of the credentials to be extended another credential lifetime. This renewal can be done transparent to a user and without again contacting the identity broker.Type: GrantFiled: December 5, 2019Date of Patent: March 16, 2021Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Graeme David Baer, Dmitry Frenkel, Marc R. Barbour
-
Patent number: 10944791Abstract: A system for predicting vulnerability of network resources is provided. The system can calculate an initial vulnerability score for each of the network resources and use the initial vulnerability scores along with activity data of the network resources to train a vulnerability model. After training, the vulnerability model can predict the vulnerability of the network resources based on new activity data collected from the network resources. Based on the predicted vulnerability, vulnerable network resources can be identified. Further analysis can be performed by comparing the activities of the vulnerable network resources and other network resources to identify activity patterns unique to the vulnerable network resources as attack patterns. Based on the attack patterns, one or more actions can be taken to increase the security of the vulnerable network resources to avoid further vulnerability.Type: GrantFiled: August 27, 2018Date of Patent: March 9, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Yotam Livny, Mathias Abraham Marc Scherman, Moshe Israel, Ben Kliger, Ram Haim Pliskin, Roy Levin, Michael Zeev Bargury
-
Patent number: 10944780Abstract: Dynamic Software Defined Networking (DSDN) systems and methods provide secure and isolated subnetworks within a larger network. Each subnetwork may be formed with varied policies and communication restrictions based on at least device type, device grouping, and risk level. The DSDN systems and methods may also be applied to form a network, with or without subnetworks, of devices that are spatially separated, thereby reducing the attack surface of the DSDN-formed network.Type: GrantFiled: October 2, 2019Date of Patent: March 9, 2021Assignee: Cable Television Laboratories, Inc.Inventor: Michael Glenn
-
Patent number: 10942991Abstract: Parental control of child's web-based digital content experience, which can be applied to other contexts such as education, the workplace or other organizations. Trust relationships authorize specified users or organizations to permit access to content or resources by other users. Collection curation including content reputation and age appropriate ratings disclosed.Type: GrantFiled: April 1, 2019Date of Patent: March 9, 2021Assignee: Kiddofy, LLCInventor: Eric D. Kidd
-
Patent number: 10938841Abstract: A guard sensor injects a multi-GHz (multi giga-bit) guard signal along a guard signal transmission path above an observable knee in the amplitude response of the path to define a guarded region and to detect physical or electromagnetic intrusions of that guarded region. At frequencies above the knee, the signal transmission path exhibits increasingly non-linear and even chaotic behavior that improves the overall sensitivity of the sensor and its ability to detect slight changes in the distributed transmission parameters that characterize circuit devices, signal paths and signals. The guarded region may be used to protect a combination of circuit devices, physical connections, interfaces, high and low frequency signal transmission paths and signals.Type: GrantFiled: October 22, 2018Date of Patent: March 2, 2021Assignee: Raytheon CompanyInventors: William Jennings, John Hoffman
-
Patent number: 10938807Abstract: A computing system includes a virtualization server to provide a virtual session, and a client device communicating with the virtualization server and displaying the virtual session. The client device includes a camera for generating user images of a user of the client device. A user validator includes a policy database for security enforcement, and analyzes the user images and selects at least one policy from the policy database based on the analyzed images. The at least one policy provides at least one action to be taken by the computing system to protect the virtual session.Type: GrantFiled: July 11, 2018Date of Patent: March 2, 2021Assignee: CITRIX SYSTEMS, INC.Inventor: Hao Wu
-
Patent number: 10929530Abstract: Systems and methods for monitoring activity within High Definition Multimedia Interface (HDMI) enabled consumer electronics control (CEC) devices and their networks and identifying unexpected and/or suspicious activity within the network are provided. CEC message packets and packet attribute analysis can be used to identify unexpected and/or suspicious CEC activity within two or more interconnected HDMI devices. Three fundamental steps can be used: a data collection step can capture CEC activity occurring within an HDMI distribution; a data processing step can correlate data into a packet analysis process to create a model later used for evaluation; and a decision process step can use the model created in the data processing step to determine if activity occurring within the HDMI distribution is expected or unexpected.Type: GrantFiled: July 27, 2020Date of Patent: February 23, 2021Assignee: The Florida International University Board of TrusteesInventors: Luis C. Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac
-
Patent number: 10922416Abstract: A device includes processing circuitry configured to receive node data including attributes from at least one computing device, organize the node data into one or more node groupings, wherein each node grouping includes nodes of the node data having one or more shared attributes, determine a node grouping processing scheme based on one or more transient event detection priorities, and detect, in response to executing the node grouping processing scheme for each of the one or more node groupings, one or more transient event occurrences within the one or more node groupings.Type: GrantFiled: May 9, 2017Date of Patent: February 16, 2021Assignee: FEDERAL HOME LOAN MORTGAGE CORPORATIONInventor: Dylan Nielson
-
Patent number: 10915645Abstract: A system for secure storage audit verification includes a transaction pool and a processor. The transaction pool stores transactions records for a Key Release System (KRS) Audit Agent or a Key Management System (KMS) Audit Agent. The processor is configured to select a transaction, wherein the transaction is awaiting verification in the transaction pool; determine whether the transaction is old; in response to the transaction not being old, select a new transaction; and in response to the transaction being old, indicate to suspend processing of the transaction.Type: GrantFiled: September 19, 2019Date of Patent: February 9, 2021Assignee: Workday, Inc.Inventors: Bjorn Hamel, Jonathan David Ruggiero
-
Patent number: 10911457Abstract: Policy changes are propagated to access control devices of a distributed system. The policy changes are given immediate effect without having to wait for the changes to propagate through the system. A token comprises the policy change and can be provided in connection with access requests. Before an access control device has received a propagated policy change, the access control device can evaluate a token provided in connection with a request to determine, consistent with the policy change, whether to fulfill the request.Type: GrantFiled: March 8, 2019Date of Patent: February 2, 2021Assignee: Amazon Technologies, Inc.Inventors: Gregory Branchek Roth, Matthew James Wren
