Patents Examined by Muhammad Chaudhry
  • Patent number: 9516035
    Abstract: Methods and systems for behavioral profiling, and in particular, utilizing crowd-managed data architectures to store and manage that profile, are described. In some embodiments, a method includes observing behavioral characteristics of user interactions during a current session with the user through one of a plurality of channels. Variations between the behavioral characteristics of the user interactions observed during the current session and a behavioral profile previously developed based on prior usage patterns of the user through the plurality of channels are identified, in real-time or near real-time.
    Type: Grant
    Filed: September 16, 2015
    Date of Patent: December 6, 2016
    Assignee: UNITED SERVICES AUTOMOBILE ASSOCIATION
    Inventors: Karen M. Moritz, Stephen Seyler Aultman, Joseph James Albert Campbell, Debra R. Casillas, Jonathan Edward Neuse, Sara Teresa Alonzo, Thomas Bret Buckingham, Gabriel Carlos Fernandez, Maland Keith Mortensen
  • Patent number: 9507925
    Abstract: A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
    Type: Grant
    Filed: October 19, 2015
    Date of Patent: November 29, 2016
    Assignee: BlackBerry Limited
    Inventors: Michael Andrew Goldsmith, Aleksandar Papo, Robert Joseph Lombardi, Jasmin Mulaosmanovic, Nazih Almalki, Brian Everett McBride, Peter Mark Rabinovitch
  • Patent number: 9503432
    Abstract: A secure linkage between databases allows records of an individual in a first database to be linked to records of the same individual in a second database without disclosing or providing personal information outside of either database or system responsible for controlling access to the respective databases. As such, records of individuals may be securely linked together without compromising privacy or security of the databases.
    Type: Grant
    Filed: April 2, 2015
    Date of Patent: November 22, 2016
    Assignee: PRIVACY ANALYTICS INC.
    Inventors: Khaled El Emam, Aleksander Essex, Ben Eze, Matthew Tucciarone
  • Patent number: 9501649
    Abstract: A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application subject to a security vulnerability assessment, (2) requesting information that identifies a potential impact of the application on a vulnerability of at least one computing system to at least one exploit associated with the application, (3) receiving the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein the information may be derived at least in part from data from at least one additional computing system on which the application has previously been installed and (4) directing a determination about an installation of the application on the computing system based at least in part on the information that identifies the potential impact of the application on the vulnerability of the computing system. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: November 22, 2016
    Assignee: Symantec Corporation
    Inventors: Piyush Sharma, Peter Ashley
  • Patent number: 9491626
    Abstract: Embodiments of the invention are directed at an enhanced data interface (EDI) for contactless communications between a mobile application operating on a mobile device and an access device (e.g., contactless reader) that allows for enhanced verification between the mobile device and access device. One embodiment of the invention is directed to a method. The method comprises a mobile device receiving a request for available applets from an access device and providing a list of available applets including trusted applet identifiers and untrusted applet identifiers to the access device. The method further comprises receiving a selection of an untrusted applet identifier from the list and an entity identifier associated with the access device, validating that the access device is authorized to access credentials associated with the selected untrusted applet identifier using the entity identifier, and providing the credentials associated with the selected untrusted applet identifier to the access device.
    Type: Grant
    Filed: May 7, 2015
    Date of Patent: November 8, 2016
    Assignee: Visa Intellectual Service Association
    Inventors: Sanjeev Sharma, Oleg Makhotin, Christian Aabye
  • Patent number: 9479489
    Abstract: Systems and methods for providing one or more services via a remote device are disclosed. One method can comprise identifying one or more services available at a location, transmitting identification data to a remote device disposed remotely from the location, the identification data relating to the one or more services identified, receiving a selection of the one or more services available, and providing the selected one or more services available to the remote device.
    Type: Grant
    Filed: March 5, 2013
    Date of Patent: October 25, 2016
    Assignee: Comcast Cable Communications, LLC
    Inventor: Yiu L. Lee
  • Patent number: 9479503
    Abstract: Authenticating cloud computing enabling secure services (ACCESS) offloads “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client device to communicate directly with the server (and utilize the service) without any further authentication being necessary.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: October 25, 2016
    Assignee: Telecommunications Systems, Inc.
