Patents Examined by Khalil Naghdali
-
Patent number: 10742635Abstract: A global userID may be linked to many individual locations. A user may login to the global userID and select an experience environment. The experience environment may provide access to locations associated with the experience environment, such as all locations in a country. The user may switch between experience environments without providing login credentials for each individual location the user wishes to view.Type: GrantFiled: May 21, 2018Date of Patent: August 11, 2020Assignee: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.Inventors: Debdeep Banerjee, Yatharth Chowdhary, Dinesh Reddy Gudibandi, Gautam Gulati, Prasanth Harpanahalli, Edward L. Morabito, Jr.
-
Patent number: 10735432Abstract: Aspects of the technology described herein provide a mechanism for controlling access to secure computing resources based on inferred user authentication. A current user may be authenticated and access to secure computing resources permitted based on a determined probability that the current user is a legitimate user associated with the secure computing resource. Legitimacy of the current user may be inferred based on a comparison of user-related activity of the current user to a persona model, which may comprise behavior patterns, rules, or other information for identifying a legitimate user. If it is determined that the current user is likely legitimate, then access to secure information may be permitted. However, if it is determined that the current user is likely illegitimate, than a verification procedure may be provided to the current user, such as a temporal, dynamic security challenge based on recent activity conducted by the legitimate user.Type: GrantFiled: January 18, 2019Date of Patent: August 4, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Nadav Bar, Tom Jurgenson
-
Patent number: 10719548Abstract: A method for territorial filtering, streaming, and downloading media files over a client-server network with local read-write execution capabilities enables application of digital rights management data across batches of media files without admin having to alter each file, or metadata associated with each file, individually. Media files stored remotely in memory associated with a server are batch-handled for application of digital rights management data. Digital rights management data is applicable to batched files by assignation to particular directories wherein media files stored within a particular directory are associable with particular digital rights management data. Territorial filtering is applied to exclude media files from display as part of a selectable menu whereby users requesting access from certain locations are denied access to media files restricted from playback in that location.Type: GrantFiled: October 15, 2018Date of Patent: July 21, 2020Inventor: Lee Johnson
-
Patent number: 10713369Abstract: The disclosure discloses a method and device for access control. The method includes: when a group of tasks are executed, controlling an access of a subject to an object according to operation permission corresponding to each of the tasks in the group of tasks. The device comprises a control component arranged to, when a group of tasks are executed, control an access of a subject to an object according to operation permission corresponding to each of the tasks in the group of tasks.Type: GrantFiled: April 17, 2015Date of Patent: July 14, 2020Assignee: ZTE CORPORATIONInventors: Yao Tong, Yihui Peng
-
Patent number: 10706430Abstract: Provided herein are systems, methods and computer readable media for consumer monitor and tracking. An example method may include receiving client device ID and client device profile data, comparing client device ID and client device profile data to a plurality of known client device versions, generating an updated known client device version in an instance in which the client device ID correlates to at least one of the plurality of known client device versions and the client device profile data does not correlate to the at least one of the plurality of known client device versions and generating a new known client device version in an instance in which the client device ID does not correlate to at least one of the plurality of known client device versions.Type: GrantFiled: August 1, 2018Date of Patent: July 7, 2020Assignee: Groupon, Inc.Inventors: Jiaqi Guo, Michael Elizarov, Jim Breen, Selvam Velmurugan
-
Patent number: 10681024Abstract: A method, a system, and a non-transitory computer readable program code are disclosed for authenticating users for services. The method includes registering one or more users in an authentication system; assigning a score index to each of the one or more users in the authentication system for one or more services, the score index representing a security level and corresponding authentication required to access each of the one or more services; inputting each request for services from the one or more users into the authentication system to continuously update the score index for each of the one or more users, each of the requests including one or more authenticators or biometric identifiers for the requested service; and requesting the one or more users to register one or more additional authenticators or biometric identifiers with the authentication system upon the score index for a user reaching of a predefined threshold value.Type: GrantFiled: May 31, 2017Date of Patent: June 9, 2020Assignee: KONICA MINOLTA LABORATORY U.S.A., INC.Inventors: Subramanyam Badri, Sarma Sista
-
Patent number: 10681027Abstract: A program for light commercial building system (LCBS) solutions. Solutions and other systems may incorporate lightweight alerting service, auto-adjustment of gateway poll rates based on the needs of various consuming applications, detecting loss of space comfort control in a heating, ventilation and air conditioning (HVAC) system, HVAC capacity loss alerting using relative degree days and accumulated stage run time with operational equivalency checks, and HVAC alerting for loss of heat or cool capacity using delta temperature and dependent system properties. Also, incorporated may be triggering a subset of analytics by automatically inferring HVAC equipment details from controller configuration details, ensuring reliability of analytics by retaining logical continuity of HVAC equipment operational data even when controllers and other parts of the system are replaced, and an LCBS gateway with workflow and mechanisms to associate to a contractor account.Type: GrantFiled: January 19, 2016Date of Patent: June 9, 2020Assignee: Honeywell International Inc.Inventors: Gutha Stalin Sanghamitra, Paul Wacker, Daniel George Heine, Stuart Donaldson
