Patents Examined by Khalil Naghdali
  • Patent number: 10742635
    Abstract: A global userID may be linked to many individual locations. A user may login to the global userID and select an experience environment. The experience environment may provide access to locations associated with the experience environment, such as all locations in a country. The user may switch between experience environments without providing login credentials for each individual location the user wishes to view.
    Type: Grant
    Filed: May 21, 2018
    Date of Patent: August 11, 2020
    Assignee: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.
    Inventors: Debdeep Banerjee, Yatharth Chowdhary, Dinesh Reddy Gudibandi, Gautam Gulati, Prasanth Harpanahalli, Edward L. Morabito, Jr.
  • Patent number: 10735432
    Abstract: Aspects of the technology described herein provide a mechanism for controlling access to secure computing resources based on inferred user authentication. A current user may be authenticated and access to secure computing resources permitted based on a determined probability that the current user is a legitimate user associated with the secure computing resource. Legitimacy of the current user may be inferred based on a comparison of user-related activity of the current user to a persona model, which may comprise behavior patterns, rules, or other information for identifying a legitimate user. If it is determined that the current user is likely legitimate, then access to secure information may be permitted. However, if it is determined that the current user is likely illegitimate, than a verification procedure may be provided to the current user, such as a temporal, dynamic security challenge based on recent activity conducted by the legitimate user.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: August 4, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Nadav Bar, Tom Jurgenson
  • Patent number: 10719548
    Abstract: A method for territorial filtering, streaming, and downloading media files over a client-server network with local read-write execution capabilities enables application of digital rights management data across batches of media files without admin having to alter each file, or metadata associated with each file, individually. Media files stored remotely in memory associated with a server are batch-handled for application of digital rights management data. Digital rights management data is applicable to batched files by assignation to particular directories wherein media files stored within a particular directory are associable with particular digital rights management data. Territorial filtering is applied to exclude media files from display as part of a selectable menu whereby users requesting access from certain locations are denied access to media files restricted from playback in that location.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: July 21, 2020
    Inventor: Lee Johnson
  • Patent number: 10713369
    Abstract: The disclosure discloses a method and device for access control. The method includes: when a group of tasks are executed, controlling an access of a subject to an object according to operation permission corresponding to each of the tasks in the group of tasks. The device comprises a control component arranged to, when a group of tasks are executed, control an access of a subject to an object according to operation permission corresponding to each of the tasks in the group of tasks.
    Type: Grant
    Filed: April 17, 2015
    Date of Patent: July 14, 2020
    Assignee: ZTE CORPORATION
    Inventors: Yao Tong, Yihui Peng
  • Patent number: 10706430
    Abstract: Provided herein are systems, methods and computer readable media for consumer monitor and tracking. An example method may include receiving client device ID and client device profile data, comparing client device ID and client device profile data to a plurality of known client device versions, generating an updated known client device version in an instance in which the client device ID correlates to at least one of the plurality of known client device versions and the client device profile data does not correlate to the at least one of the plurality of known client device versions and generating a new known client device version in an instance in which the client device ID does not correlate to at least one of the plurality of known client device versions.
    Type: Grant
    Filed: August 1, 2018
    Date of Patent: July 7, 2020
    Assignee: Groupon, Inc.
    Inventors: Jiaqi Guo, Michael Elizarov, Jim Breen, Selvam Velmurugan
  • Patent number: 10681024
    Abstract: A method, a system, and a non-transitory computer readable program code are disclosed for authenticating users for services. The method includes registering one or more users in an authentication system; assigning a score index to each of the one or more users in the authentication system for one or more services, the score index representing a security level and corresponding authentication required to access each of the one or more services; inputting each request for services from the one or more users into the authentication system to continuously update the score index for each of the one or more users, each of the requests including one or more authenticators or biometric identifiers for the requested service; and requesting the one or more users to register one or more additional authenticators or biometric identifiers with the authentication system upon the score index for a user reaching of a predefined threshold value.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: June 9, 2020
    Assignee: KONICA MINOLTA LABORATORY U.S.A., INC.
    Inventors: Subramanyam Badri, Sarma Sista
  • Patent number: 10681027
    Abstract: A program for light commercial building system (LCBS) solutions. Solutions and other systems may incorporate lightweight alerting service, auto-adjustment of gateway poll rates based on the needs of various consuming applications, detecting loss of space comfort control in a heating, ventilation and air conditioning (HVAC) system, HVAC capacity loss alerting using relative degree days and accumulated stage run time with operational equivalency checks, and HVAC alerting for loss of heat or cool capacity using delta temperature and dependent system properties. Also, incorporated may be triggering a subset of analytics by automatically inferring HVAC equipment details from controller configuration details, ensuring reliability of analytics by retaining logical continuity of HVAC equipment operational data even when controllers and other parts of the system are replaced, and an LCBS gateway with workflow and mechanisms to associate to a contractor account.