    Inventors: John L. Griffin, Keith A. McFarland, William P. Wells
  • Patent number: 9467324
    Abstract: A firewall security platform is provided for enhancing security of a network. The firewall security platform includes at least one interface to communicate the identity and current status of one or more traffic requesters and at least one device for receiving instructions from a user. Communication data packets associated with the one or more traffic requesters are allowed for communication via the network or denied and blocked by the firewall security platform based on the current status of each of the one or more traffic requesters. The user's instructions include making a selection, with the selection including members that are at least one of the one or more traffic requesters. The current status of each member of the selection is altered in response to the making of the selection.
    Type: Grant
    Filed: May 7, 2015
    Date of Patent: October 11, 2016
    Inventor: Michael C. Wood
  • Patent number: 9449178
    Abstract: A system for fast secured searching may include a user interface, a web layer configured for executing application logic and configured for interacting with a user via the user interface and configured to perform user authentication, and a database layer in communication with and accessible by the web layer and comprising a database configured for storing data, and a search engine configured for searching the database, wherein, communication to and from the database layer from and to the web layer is controlled by secure socket layer certificate authorization. The database layer may also include an inverted index in communication with the database and the search engine and configured for maintaining updated snapshots relating to the data in the database and an encryption/decryption layer for selective encryption of the data and configurable for field level, document level, and/or chunk level encryption.
    Type: Grant
    Filed: July 24, 2013
    Date of Patent: September 20, 2016
    Assignee: ID Insight
    Inventors: Sudheer Prem, Matt Schraan
  • Patent number: 9432198
    Abstract: A method is disclosed for certificate-based authentication, in which a first subscriber authenticates himself to a second subscriber using a digital certificate associated to the first subscriber. The certificate specifies requirement(s) and the fulfillment of a requirement is ensured by a third subscriber. Within the framework of the authentication by the second subscriber, a validity condition is checked, and the certificate is classified as valid if the validity condition is fulfilled, based on the issue and/or absence of issue of the requirement(s) specified in the certificate by the third subscriber. Requirements may be used to restrict the validity of the certificate. The validity of a certificate can thereby be controlled in a simple and flexible manner without explicitly defining the validity in the certificate. The method can be used for authentication in any technical field, e.g., to authentication subscribers in the form of components of an automation system.
    Type: Grant
    Filed: July 22, 2011
    Date of Patent: August 30, 2016
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Rainer Falk, Steffen Fries
  • Patent number: 9432342
    Abstract: A method and system for anonymizing data is disclosed. Data to be anonymized is received by an anonymization system. A request for a data encryption key is generated. A masked data encryption key is received in response to the request. The data encryption key is retrieved from the masked data encryption key. The data is anonymized using an anonymization module to derive an anonymized data using the data encryption key.
    Type: Grant
    Filed: January 29, 2015
    Date of Patent: August 30, 2016
    Assignee: CIPHERCLOUD, INC.
    Inventors: Pravin Kothari, Malakondayya Gorantla
  • Patent number: 9424427
    Abstract: According to one aspect, a dynamic binary instrumentation (DBI) framework is used to identify rootkits and disable their malicious functionality. A user-mode or kernel-mode anti-rootkit (ARK) engine monitors the execution of a program running on a host machine in user more or kernel mode. Upon encountering calls to certain functions that may be used by rootkits to subvert system functionality (e.g. system calls used to manage the system registry, storage/disk, processes/threads, and/or network communications), the anti-rootkit engine executes translated versions of the functions in an isolated environment and continues execution of the program under analysis using the results of the translated code execution. The translated code execution replaces the execution of original code which may or may not have been subverted by a rootkit. Isolating the stack and registers of the isolated environment impedes detection of the monitoring process by rootkits.
    Type: Grant
    Filed: March 18, 2013
    Date of Patent: August 23, 2016
    Assignee: Bitdefender IPR Management Ltd.
    Inventors: Mihai Chiriac, Teodor Stoenescu
  • Patent number: 9419960
    Abstract: A method, apparatus and/or computer program provides secure user authentication in a network having a dynamic set of services. The method comprises a client authenticating with an edge service and generating a query key. The edge service issues a request to the dynamic set of services. The request comprises (i) an encrypted identifier associated with the client, (ii) a private portion of the request being encrypted with the query key, and (iii) a public portion of the request. In response to ascertaining from the public portion of the request that it is able to respond to the request, one or more of the dynamic set of services respond to the edge service with (i) an identifier associated with the dynamic set of services, and (ii) the identifier associated with the client. The edge service then authenticates that it is able to respond to the request, including generating a session key.