-
Patent number: 10680798Abstract: A secure computing device, including: a processor configured to carry out a secure operation; a memory in communication with the processer configured to store secure data; and a memory controller configured control storage of data in the memory and reading data from the memory, wherein the secure data is split into shares before being stored in the memory and wherein the memory controller is configured to: apply a masking storage transform (MST) to one of the shares to produce a masked share before storing the shares in the memory, wherein the MST is a permutation without a fixed point; apply an inverse MST to the masked share when reading the shares from the memory; and combine the read shares to reconstruct the secure data.Type: GrantFiled: February 15, 2017Date of Patent: June 9, 2020Assignee: NXP USA, Inc.Inventors: Miroslav Knezevic, Ventzislav Nikov
-
Patent number: 10671744Abstract: Lightweight trusted execution technologies for internet-of-things devices are described. In response to a memory request at a page unit from an application executing in a current domain, the page unit is to map a current virtual address (VA) to a current physical address (PA). The policy enforcement logic (PEL) reads, from a secure domain cache (SDC), a domain value (DID) and a VA value that correspond to the current PA. The PEL grants access when the current domain and the DID correspond to the unprotected region or the current domain and the DID correspond to the secure domain region, the current domain is equal to the DID, and the current VA is equal to the VA value. The PEL grants data access and denies code access when the current domain corresponds to the secure domain region and the DID corresponds to the unprotected region.Type: GrantFiled: June 23, 2016Date of Patent: June 2, 2020Assignee: Intel CorporationInventors: Li Zhao, Manoj R. Sastry, Arnab Raha
-
Patent number: 10673869Abstract: A method for identifying malicious encrypted network traffic communicated via a computer network is disclosed. A malicious encrypted traffic detector is also disclosed.Type: GrantFiled: February 16, 2015Date of Patent: June 2, 2020Assignee: British Telecommunications Public Limited CompanyInventors: Fadi El-Moussa, George Kallos, Ben Azvine
-
Patent number: 10664591Abstract: The disclosed technology is generally directed to secure transactions. In one example of the technology, an enclave pool is formed. The enclave pool may include a plurality of enclaves that are secure execution environments. In some examples, forming the enclave pool includes registering the enclaves of the enclave pool. A request to allocate an enclave from the enclave pool may be received. An enclave may be fetched from the enclave pool responsive to the request to assign the enclave. Cryptlet code is executed in the fetched enclave such that a payload is generated in the enclave. The payload can be digitally signed and/or encrypted by the cryptlet, and can also be digitally signed by the enclave. The fetched enclave may be deallocated.Type: GrantFiled: May 11, 2017Date of Patent: May 26, 2020Assignee: Microsoft Technology Licensing, LLCInventor: John Marley Gray
-
Patent number: 10666668Abstract: A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.Type: GrantFiled: January 28, 2019Date of Patent: May 26, 2020Assignee: Splunk Inc.Inventors: Sudhakar Muddu, Christos Tryfonas
-
Patent number: 10659493Abstract: A method of detecting malicious electronic messages transmitted from at least one message sending device to at least one message receiving device includes: generating at least one signature for an electronic message; storing the generated signature in a data storage unit; determining whether the electronic message is malicious; if the electronic message is determined to be malicious, determining on the basis of the generated signature, whether electronic messages comparable to the determined malicious message were classified as non-malicious and transmitted to the message receiving device in the past; and if it is determined that electronic messages comparable to the determined malicious message were classified as non-malicious and transmitted to the message receiving device in the past, notifying the message receiving device about a potential threat. Also disclosed are a messaging server and a messaging system implementing the above described method.Type: GrantFiled: December 23, 2016Date of Patent: May 19, 2020Assignee: retarus GmbHInventors: Martin Hager, Michael Grauvogl
-
Patent number: 10652221Abstract: Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party server. The first identifier vector can include a first identifier, first parameters, and second parameters. The system can receive, from the third party server, the first identifier vector encrypted based on a third-party encryption. The system can receive, from the third party server, a second identifier vector encrypted based on the third-party encryption associated with the third party server. The second identifier vector can include a second identifier, third parameters, and fourth parameters. The system can determine a correlation count between the first identifier vector and the second identifier vector. The system can determine that the first identifier corresponds to the second identifier based on the correlation count. The system can generate one identifier key for both the first identifier and the second identifier.Type: GrantFiled: December 11, 2018Date of Patent: May 12, 2020Assignee: Google LLCInventors: Mahyar Salek, Philip McDonnell, Vinod Kumar Ramachandran, Shobhit Saxena, David Owen Shanahan
-