    Type: Grant
    Filed: January 19, 2016
    Date of Patent: June 9, 2020
    Assignee: Honeywell International Inc.
    Inventors: Gutha Stalin Sanghamitra, Paul Wacker, Daniel George Heine, Stuart Donaldson
  • Patent number: 10680798
    Abstract: A secure computing device, including: a processor configured to carry out a secure operation; a memory in communication with the processer configured to store secure data; and a memory controller configured control storage of data in the memory and reading data from the memory, wherein the secure data is split into shares before being stored in the memory and wherein the memory controller is configured to: apply a masking storage transform (MST) to one of the shares to produce a masked share before storing the shares in the memory, wherein the MST is a permutation without a fixed point; apply an inverse MST to the masked share when reading the shares from the memory; and combine the read shares to reconstruct the secure data.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: June 9, 2020
    Assignee: NXP USA, Inc.
    Inventors: Miroslav Knezevic, Ventzislav Nikov
  • Patent number: 10671744
    Abstract: Lightweight trusted execution technologies for internet-of-things devices are described. In response to a memory request at a page unit from an application executing in a current domain, the page unit is to map a current virtual address (VA) to a current physical address (PA). The policy enforcement logic (PEL) reads, from a secure domain cache (SDC), a domain value (DID) and a VA value that correspond to the current PA. The PEL grants access when the current domain and the DID correspond to the unprotected region or the current domain and the DID correspond to the secure domain region, the current domain is equal to the DID, and the current VA is equal to the VA value. The PEL grants data access and denies code access when the current domain corresponds to the secure domain region and the DID corresponds to the unprotected region.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: June 2, 2020
    Assignee: Intel Corporation
    Inventors: Li Zhao, Manoj R. Sastry, Arnab Raha
  • Patent number: 10673869
    Abstract: A method for identifying malicious encrypted network traffic communicated via a computer network is disclosed. A malicious encrypted traffic detector is also disclosed.
    Type: Grant
    Filed: February 16, 2015
    Date of Patent: June 2, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, George Kallos, Ben Azvine
  • Patent number: 10664591
    Abstract: The disclosed technology is generally directed to secure transactions. In one example of the technology, an enclave pool is formed. The enclave pool may include a plurality of enclaves that are secure execution environments. In some examples, forming the enclave pool includes registering the enclaves of the enclave pool. A request to allocate an enclave from the enclave pool may be received. An enclave may be fetched from the enclave pool responsive to the request to assign the enclave. Cryptlet code is executed in the fetched enclave such that a payload is generated in the enclave. The payload can be digitally signed and/or encrypted by the cryptlet, and can also be digitally signed by the enclave. The fetched enclave may be deallocated.
    Type: Grant
    Filed: May 11, 2017
    Date of Patent: May 26, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: John Marley Gray
  • Patent number: 10666668
    Abstract: A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.
    Type: Grant
    Filed: January 28, 2019
    Date of Patent: May 26, 2020
    Assignee: Splunk Inc.
    Inventors: Sudhakar Muddu, Christos Tryfonas
  • Patent number: 10659493
    Abstract: A method of detecting malicious electronic messages transmitted from at least one message sending device to at least one message receiving device includes: generating at least one signature for an electronic message; storing the generated signature in a data storage unit; determining whether the electronic message is malicious; if the electronic message is determined to be malicious, determining on the basis of the generated signature, whether electronic messages comparable to the determined malicious message were classified as non-malicious and transmitted to the message receiving device in the past; and if it is determined that electronic messages comparable to the determined malicious message were classified as non-malicious and transmitted to the message receiving device in the past, notifying the message receiving device about a potential threat. Also disclosed are a messaging server and a messaging system implementing the above described method.
    Type: Grant
    Filed: December 23, 2016
    Date of Patent: May 19, 2020
    Assignee: retarus GmbH
    Inventors: Martin Hager, Michael Grauvogl
  • Patent number: 10652221
    Abstract: Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party server. The first identifier vector can include a first identifier, first parameters, and second parameters. The system can receive, from the third party server, the first identifier vector encrypted based on a third-party encryption. The system can receive, from the third party server, a second identifier vector encrypted based on the third-party encryption associated with the third party server. The second identifier vector can include a second identifier, third parameters, and fourth parameters. The system can determine a correlation count between the first identifier vector and the second identifier vector. The system can determine that the first identifier corresponds to the second identifier based on the correlation count. The system can generate one identifier key for both the first identifier and the second identifier.