    Type: Grant
    Filed: February 28, 2014
    Date of Patent: August 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Graham A. Bent, Dominic P. Harries
  • Patent number: 9419941
    Abstract: A method and apparatus is disclosed herein for distributed zone-based security. In one embodiment, the method comprises: determining an ingress security zone associated with an ingress of a first network device based on a first key and a media access control (MAC) address of a source of a packet; determining an egress security zone of a second network device based on a MAC address of a destination for the packet and a second key; performing a policy lookup based on the ingress security zone and the egress security zone to identify a policy to apply to the packet; and applying the policy to the packet.
    Type: Grant
    Filed: March 22, 2013
    Date of Patent: August 16, 2016
    Assignee: VARMOUR NETWORKS, INC.
    Inventors: Yi Sun, Meng Xu, Lee Cheung, Hsisheng Wang, Chuong-Yaw Michael Shieh
  • Patent number: 9413526
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. The data is anonymized using the anonymization module, to derive an anonymized data, using a data encryption key. The anonymized data is transmitted to the destination computer over a network. In some embodiments, the data encryption key is encrypted and decrypted prior to anonymization.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: August 9, 2016
    Assignee: CIPHERCLOUD, INC.
    Inventors: Pravin Kothari, Debabrata Dash, Malakondayya Gorantla
  • Patent number: 9413720
    Abstract: Processing of packets in a stream of packets where the packets are assigned with sequence numbers is disclosed. Packets are distributed into at least two analysis windows based on predetermined N lowest bits of the sequence numbers, wherein an analysis window includes M lowest bits of the sequence numbers, M being an integer greater than N. N+1 to M lowest bits of the sequence numbers are analyzed in at least one of the analysis windows while ignoring the N lowest bits to determine the ordering of the packets. A packet is determined as suspicious in response to the analysis indicating the packet being in an incorrect position.
    Type: Grant
    Filed: April 7, 2015
    Date of Patent: August 9, 2016
    Assignee: SSH Communications Security OYJ
    Inventors: Kimmo Parviainen-Jalanko, Petri Helenius
  • Patent number: 9411971
    Abstract: In some embodiments, an electronic signature service automatically updates electronic documents to prevent execution by an unauthorized signatory. The electronic signature service can receive an electronic document to be electronically signed on behalf of an organization. The electronic signature service can retrieve organization data indicative of signatories that are authorized to electronically sign the electronic document. The organization data may be inaccessible to a first signatory that is associated with the document. The electronic signature service can determine from the organization data that the first signatory is not authorized to electronically sign the document. The electronic signature service can update the electronic document with a second signatory that is determined from the organization data as being authorized to execute the document.
    Type: Grant
    Filed: December 9, 2014
    Date of Patent: August 9, 2016
    Assignee: Adobe Systems Incorporated
    Inventor: Benjamin David Follis
  • Patent number: 9398026
    Abstract: Method for managing appliance authentication. In one embodiment, the method comprises generating, by a server, a first secret and a second secret from a certificate; transmitting from the server to a client computer, via a first channel secured and trusted based on a trusted computer, the first secret and the second secret; presenting the certificate to an appliance in response to a secure channel request from the appliance, wherein the appliance is holding the first secret; receiving, from the appliance, a description of a second channel, via the appliance, between the client computer and the server; establishing a trust in the second channel based on the description; and transmitting, in response to the trust in the second channel, via the second channel, channel information that comprises a portion of the description signed by the second secret.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: July 19, 2016
    Assignee: Teradici Corporation
    Inventors: William John Dall, Arthur Neil Klassen
  • Patent number: 9384339
    Abstract: Authenticating cloud computing enabling secure services (ACCESS) offloads “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client device to communicate directly with the server (and utilize the service) without any further authentication being necessary.
    Type: Grant
    Filed: January 8, 2013
    Date of Patent: July 5, 2016
    Assignee: Telecommunication Systems, Inc.
    Inventors: John L. Griffin, Keith A. McFarland, William P. Wells
  • Patent number: 9378262
    Abstract: A system of replicating data stored on a source node. Replication can be configured between two controllers, the source node on the one hand, and a target node on the other. A synchronization relationship between the source node and the target node is established and maintained. The synchronization relationship can be quickly and easily created for disaster recovery, real-time backup and failover, thereby ensuring that data on the source node is fully-protected at an off-site location or on another server or VM, for example, at another data center, a different building or elsewhere in the cloud. Processes described herein streamline the entire replication setup process, thereby significantly reducing error rates in conventional systems and making the replication process more user friendly than in conventional systems.
    Type: Grant
    Filed: December 5, 2014
    Date of Patent: June 28, 2016
    Assignee: SOFTNAS, LLC
    Inventor: Rick Gene Braddy