Patent number: 10614222Abstract: Systems, devices, and methods of an automatic attack testing framework for the security testing of an operational service are disclosed. In an example, such systems, devices, and methods may include operations that: deploy command instructions and a payload for a bot process to a computing device located within a target infrastructure, with the command instructions being selected based on criteria to test a security feature in the target infrastructure with an automated attack action in the bot process, and with the bot process being executed on the computing device and being started with use of the command instructions and the payload; communicate with the computing device to control the automated attack action within the target infrastructure, such that the automated attack action is performed within the bot process; and obtain results of the automated attack action performed within the bot process from the computing device.Type: GrantFiled: February 21, 2017Date of Patent: April 7, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Benjamin J. Godard, Art Sadovsky, Travis W. Rhodes, David A. Marshall, Richard A. Lundeen
-
Patent number: 10609050Abstract: According to some embodiments, a method for training a malware detector comprising a deep learning algorithm is described, which comprises converting a set of malware files and non malware files into vectors by using a feature based dictionary, and/or by using a conversion into an image, and providing prospects that the files constitute malware. Various features and combinations of features are described to build a feature based dictionary and adapt its size. According to some embodiments, a method for detecting a malware by using a malware detector comprising a deep learning algorithm is described, which comprises converting a file into a vector by using a feature based dictionary, and/or by using a conversion into an image, and providing prospects that the file constitutes malware. Methods for providing a plurality of prospects and aggregating these prospects are provided. Additional methods and systems in the field of malware detection are also described.Type: GrantFiled: December 14, 2018Date of Patent: March 31, 2020Assignee: DEEP INSTINCT LTD.Inventors: Guy Caspi, Yoel Neeman, Doron Cohen, Nadav Maman, Eli David, Ishai Rosenberg
-
Patent number: 10608828Abstract: Providing revocation status of at least one associated credential includes providing a primary credential that is at least initially independent of the associated credential, binding the at least one associated credential to the primary credential, and deeming the at least one associated credential to be revoked if the primary credential is revoked. Providing revocation status of at least one associated credential may also include deeming the at least one associated credential to be not revoked if the primary credential is not revoked. Binding may be independent of the contents of the credentials and may be independent of whether any of the credentials authenticate any other ones of the credentials. The at least one associated credential may be provided on an integrated circuit card (ICC). The ICC may be part of a mobile phone or a smart card.Type: GrantFiled: November 13, 2017Date of Patent: March 31, 2020Assignee: ASSA ABLOY ABInventors: Eric F. Le Saint, Robert F. Dulude
-
Patent number: 10609016Abstract: A wireless communication system includes an external provider subsystem and an electronic network subsystem in operable communication with the external provider subsystem. The electronic network subsystem is configured to provide a first microservice and a second microservice different from the first microservice. The wireless communication system further includes an in-home subsystem (i) separate from the external provider subsystem, (ii) in operable communication with the electronic network subsystem, and (iii) including a first micronet and a second micronet different from the first micronet. The first micronet is configured to operably interact with the first microservice, and the second micronet is configured to operably interact with the second microservice. The wireless communication system further includes at least one electronic device configured to operably connect with one of the first micronet and the second micronet.Type: GrantFiled: August 31, 2018Date of Patent: March 31, 2020Assignee: Cable Television Laboratories, IncInventors: Steven J. Goeringer, Brian Alexander Scriber, Michael Glenn
-
Patent number: 10608816Abstract: A network-based biometric authentication system includes a client computer (10), a third party server (24), and a biometric authentication server (26). A user requests access to a web site hosted by the third party server via the client computer, wherein the third party server communicates a deployable object to the client computer. The client computer executes the deployable object, wherein the object enables the client computer to receive a user name, password, and biometric data from the user and to communicate the user name, password, and biometric data to the biometric authentication server in a secure fashion. The biometric authentication server authenticates the user name, password, and biometric data, and communicates the user name and password to the third party server, which attempts to verify the user name and password in a conventional manner and grants access to the user if the user name and password are verified.Type: GrantFiled: July 16, 2012Date of Patent: March 31, 2020Assignee: Ceelox Patents, LLCInventors: Erix Pizano, Kass Aiken
-
Patent number: 10608991Abstract: System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed approaches may be used to improve the way in which a deep packet inspection (DPI) microservice performs pattern matching against data items (e.g., network traffic, files, email messages, etc.) in order to detect various types of network security threats (e.g., network intrusion attempts, viruses, spam, and other potential network security issues). A DPI microservice generally refers to an executable component of a network security system that monitors and performs actions relative to input data items for purposes related to computer network security.Type: GrantFiled: February 14, 2019Date of Patent: March 31, 2020Assignee: ShieldX Networks, Inc.Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Sumanth Gangashanaiah