    Type: Grant
    Filed: December 11, 2018
    Date of Patent: May 12, 2020
    Assignee: Google LLC
    Inventors: Mahyar Salek, Philip McDonnell, Vinod Kumar Ramachandran, Shobhit Saxena, David Owen Shanahan
  • Patent number: 10614222
    Abstract: Systems, devices, and methods of an automatic attack testing framework for the security testing of an operational service are disclosed. In an example, such systems, devices, and methods may include operations that: deploy command instructions and a payload for a bot process to a computing device located within a target infrastructure, with the command instructions being selected based on criteria to test a security feature in the target infrastructure with an automated attack action in the bot process, and with the bot process being executed on the computing device and being started with use of the command instructions and the payload; communicate with the computing device to control the automated attack action within the target infrastructure, such that the automated attack action is performed within the bot process; and obtain results of the automated attack action performed within the bot process from the computing device.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: April 7, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Benjamin J. Godard, Art Sadovsky, Travis W. Rhodes, David A. Marshall, Richard A. Lundeen
  • Patent number: 10609050
    Abstract: According to some embodiments, a method for training a malware detector comprising a deep learning algorithm is described, which comprises converting a set of malware files and non malware files into vectors by using a feature based dictionary, and/or by using a conversion into an image, and providing prospects that the files constitute malware. Various features and combinations of features are described to build a feature based dictionary and adapt its size. According to some embodiments, a method for detecting a malware by using a malware detector comprising a deep learning algorithm is described, which comprises converting a file into a vector by using a feature based dictionary, and/or by using a conversion into an image, and providing prospects that the file constitutes malware. Methods for providing a plurality of prospects and aggregating these prospects are provided. Additional methods and systems in the field of malware detection are also described.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: March 31, 2020
    Assignee: DEEP INSTINCT LTD.
    Inventors: Guy Caspi, Yoel Neeman, Doron Cohen, Nadav Maman, Eli David, Ishai Rosenberg
  • Patent number: 10608828
    Abstract: Providing revocation status of at least one associated credential includes providing a primary credential that is at least initially independent of the associated credential, binding the at least one associated credential to the primary credential, and deeming the at least one associated credential to be revoked if the primary credential is revoked. Providing revocation status of at least one associated credential may also include deeming the at least one associated credential to be not revoked if the primary credential is not revoked. Binding may be independent of the contents of the credentials and may be independent of whether any of the credentials authenticate any other ones of the credentials. The at least one associated credential may be provided on an integrated circuit card (ICC). The ICC may be part of a mobile phone or a smart card.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: March 31, 2020
    Assignee: ASSA ABLOY AB
    Inventors: Eric F. Le Saint, Robert F. Dulude
  • Patent number: 10609016
    Abstract: A wireless communication system includes an external provider subsystem and an electronic network subsystem in operable communication with the external provider subsystem. The electronic network subsystem is configured to provide a first microservice and a second microservice different from the first microservice. The wireless communication system further includes an in-home subsystem (i) separate from the external provider subsystem, (ii) in operable communication with the electronic network subsystem, and (iii) including a first micronet and a second micronet different from the first micronet. The first micronet is configured to operably interact with the first microservice, and the second micronet is configured to operably interact with the second microservice. The wireless communication system further includes at least one electronic device configured to operably connect with one of the first micronet and the second micronet.
    Type: Grant
    Filed: August 31, 2018
    Date of Patent: March 31, 2020
    Assignee: Cable Television Laboratories, Inc
    Inventors: Steven J. Goeringer, Brian Alexander Scriber, Michael Glenn
  • Patent number: 10608816
    Abstract: A network-based biometric authentication system includes a client computer (10), a third party server (24), and a biometric authentication server (26). A user requests access to a web site hosted by the third party server via the client computer, wherein the third party server communicates a deployable object to the client computer. The client computer executes the deployable object, wherein the object enables the client computer to receive a user name, password, and biometric data from the user and to communicate the user name, password, and biometric data to the biometric authentication server in a secure fashion. The biometric authentication server authenticates the user name, password, and biometric data, and communicates the user name and password to the third party server, which attempts to verify the user name and password in a conventional manner and grants access to the user if the user name and password are verified.
    Type: Grant
    Filed: July 16, 2012
    Date of Patent: March 31, 2020
    Assignee: Ceelox Patents, LLC
    Inventors: Erix Pizano, Kass Aiken
  • Patent number: 10608991
    Abstract: System, methods, and apparatuses enable a network security system to more efficiently perform pattern matching against data items. For example, the disclosed approaches may be used to improve the way in which a deep packet inspection (DPI) microservice performs pattern matching against data items (e.g., network traffic, files, email messages, etc.) in order to detect various types of network security threats (e.g., network intrusion attempts, viruses, spam, and other potential network security issues). A DPI microservice generally refers to an executable component of a network security system that monitors and performs actions relative to input data items for purposes related to computer network security.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: March 31, 2020
    Assignee: ShieldX Networks, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Manuel Nedbal, Sumanth Gangashanaiah