Patents Examined by Michael D Anderson
  • Patent number: 10425393
    Abstract: A wireless local area network (WLAN) access method, a terminal, and a server implement intelligentization and simplify a user operation. The method includes sending, by the terminal, a request for querying an available wireless access point to a server; sending, by the server according to the query request, obtained information about the available wireless access point; then, receiving, by the terminal, wireless access point information returned by the server, and determining a specific wireless access point from the received wireless access point information; then, sending, by the terminal, an authentication information request of the specific wireless access point to the server; and when receiving the request, sending, by the server, authentication information corresponding to the specific wireless access point to the terminal, where the authentication information is used to connect the terminal to the specific wireless access point.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: September 24, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Guoqiang Rong, Jingtao Feng, Zijun Li, Wenhu Zhang
  • Patent number: 10425439
    Abstract: A non-transitory machine-readable media embodying instructions executable by one or more processors to perform a method is provided. In one aspect, the method includes receiving, from a first computing device associated with a first account, a request for interaction with a second computing device associated with a second account, wherein the first account is assigned a quota for interacting with one or more accounts. The method includes determining a cost associated with the interaction. The method includes, when the quota exceeds the cost, determining that the interaction is allowed and deducting the cost from the quota. Systems and methods are also provided.
    Type: Grant
    Filed: January 8, 2018
    Date of Patent: September 24, 2019
    Assignee: GOOGLE LLC
    Inventors: Bharadwaj Subramanian, Matthew Knouse, Charles Zaffaroni
  • Patent number: 10409985
    Abstract: A trusted computing host is described that provides various security computations and other functions in a distributed multitenant and/or virtualized computing environment. The trusted host computing device can communicate with one or more host computing devices that host virtual machines to provide a number of security-related functions, including but not limited to boot firmware measurement, cryptographic key management, remote attestation, as well as security and forensics management. The trusted computing host maintains an isolated partition for each host computing device in the environment and communicates with peripheral cards on host computing devices in order to provide one or more security functions.
    Type: Grant
    Filed: February 17, 2017
    Date of Patent: September 10, 2019
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Nachiketh Rao Potlapally, Michael David Marr, Eric Jason Brandwine, Donald Lee Bailey
  • Patent number: 10404733
    Abstract: The present disclosure relates to initiating remediation of security risks on an endpoint system based on updated reputation data. According to one embodiment, a reputation service receives a request, from a first endpoint system, for reputation data about an object. A reputation service transmits, in response to the request, data indicating a current reputation of the object. The reputation service determines that the object presents a security risk and updates reputation data associated with the object to indicate that the object presents a security risk. Upon updating the reputation data, the reputation system transmits, to the first endpoint system, updated reputation data associated with the object and instructions to remedy the security risk.
    Type: Grant
    Filed: February 2, 2016
    Date of Patent: September 3, 2019
    Assignee: Symantec Corporation
    Inventor: Michael Shavell
  • Patent number: 10397201
    Abstract: Sending encrypted data to a service provider includes exchanging an encryption key between an entity and a service provider without retaining the encryption key and while hiding an identity of said entity from the service provider and forwarding encrypted data based on the encryption key to the service provider from the entity while hiding the identity of the entity from the service provider.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: August 27, 2019
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Joern Schimmelpfeng, Timo Schneller, Michael Bernd Beiter, Carsten Laengerer
  • Patent number: 10382416
    Abstract: Techniques for detecting shared devices are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for detecting shared devices comprising receiving, using a shared computer detection component, information about a connection to a website from a user device, identifying, using the shared computer detection component, one or more characteristics associated with the connection from the user device, determining, in the event there is sufficient data based on the one or more characteristics associated with the connection from the user device, whether the user device is a shared device, and calculating a first responsive action in the event it is determined that the user device is a shared device.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: August 13, 2019
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Kevin B. Jiang
  • Patent number: 10380155
    Abstract: Natural language notification generation techniques and system are described. In an implementation, natural language notifications are generated to provide insight into alerts related to a metric, underlying causes of the alert from other metrics, and relationships of the metric to other metrics. In this way, a user may gain this insight in an efficient, intuitive, and time effective manner.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: August 13, 2019
    Assignee: Adobe Inc.
