Patents Examined by Luu Pham
  • Patent number: 9715594
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: October 15, 2015
    Date of Patent: July 25, 2017
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Patent number: 9716724
    Abstract: A cloud based data loss prevention (DLP) system (“cloud DLP system”) implements offline scanning of content stored in a cloud-based service belonging to an enterprise in accordance with the enterprise's policy and control. The cloud DLP system provides alerts or remediation in response to detection of non-compliance cloud content. In some embodiments, the cloud DLP system is provided with the access credential of the enterprise to access the cloud-based service. In other embodiments, the enterprise's login credential remains within the enterprise data network and an on-premises client obtains an access token for the cloud DLP system.
    Type: Grant
    Filed: February 18, 2015
    Date of Patent: July 25, 2017
    Assignee: Skyhigh Networks, Inc.
    Inventors: Snehal Chennuru, Sekhar Sarukkai
  • Patent number: 9712520
    Abstract: Techniques for authenticating a user may be described. In particular, a network-based document may be provided to a computing system of a user. The network-based document may include code and an identifier of another network-based document. The code may be configured to, upon execution, determine whether the other network-based document was accessed prior to providing the network-based document to the computing system. The other network-based document may be accessible to the user based on an identifier of the user. An indication that the other network-based document was accessed may be determined. For example, the indication may be received from the computing system based on an execution of the code at the computing system. The user may be authenticated based on the indication.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: July 18, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Darren Ernest Canavor, William Alexander Strand
  • Patent number: 9699150
    Abstract: In a method for secure cloud computing, a virtual machine (VM) associated with a client is executed at a computer within a trusted computing cloud. An image including state information of the VM is obtained; storage of the image is arranged; a freshness hash of the image is determined; and the freshness hash is sent to the client. Subsequently, at the same computer or at a different computer within the trusted computing cloud, the stored image may be retrieved; a freshness hash of the retrieved image may be determined; the freshness hash of the retrieved image may be sent to the client; and an indication may be received from the client verifying the integrity of the freshness hash of the stored image.
    Type: Grant
    Filed: June 5, 2015
    Date of Patent: July 4, 2017
    Assignee: Virtustream IP Holding Company LLC
    Inventors: David Lie, Reuven Cohen, Richard Reiner
  • Patent number: 9699155
    Abstract: A virtual file system is described that is implemented in a virtualization platform as a stackable file system layer that intercepts file operations between a hypervisor and a physical file system. The virtual file system encrypts (at least in part) VM files to be stored, organizes the encrypted VM files into VM sets, and then maps and stores the encrypted VM sets into storage pools. Storage and access to files within the VM sets is controlled through the use of administrator-determined policies governing storage, security, access control, authentication, and auditing. The system and method described herein allow a seamless integration between a data center (e.g., a private cloud) and computing resources served across the internet and supported by cloud service providers (e.g., public clouds) while ensuring that the security needs of customers and cloud service providers are met.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: July 4, 2017
    Assignee: HYTRUST, INC.
    Inventors: Stephen D. Pate, Tushar Y. Tambay, Kelvin J. Pryse, Lynn F. Kerby, Blaine T. Cuykendall, Thomas J. Satterlee
  • Patent number: 9697346
    Abstract: In one embodiment, a method includes identifying a request for access to a first system and obtaining a visual image including at least a first piece of information associated with the request. The visual image is associated with a first device and obtained using a second device. The method also includes determining if the at least first piece of information indicates that the access to the first system is to be granted, wherein determining if the at least first piece of information indicates that the access to the first system is to be granted includes implementing a visual recognition algorithm to process the at least first piece of information. Finally, the access to the first system is granted if it is determined that the at least first piece of information indicates that the access to the first system is to be granted.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: July 4, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Philip C. Jacobs, John A. Toebes
  • Patent number: 9692605
    Abstract: This invention includes a solution to enable a digital authentication solution comprising a network. Next, a first device is coupled to the network. The first device may include an authentication key generator that is able to generate both public and private keys in electronic formats. Next, the first device is coupled to a certificate authority gateway. The certificate authority gateway includes devices capable of converting the electronically formatted public key to a non-electronic format, and vice versa. Next, the certificate authority gateway is coupled to a certificate authority server. The certificate authority server includes devices capable of converting the electronically formatted public key to a non-electronic format, and vice versa. The certificate authority server is also contained in a secure area such as a locked room, or a safe. The secure area includes features that allow the non-electronically formatted public key to be passed across the boundary of the secure area.
