Patents Examined by Lisa Lewis
  • Patent number: 9882825
    Abstract: A first computing device is provided for transmitting one or more volumes via a secured connection. The first computing device includes a volume service that is executable by one or more processors and is configured to instruct a cloud computing device to generate a worker virtual machine. The volume service is also configured to provide, via a connection different from the secured connection, a random number to the worker virtual machine. The volume service is further configured to instruct the cloud computing device to generate one or more target volumes associated with the cloud computing service and to associate the one or more target volumes with the worker virtual machine. The volume service is further instructed to provide, irrespective of the content type of the volumes and the size of the volumes, the one or more volumes to the worker virtual machine via the secured connection.
    Type: Grant
    Filed: March 13, 2015
    Date of Patent: January 30, 2018
    Assignee: Citrix Systems, Inc.
    Inventors: Simon Waterhouse, Donal Lafferty
  • Patent number: 9882927
    Abstract: Improved techniques involve testing periodicity at a given period based on locations of clicks within a sampling window whose duration is a multiple of the given period. Along these lines, when a testing server receives a click stream from a client machine, the testing server assigns a timestamp to each of the clicks in the click stream. The testing server generates a list of candidate periods at which periodicity of the click stream is to be tested. For each of the candidate periods, the testing server forms a sampling window whose duration is a multiple of that candidate period and tests whether the click stream is periodic based on the locations of the clicks within the sampling window. If indeed the testing server finds that the click stream is periodic at any of the candidate periods, the testing server may send an alert to a security entity to indicate that suspect activity has been identified.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: January 30, 2018
    Assignee: EMC IP Holding Company LLC
    Inventor: Richard Chiles
  • Patent number: 9874869
    Abstract: The present invention detects abnormality in a control network in which a normal pattern of communication changes in accordance with the state of a control system. A normal pattern of communication between devices is stored for each state, information indicating the system state is acquired to determine the system state, and information indicating the pattern of communication between devices is acquired to determine the pattern of communication. Then, by determining, on the basis of the determined pattern of communication and the pattern of communication stored as a normal pattern of communication in the determined system state, whether system abnormality has occurred, it is possible to enhance the availability and reliability of the control network.
    Type: Grant
    Filed: March 29, 2013
    Date of Patent: January 23, 2018
    Assignee: Hitachi, Ltd.
    Inventors: Shoji Yunoki, Tsutomu Yamada
  • Patent number: 9875354
    Abstract: A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication interface. Data is transparently received from the peripheral device or the host computing device, and the received data is stored. The stored data is analyzed to detect a circumstance associated with a security risk. If such a circumstance is not detected, then the data is transparently forwarded to the other of the peripheral device or the host. However, if a circumstance associated with a security risk is detected, then a security process, defined by a rule, is performed. Related apparatus are provided, as well as other methods and apparatus.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: January 23, 2018
    Assignee: Gigavation, Inc.
    Inventors: Gita Srivastava, Piyush B. Srivastava
  • Patent number: 9877148
    Abstract: Location data that corresponds to one or more user devices each associated with a user may be obtained. Based on the location data, the particular location of a user may be determined. Similarities between various users may be identified when it is determined that those users have visited the same locations. Upon at least two users visiting a threshold amount of the same locations, one or more recommendations may be provided to the users, whereby the recommendations relate to places that those users have yet to visit. In addition, the users may have the opportunity to reveal information about themselves to other users, while maintaining their anonymity. As a result, the users may meet people and learn about new places that are likely to be of interest to those users.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: January 23, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Hilliard Bruce Siegel, Michael Martin George
  • Patent number: 9871827
    Abstract: The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is described. At least one keying information used by a KMF to regenerate a key is stored. A start_interception message is signaled from an ADMF to a CSCF. A halt_message is signaled from the ADMF to the CSCF.
    Type: Grant
    Filed: August 1, 2016
    Date of Patent: January 16, 2018
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Matthew John Campagnan, Gregory Marc Zaverucha, Michael Eoin Buckley
  • Patent number: 9871767
    Abstract: The present invention is directed to systems and methods for establishing an electronic communications connection between secure communities. A secure community includes a collection of communication resources having an administrator that maintains control over the secure community. In an embodiment, a system for establishing an electronic communications connection between two or more secure communities includes a community gateway controller, an identification module, a secure community database configured to store secure community information, and an encryption compatibility module configured to determine a media transmission encryption scheme for a connection between a host secure community and a second secure community.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: January 16, 2018
    Assignee: Mutualink, Inc.