    Inventors: Kokil Jaidka, Prakhar Gupta, Harvineet Singh, Iftikhar Ahamath Burhanuddin
  • Patent number: 10375113
    Abstract: A method which makes it possible to manage access control between a first entity and a second entity belonging to two security domains in a cloud network is disclosed. In one aspect the method comprises, if the entities belong to security domains implementing different access control policies, determining whether there exists a first access control rule between the first entity and a virtual entity within the security domain of the first entity, and a second access control second rule between the second entity and the virtual entity within the security domain of the second entity. If so, the method may comprise controlling access between the first and second entities as a function of the first and second rules.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: August 6, 2019
    Assignee: ORANGE
    Inventors: Ruan He, Yu Zhou
  • Patent number: 10368118
    Abstract: A system that incorporates teachings of the present disclosure may include, for example, a digital video recorder (DVR) having a controller to record video content supplied by a media communication system, establish a threshold for utilization of a memory resource of the DVR, detect a utilization of the memory resource that exceeds the threshold, generate a notice describing the utilization of the memory resource at or after the time the threshold was exceeded, identify a communication identifier associated with a portable communication device, transmit the notice to the portable communication device according to the identified communication identifier, and receive a response message from the portable communication device that includes one or more instructions to manage the memory resource of the DVR. Other embodiments are disclosed.
    Type: Grant
    Filed: August 31, 2016
    Date of Patent: July 30, 2019
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Mary McCarthy, Robert Coldwell
  • Patent number: 10368242
    Abstract: Aspects of the subject disclosure may include, for example, a method comprising authenticating, by a server comprising a processor, a communication device to a first communication network, in accordance with authentication information stored in a first repository of the first communication network. The method also comprises determining, by the server, that a second communication network is accessible to the communication device. The method further comprises providing, by the server, the authentication information to a second repository of the second communication network in accordance with the determining, wherein the providing is performed independently of a request from the second communication network. Other embodiments are disclosed.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: July 30, 2019
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Sangar Dowlatkhah, Venson Shaw, Thomas J Will
  • Patent number: 10362043
    Abstract: A method and an apparatus for detecting a man-in-the-middle attack, where the method includes receiving, by a macro evolved Node B (MeNB), a first check request message sent by a secondary evolved Node B (SeNB), where the first check request message includes first identifier information and a first data packet count value, generating a second check request message according to the first identifier information, sending the second check request message to a user terminal, receiving a first check response message generated by the user terminal according to the second check request message, where the first check response message includes second identifier information and a second data packet count value, determining, by the MeNB, that the man-in-the-middle attack exists between the SeNB and the user terminal when the first data packet count value is different from the second data packet count value.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: July 23, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Rong Wu, Chengdong He, Lu Gan
  • Patent number: 10354516
    Abstract: A security system comprises at least one component interconnected with the security system for detecting an alarm condition. A control panel is interconnected with the security system for at least one of controlling and communicating with the at least one component. A memory is interconnected with the control panel for storing a system identifier (ID) associated with the control panel and for storing connection information for accessing a system configuration file associated with the system ID. The system ID and the connection information are stored prior to interconnecting the control panel and the security system. The system configuration file identifies the at least one component and is stored remote from the security system.
    Type: Grant
    Filed: September 15, 2006
    Date of Patent: July 16, 2019
    Assignee: TYCO SAFETY PRODUCTS CANADA, LTD.
    Inventor: Stéphan Frenette
  • Patent number: 10348721
    Abstract: In one implementation, instructions stored on a non-transitory computer-readable medium are executable by a processing resource to cause a computing device to fetch a token code from a home subscriber server (HSS) for a user and log in to a Virtual Private Network (VPN) server using the token code.
    Type: Grant
    Filed: October 30, 2013
    Date of Patent: July 9, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Shuai Wang, Jun Qing Xie, Qun Yang Lin, Xunteng Xu
  • Patent number: 10348773
    Abstract: A system and approach having security assurance for a controller relative to outside connections such as internet. The controller may have locked and exposed modes. A locked mode may mean that the system is correctly configured in that security related settings meet minimum standards. For example, the controller is protected through sufficiently strong user accounts and passwords whether entered or by default. Also, there may be an entity, such as person or organization that has responsibility for securing the controller against undesired intrusions. In the exposed mode, where the system may be incorrectly configured, the controller may shut down some or all of the functionality that has relevance to remote access. In the exposed mode, a built-in web server may show one or more screens that allow one to access the controller. There may be security indicators, such as lights that indicate whether the controller is exposed or locked.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: July 9, 2019
    Assignee: Honeywell International Inc.