    Type: Grant
    Filed: June 25, 2016
    Date of Patent: June 27, 2017
    Assignee: SAIFE, Inc.
    Inventors: Ty Lindteigen, James Chester Jones
  • Patent number: 9686262
    Abstract: A method and system for authenticating a user to a target server. A request is received from a user computer system to authenticate the user for access to a target server at level N of N levels (N?2). Each record of a stored authentication plan associated with the user has authentication records each having information relating to authentication of the user for access to N?1 target servers at respective levels 1 through N?1. Each record of a received current authentication plan for the user has authentication records each having current information relating to authentication of the user for access to the N?1 target servers at respective levels 1 through N?1. It is determined that there is at least a partial match between the stored and current authentication plans, and in response, the user is authenticated for access to the target server at level N.
    Type: Grant
    Filed: May 7, 2015
    Date of Patent: June 20, 2017
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
  • Patent number: 9686080
    Abstract: A system and method is illustrated for providing secure credential using a secure credential package stored on a client device and at least one key stored in a corporate network. In embodiments, an access connector receives credentials and a device unique identifier from the client device over a secure link, obtain the at least one key from the corporate network, apply the at least one key to the credentials and the device unique identifier to generate the secure credential package including the encrypted credential and the device unique identifier, send the secure credential package to the client device over the secure link, upon receiving the secure credential package from the client device, retrieve the at least one key via the key manager, decrypting the secure credential package using the at least one key to obtain the credentials, and validate the credentials against a user directory located in the corporate network.
    Type: Grant
    Filed: July 14, 2016
    Date of Patent: June 20, 2017
    Assignee: EMC Corporation
    Inventor: Leonard Chung
  • Patent number: 9672339
    Abstract: Electro-biometric data obtained from a user of a processor-based device may be used to authenticate that user. In some cases, no special action may need to be taken to initiate authentication.
    Type: Grant
    Filed: December 12, 2012
    Date of Patent: June 6, 2017
    Assignee: Intel Corporation
    Inventor: Daniel H. Lange
  • Patent number: 9672356
    Abstract: Determining malware status of a file is disclosed. An apparatus obtains information about an unknown target file, obtains system context of the unknown target file, and determines the unknown target file as clean if the system context matches with one or more predetermined conditions indicative of cleanliness. The predetermined conditions of cleanliness include at least the target file being located in a directory which contains other clean files.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: June 6, 2017
    Assignee: F-Secure Corporation
    Inventor: Jarno Niemela
  • Patent number: 9674225
    Abstract: A managed container may be configured to manage enterprise applications, manage enterprise information stored on a device, manage a protected storage area used by the managed container to store and reference the enterprise applications during execution, and manage a database storing enterprise rules related to management of the enterprise applications and the enterprise information. The managed container may communicate with an application gateway server to control download and update of the enterprise applications, the enterprise information, and the enterprise rules. The application gateway server may be coupled to a backend enterprise application. At least one of the enterprise applications may be configured to execute in conjunction with the backend enterprise application according to at least one of the enterprise rules, and is configured to, according to another one of the enterprise rules, manage the enterprise information associated with the backend enterprise application.
    Type: Grant
    Filed: September 19, 2014
    Date of Patent: June 6, 2017
    Assignee: Open Text SA ULC
    Inventors: Gregory Beckman, Robert Laird, Alain Gagne
  • Patent number: 9674223
    Abstract: A computer program product has a computer-readable storage medium having computer program instructions embodied therein for performing a method for implementing a privacy policy for a user. The method may include the user developing rules that determine whether another user (requester) can access information related to the user. The rules may be stored in a database coupled to a server and evaluated when a request is received from the requester to access the information. If a rule is satisfied by the requester, the server can return the information to the requester. The information can be returned at a level of granularity specified by the user in the satisfied rule. A privacy level can be set by the user to allow access to requesters based on the rules or to deny access to any requesters.
    Type: Grant
    Filed: October 23, 2013
    Date of Patent: June 6, 2017
    Assignee: Google Inc.
    Inventors: Yan Yu, Michael Chu, Chung-Man Tam, Steven Lee, Ravi Jain, Tu Tsao, Christopher Lambert
  • Patent number: 9674699
    Abstract: A system and a method for secure communication in a mobile computing device involve obtaining, by a first program installed on the mobile computing device, an access credential from an authentication server on behalf of a second program installed on the mobile computing device. The second program submits the access credential to a remote resource as proof that the second program has been authenticated by the authentication server. Upon successful verification of the access credential, the remote resource allows the second program to access data.