    Inventor: Joseph R. Mazzarella
  • Patent number: 9870470
    Abstract: A multi-stage event detector for monitoring a system to detect the occurrence of multistage events in the monitored system, the multi-stage event detector includes: one or more event detecting detector units (142, 144) for detecting observable events occurring on the monitored system; one or more parameter generating detector units (152, 154) for generating parameter values which vary over time dependent on the behavior of the monitored system; a hidden state determiner (120) for determining a likely sequence of states of interest of the system based on the outputs of the one or more event detecting detector units; and a transition determiner (130) for determining a likely transition occurrence based on a comparison of a set of values of a parameter or set of parameters generated by one or more of the one or more parameter generating detector units with a plurality of pre-specified functions or sets of values of a corresponding parameter or set of parameters associated with different transition occurrences.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: January 16, 2018
    Assignee: British Telecommunications PLC
    Inventors: Ian Herwono, Zhan Cui, Ben Azvine, Martin Brown, Karl Smith
  • Patent number: 9853813
    Abstract: Systems and methods are provided for securing a private key on a mobile device for use with public key cryptography. Specifically, a private key is reduced to two partial keys where the partial keys are stored on separate electronic devices. The partial keys combine to temporarily regenerate the private key for the purposes of notarizing (digitally signing) messages or documents, and decrypting a message or document that was encrypted using the corresponding public key. The partial keys in some embodiments may be a secret key, which can be derived from an account identifier and a password, and an exclusive key, which can be derived from the secret key and the private key. The private key can be regenerated from the secret key and the exclusive key. With the partial keys stored on separate devices, another layer of practical security is provided to public key cryptography.
    Type: Grant
    Filed: May 10, 2016
    Date of Patent: December 26, 2017
    Assignee: Crater Dog Technologies, LLC
    Inventor: Derk Norton
  • Patent number: 9853957
    Abstract: Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server, which eliminates the need of storing or using any secret information in the client application. Further, an encrypted content key generated by a content packager using a public key can be deployed in the key URI of a playlist file, which is sent to the key server. The key server can be configured to decrypt the content key using a corresponding private key. Further, the content key and unencrypted samples are protected in the game console client application from debugging and replay attacks by using additional security checks at both the client and key server. By storing secret information remotely from the game console and using the SSO model, DRM policies can be enforced on an untrusted client application.
    Type: Grant
    Filed: August 25, 2016
    Date of Patent: December 26, 2017
    Assignee: ADOBE Systems Inc.
    Inventors: Viswanathan Swaminathan, Sheng Wei, Joseph Donovan Steele
  • Patent number: 9847972
    Abstract: A method for secure communications between a transmitting computer and a receiving computer includes transmitting data from the transmitting computer over a first one-way link to a data security engine, receiving and validating the data within the data security engine, and, after validating the data, transmitting the data from the data security engine to the receiving computer over a second one-way link.
    Type: Grant
    Filed: February 27, 2017
    Date of Patent: December 19, 2017
    Assignee: WATERFALL SECURITY SOLUTIONS LTD.
    Inventors: Lior Frenkel, Amir Zilberstein
  • Patent number: 9846784
    Abstract: A data storage system is provided. The system includes an electronic storage architecture configured to be coupled to a computing system and a storage medium. The architecture mediates the storing and accessing of data at the storage medium in response to the commands to write or read data. The architecture includes a file interface configured to process at least one attribute associated with data. The architecture includes a crypto interface configured to encrypt and decrypt the data based on the at least one attribute. The at least one attribute specifies a classification level of the data. The crypto interface includes cryptographic functions. Each cryptographic function is associated with a different classification level. The architecture includes a storage interface configured to provide a mapping between partitions on the storage medium and the cryptographic functions. Each of the partitions is associated with a different classification level.
    Type: Grant
    Filed: February 26, 2013
    Date of Patent: December 19, 2017
    Assignee: ROCKWELL COLLINS, INC.