-
Patent number: 10902098Abstract: A method for encrypting logic includes generating, by a computing system, locking logic for inclusion in a logic circuit. The locking logic is generated based at least in part on an error rate and an attack complexity. The method also includes inserting, by the computing system, a one-way function into the locking logic. The method further includes applying, by the computing system, obfuscation logic to the logic circuit, where the obfuscation logic is applied on top of the locking logic.Type: GrantFiled: July 11, 2018Date of Patent: January 26, 2021Assignee: Northwestern UniversityInventor: Hai Zhou
-
Patent number: 10893024Abstract: Methods and apparatus for private network peering in virtual network environments in which peerings between virtual client private networks on a provider network may be established by clients via an API to a peering service. The peering service and API 104 may allow clients to dynamically establish and manage virtual network transit centers on the provider network at which virtual ports may be established and configured, virtual peerings between private networks may be requested and, if accepted, established, and routing information for the peerings may be specified and exchanged. Once a virtual peering between client private networks is established, packets may be exchanged between the respective client private networks via the peering over the network substrate according to the overlay network technology used by the provider network, for example an encapsulation protocol technology.Type: GrantFiled: January 25, 2019Date of Patent: January 12, 2021Assignee: Amazon Technologies, Inc.Inventors: Bashuman Deb, Andrew Bruce Dickinson, Christopher Ian Hendrie
-
Patent number: 10893060Abstract: A system and a method are disclosed for determining that a first electronic communication, received in a first private repository of a user, has been identified (e.g., flagged) as including a threat, and determining a probability that the first electronic communication includes the threat. In response to determining that the probability exceeds a threshold probability, the system monitors monitoring for a second electronic communication, received in a second private repository, that includes contents that match the contents of the first electronic communication.Type: GrantFiled: April 5, 2019Date of Patent: January 12, 2021Assignee: MATERIAL SECURITY INC.Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park
-
Patent number: 10891358Abstract: Methods, systems, and computer-readable media for industrial control software execution management. For example, there is provided a method for enabling a software module included in a plurality of software modules of an application package installed on a computing device configured to control a turbomachine of an industrial plant. The method can include receiving, by a processor of the computing device, a request for executing the software module. The method can include generating and sending an activation request to a remote server. The method can include generating, by the remote server, an activation code if a verification protocol is successfully completed. The method can include forwarding the activation code to the computing device. The method can include activating the software module when the activation code is received by the processor.Type: GrantFiled: January 13, 2017Date of Patent: January 12, 2021Assignee: NUOVO PIGNONE TECNOLOGIE SRLInventors: Stefano Truschi, Virginia Castelli, Carlo Snickars
-
Patent number: 10878105Abstract: Disclosed herein are methods and systems of identifying vulnerabilities of an application. An exemplary method comprises identifying at least one function in executable code of the application according to at least one rule for modification of functions, adding an interception code to the executable code of the application upon launching of the application, executing the application with the added interception code, collecting, by the interception code, data relating to function calls performed by the application during execution, analyzing the collected data based on criteria for safe execution of applications, wherein the criteria comprises a range of permissible values of arguments of intercepted function calls and identifying inconsistencies between the analyzed data and the criteria for safe execution of applications, wherein the inconsistencies indicate vulnerabilities in the application.Type: GrantFiled: September 6, 2018Date of Patent: December 29, 2020Assignee: AO KASPERSKY LABInventors: Alexander V. Kalinin, Sergey A. Rumyantsev, Igor Y. Kumagin
-
Patent number: 10873599Abstract: Computer systems and methods are provided for storing a first path profile. A computing device receives a first request to access a first location of a website, transmits the first request to a server, and receives a first cookie that includes identifying information for the first location. In response to receiving the first cookie, the device stores the identifying information. The device receives a second request to access a second location of the web site that is distinct from the first location. The second request includes the identifying information for the first location. The device transmits the second request to the server and receives a second cookie that includes the identifying information for the first location and for the second location. In response to receiving the second cookie, the device stores the first path profile that includes the identifying information for the first location and the second location.Type: GrantFiled: July 11, 2018Date of Patent: December 22, 2020Assignee: ZYCADA NETWORKS, INC.Inventors: Subramanian Varadarajan, Rosarin Roy Antonyraj
-
Patent number: 10873577Abstract: The subject disclosure relates to employing sourcing and generation components to facilitate a generation of identity data. In an example, a system comprising a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory, comprise a sourcing component and a generation component. In an aspect, the sourcing component can source, by a user device comprising the processor, a set of biometric data and a set of statistical data. In another aspect, a generation component can generate, by the user device, a set of identification data based on an interpolation of the set of biometric data and the set of statistical data.Type: GrantFiled: August 17, 2018Date of Patent: December 22, 2020Inventor: Evgeny Chereshnev
-
Patent number: 10873773Abstract: Systems, methods and computer readable media for providing users with encrypted content data associated with a service are disclosed. A device may receive first content data. The device may encrypt the first content data using a first key to obtain first encrypted data. The device may generate second encrypted data by applying a cipher substitution to the first encrypted data using a second key. The device may cause to send the second encrypted data to a second device.Type: GrantFiled: July 19, 2018Date of Patent: December 22, 2020Assignee: COX COMMUNICATIONS, INC.Inventor: Kinney C. Bacon