    Type: Grant
    Filed: August 15, 2014
    Date of Patent: June 6, 2017
    Assignee: SAP SE
    Inventors: Yordan Kanov, Yanislav Mihaylov
  • Patent number: 9665720
    Abstract: An image forming apparatus which is capable of properly updating firmware. Update firmware is downloaded into a download area of an HDD and expanded and stored in a temporary expansion area of the HDD. A CPU determines whether or not the update firmware expanded and stored in the temporary expansion area has been tampered with. The update firmware stored in the temporary storage area is applied to the image forming apparatus when the CPU determines that the update firmware has not been tampered with.
    Type: Grant
    Filed: January 6, 2015
    Date of Patent: May 30, 2017
    Assignee: CANON KABUSHIKI KAISHA
    Inventor: Yoko Tokumoto
  • Patent number: 9654492
    Abstract: A malware detection system based on stored data that analyzes an electronic message for threats by comparing it to previously received messages in a message archive or to a contacts list. Threat protection rules may be generated dynamically based on the message and contacts history. A message that appears suspicious may be blocked, or the system may insert warnings to the receiver not to provide personal information without verifying the message. Threat checks may look for unknown senders, senders with identities that are similar to but not identical to previous senders or to known contacts, or senders that were added only recently as contacts. Links embedded in messages may be checked by comparing them to links previously received or to domain names of known contacts. The system may flag messages as potential threats if they contradict previous messages, or if they appear unusual compared to the patterns of previous messages.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: May 16, 2017
    Assignee: MIMECAST NORTH AMERICA, INC.
    Inventors: Jackie Maylor, Simon Tyler, Peter Bauer, Gilly Benamram, Paul Sowden, Steven Malone, Wayne Van Ry, Francisco Ribeiro
  • Patent number: 9652774
    Abstract: Embodiments of techniques for distributing and rendering media content are provided. In response to a request for a first media file, a combined media file is generated having first and second segments that together include data from the first media file and from a second media file. The combined media file is then provided to a player module operable to render only data from the first media file during a first operating mode, and operable to render data from both the first and second media files during a second operating mode. For example, the first media file may be a music file, and the second media file an advertisement. A consumer may play the music portion without special software or a license, but the advertisement will be rendered as well. Alternatively, the consumer may purchase a license and use special playback software to render the music without the advertisement.
    Type: Grant
    Filed: August 9, 2010
    Date of Patent: May 16, 2017
    Assignee: INTEL CORPORATION
    Inventors: Adam Bruce Cappio, Jeffey Ayars
  • Patent number: 9652636
    Abstract: Aspects of the present disclosure are directed towards a method of electronic verification of motion data. This includes collecting a first set of motion data that corresponds to a first set of motion characteristics generated from physically moving a hardware element of a computer ending upon inserting the hardware element of the computer into a computer chassis. This can further include determining an approved set of motion data and comparing the first set of motion data to the approved set of motion data. This can further include determining a difference between the first set of motion data and the approved set of motion data. This can further include determining that the difference does not satisfy a threshold. This can further include executing a reaction sequence in the computer, in response to determining that the difference does not satisfy the threshold.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: May 16, 2017
    Assignee: International Business Machines Corporation
    Inventors: Gerald K. Bartley, Darryl J. Becker, Matthew S. Doyle, Mark O. Maxson
  • Patent number: 9646158
    Abstract: A computer-implemented method for detecting malicious files may include (1) identifying a length of at least one line within a textual file, (2) assessing, based at least in part on the length of the line within the textual file, a likelihood that at least a portion of the textual file has been encrypted, (3) determining, based on the likelihood that at least a portion of the textual file has been encrypted, a likelihood that the textual file is malicious, and (4) performing a remediation action based at least in part on determining the likelihood that the textual file is malicious. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 22, 2015
    Date of Patent: May 9, 2017
    Assignee: Symantec Corporation
    Inventors: Nitin Shekokar, Xue Feng Tian
  • Patent number: 9639671
    Abstract: Provided are facilities for secure execution of an encrypted executable comprising an encrypted instruction. The secure execution includes obtaining the encrypted instruction, decrypting the encrypted instruction using a decryption key being maintained in a secure location within a processor, and storing the decrypted instruction to a secure storage for execution, where the decryption key remains in the secure location during the decrypting and the storing to facilitate maintaining security of the decryption key.
    Type: Grant
    Filed: May 27, 2014
    Date of Patent: May 2, 2017
    Assignee: ASSURED INFORMATION SECURITY, INC.
    Inventor: Jacob Torrey