    Inventors: Daniel S. Murray, James A. Marek
  • Patent number: 9838401
    Abstract: Examples of the present disclosure provide a method, client terminal device and system for verifying page information, the method includes: verification decryption information of real verification information of each of pages to be verified is obtained from a verification information server; real verification information of a page to be browsed by a user is obtained by decrypting the verification decryption information; and risk warning information is displayed when the real verification information of the page to be browsed by the user differs from actual verification information of the page to be browsed by the user. Technical solutions of the present disclosure may verify the page to be browsed after the page is obtained, and when it is determined after the verification that there is a risk, risk warning information may be displayed on the client terminal. Thus the reliability of network security may be increased.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: December 5, 2017
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventors: Haibo Wang, Gucai Luo, Xuyang Li
  • Patent number: 9836600
    Abstract: A multi-stage event detector for monitoring a system, the multi-stage event detector including: a process generator operable to generate main and sub-processes, each main and sub-process being operable to generate and initiate a detection agent each of which is operable to be triggered by detecting the occurrence of a trigger event and to report back to its generating process or sub-process upon being so triggered. Each process or sub-process is operable to respond to receipt of a report from a triggered detection agent by reporting the detection of a multi-stage event to an overall controller.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: December 5, 2017
    Assignee: British Telecommunications PLC
    Inventors: Ian Herwono, Zhan Cui
  • Patent number: 9830569
    Abstract: Among other things, customer account data is received from a service provider. The customer account data is representative of relationships that exist at successive times between digital assets provided by the service provider and respective entities to whom the digital assets are provided by the service provider. The received data is used to update a database to represent mappings of digital assets to respective entities to whom the digital assets are provided at one of the successive times, changes in the mappings between successive times, or both.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: November 28, 2017
    Assignee: BitSight Technologies, Inc.
    Inventor: Daniel Dahlberg
  • Patent number: 9830437
    Abstract: Technologies are generally described for an automatic log-in function control scheme. In some examples, a method performed under control of an end device may include detecting, from the end device, input of one or more passcodes to access the end device; determining that a user of the end device is not an authorized user based at least in part on a detected behavioral pattern in connection with the input of the one or more passcodes; and disabling an automatic log-in function of at least one application that is hosted on the end device.
    Type: Grant
    Filed: August 8, 2013
    Date of Patent: November 28, 2017
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Seungil Kim
  • Patent number: 9825971
    Abstract: Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device.
    Type: Grant
    Filed: April 24, 2013
    Date of Patent: November 21, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shuo Chen, Zhenbin Xu, Boxin Li
  • Patent number: 9825943
    Abstract: User authentication techniques based on geographical locations associated with a client device is provided. A network connection can be established between two or more host machines and a client device. Upon a request received from the client device by one of these host machines, round trip times of test messages may be measured between the client device and each of the host machines. The round trip times can be utilized to determine the current geographical location of the client device. If the location is within a tolerance geographical area, the client device may be authenticated. Otherwise, the authentication may fail or additional security procedures may be implemented. In some examples, a travel time from a historical geographical location to current geographical location can be determined. This data may be also utilized in the user authentication process.
    Type: Grant
    Filed: July 11, 2016
    Date of Patent: November 21, 2017
    Assignee: A10 NETWORKS, INC.
    Inventor: Micheal Thompson
  • Patent number: 9817981
    Abstract: Methods and systems for secure cloud storage are provided. According to one embodiment, a gateway maintains multiple cryptographic keys. A file that is to be stored across multiple third-party cloud storage services is received by the gateway from a user of an enterprise network. The file is partitioned into chunks. A directory is created within a cloud storage service having a name attribute based on an encrypted version of a name of the file. For each chunk: (i) existence of data is identified within the chunk associated with one or more predefined search indices; (ii) searchable encrypted metadata is generated based on the identified data and a selected cryptographic key; (iii) an encrypted version of the chunk is generated; and (iv) a file is created within the directory in which a name attribute includes the searchable encrypted metadata and the file content includes the encrypted chunk.
    Type: Grant
    Filed: November 12, 2016
    Date of Patent: November 14, 2017
    Assignee: Fortinet, Inc.
    Inventor: David A. Redberg
  • Patent number: 9817641
    Abstract: A method, system, and medium are provided for facilitating development of an application by a user for a mobile communications device. A portion of programmatic code provided by the user is retrieved and a classification corresponding to the code is determined. A set of rules comprising a use restriction associated with a protected application component is referenced to determine whether the code classification corresponds to a use restriction. Incident to identifying an associated use restriction, feedback is presented to the user that indicates that the portion of code corresponds to a use restriction.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: November 14, 2017
    Assignee: Sprint Communications Company L.P.
    Inventors: Ryan Alan Wick, Raymond Emilio Reeves, John Marvin Jones, III