    Inventors: Philipp A. Roosli, Daniel Heine
  • Patent number: 10333921
    Abstract: This disclosure includes utilizing a token cryptogram with a browser to facilitate a transaction. A webpage of a website is configured to accept a token cryptogram in fields of the webpage. The webpage of the website may indicate that it is token-aware and is configured to accept the token cryptograms.
    Type: Grant
    Filed: April 8, 2016
    Date of Patent: June 25, 2019
    Assignee: Visa International Service Association
    Inventors: Prasanna L. Narayan, Ramji Sethuraman
  • Patent number: 10331911
    Abstract: An electromagnetic radiation (EMR) receiver is located upon a printed circuit board (PCB) glass security layer. EMR flux is transmitted by the glass security layer and received by the EMR receiver. When the PCB is subject to a tamper event the EMR transmitted by glass security layer is increased. A monitoring device that monitors the flux or interference pattern of the EMR received by the EMR receiver detects a change in flux or interference pattern and passes a tamper signal to one or more computer system devices to respond to the tamper event. For example, one or more cryptographic adapter card or computer system functions or secured crypto components may be disabled.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: June 25, 2019
    Assignee: International Business Machines Corporation
    Inventors: Joseph Kuczynski, Phillip V. Mann, Kevin M. O'Connell
  • Patent number: 10325100
    Abstract: A method is described for operating a computer system comprising a computer and a display unit, wherein a reference pattern is formed based on input value fed into the computer, wherein image signals for the display unit are generated based on the input value, wherein the image signals fed to the display unit are detected, wherein the detected image signals are subjected to a pattern recognition to provide a recognized pattern, and wherein the recognized pattern is compared with the reference pattern.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: June 18, 2019
    Assignee: BECKHOFF AUTOMATION GMBH
    Inventors: Jens Sachs, Martin Früchtl
  • Patent number: 10325099
    Abstract: Production data is managed to avoid leakage of sensitive data. One or more of a number of techniques can be employed to discover sensitive data amongst production data. In one instance, data specified about production data in a production application, for example by way of an attribute, can be used to identify sensitive data. Sensitive production data can subsequently be masked to conceal sensitive data from view. Furthermore, metadata regarding sensitive data can be maintained.
    Type: Grant
    Filed: December 8, 2013
    Date of Patent: June 18, 2019
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Stephen J. Cook, Jackson M. Davis
  • Patent number: 10320761
    Abstract: Encoding a partially encrypted data stream may include receiving, at an edge encryption proxy, an unencrypted data stream, evaluating the unencrypted data stream using communication encryption rules including rule conditions and content mappings, determining whether the rule conditions match on the unencrypted data stream, and on a condition that the rule condition matches on the unencrypted data stream, and identifying a portion of the unencrypted data stream corresponding to the content mapping as a candidate sensitive portion.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: June 11, 2019
    Assignee: SERVICENOW, INC.
    Inventors: Antonio Ye, Kyle Barron-Kraus
  • Patent number: 10318462
    Abstract: An optical electromagnetic radiation (EM) emitter and receiver are located upon a printed circuit board (PCB) glass security layer. A predetermined reference flux or interference pattern, respectively, is an expected flux or reflection pattern of EM emitted from the EM emitter, transmitted by the glass security layer, and received by the EM receiver. When the PCB is subject to an unauthorized access thereof the optical EM transmitted by glass security layer is altered. An optical monitoring device that monitors the flux or interference pattern of the optical EM received by the EM receiver detects a change in flux or interference pattern, in relation to the reference flux or reference interference pattern, respectively, and passes a tamper signal to one or more computer system devices to respond to the unauthorized access. For example, one or more cryptographic adapter card or computer system functions or secured crypto components may be disabled.
    Type: Grant
    Filed: March 24, 2016
    Date of Patent: June 11, 2019
    Assignee: International Business Machines Corporation
    Inventors: Gerald K. Bartley, Darryl J. Becker, Matthew S. Doyle, Mark J. Jeanson, Mark O. Maxson