Patents Examined by Nega Woldemariam
  • Patent number: 10380095
    Abstract: Exemplary embodiments are directed to a method and apparatus for storing data for a batch of manufactured items. The method comprises defining in a processor, using a lower limit identifier and an upper limit identifier, a range of unique item identifiers for the batch, wherein each manufactured item in the batch is allocated a unique item identifier falling within the range. The item identifiers are stored in allocated storage space. If an upper limit identifier is specified for each time interval, an amount of storage specified for all manufactured items during a production time period is calculated as a sum of a first product and a second product, the first product being a product of a production time and a size allocated to each upper limit identifier, and the second product being a product of the production time, a total number of manufactured items, and a percentage of unused identifiers.
    Type: Grant
    Filed: March 22, 2018
    Date of Patent: August 13, 2019
    Assignee: Philip Morris USA Inc.
    Inventors: Erwan Fradet, Alain Sager, Patrick Mauroux, Patrick Chanez, Philippe Chatelain
  • Patent number: 10368240
    Abstract: A profile downloading method and apparatus is provided for a terminal to download and install a profile in a communication system. The communication method of the terminal includes transmitting a first message including information on a profile to be received from a profile provision server; receiving a second message including information indicating whether an encryption code input is required and a first modified encryption code; generating, when the first modified encryption code is successfully authenticated, a second modified encryption code; transmitting to the profile provision server a third message including information requesting to the profile provision server for the second modified encryption code and profile download, and receiving a fourth message including information on the profile from the profile provision server.
    Type: Grant
    Filed: August 31, 2016
    Date of Patent: July 30, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jonghan Park, Duckey Lee, Hyewon Lee, Sangsoo Lee
  • Patent number: 10346370
    Abstract: Some external users in a public on-line community may post excessive numbers of items, causing annoyance to others and unnecessary loading on database resources. A robust moderation framework enables an individual community moderator or admin to specify a set of rules and actions to mitigate this problem. Scalable, performant rate limiting rules employ windowed counters, separately for each rule, with the counters maintained in cache memory resources outside the main database.
    Type: Grant
    Filed: September 22, 2016
    Date of Patent: July 9, 2019
    Assignee: SALESFORCE.COM, INC.
    Inventors: Kenneth Chung Kay Ko, Joshua Luft-Glidden, Lucas Pfister
  • Patent number: 10341114
    Abstract: A providing device according to the present application includes a detecting unit and a providing unit. The detecting unit detects a function, from among functions used for communication with an authentication server that authenticates the identity of a user by verifying a signature of authentication result information that is information created by adding the signature using a predetermined key to an authentication result obtained by an authentication device that performs personal authentication on the user and that is information processed by a specific authentication procedure, that is not held by a terminal device that is used by the user. The providing unit provides the function detected by the detecting unit to the terminal device that is used by the user.
    Type: Grant
    Filed: August 1, 2016
    Date of Patent: July 2, 2019
    Assignee: YAHOO JAPAN CORPORATION
    Inventors: Takashi Kusumi, Hidehito Gomi, Hiroshi Ueno, Shuji Yamaguchi, Yusuke Kondo
  • Patent number: 10341110
    Abstract: A password is secured using a first key. At least one of a password record, a username record, and as domain name record is created. The at least one password record, username record, and domain name record are associated. The associated records are encrypted using a second key, where the second key is different from the first key. A credentials record is created based on the encrypted associated records.
    Type: Grant
    Filed: March 29, 2013
    Date of Patent: July 2, 2019
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Gary Lewis Poole, John Luke Herndon, Donald Gonzalez
  • Patent number: 10334445
    Abstract: A computer-implemented method is provided for a management entity to detect where a rogue access point is connected to the network infrastructure. The management entity receives from a wireless network controller an indication of an unauthorized frame wirelessly intercepted by an authorized access point. The unauthorized frame carries data between a rogue access point and a wireless client device. The rogue access point is connected to a compromised network element in a managed network at a compromised port of the compromised network element. The management entity extracts a client network address and a gateway network address from the indication of the unauthorized frame. The management entity traces a path through the managed network from a gateway network element associated with the gateway network address to the compromised network element. The management entity determines the compromised port in the compromised network element at which the rogue access point is connected.
    Type: Grant
    Filed: October 14, 2015
    Date of Patent: June 25, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Sanjay Kumar Hooda, Poon Kuen Leung, Liu Huang, Vishwas Vijendra Bhat, Shweta Arvind Saraf
  • Patent number: 10313307
    Abstract: The present disclosure provides methods and apparatus for administering an interface between a machine-to-machine, M2M, device and a network application function, NAF, for secure communication between the M2M device and the NAF. In one method, the M2M device comprises security information for enabling secure communication via the interface, and administers the interface by: setting a secure interface lifetime parameter based on a lifetime of at least part of the security information; and transmitting administration data to the NAF, wherein the administration data comprises the secure interface lifetime parameter.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: June 4, 2019
    Assignee: VODAFONE IP LICENSING LIMITED
    Inventor: Nick Bone
  • Patent number: 10305896
    Abstract: The invention relates to an authentication system, comprising a security element (1) having a changing or changeable surface (6), structure, volume, composition, or sequence of characters, an assignment means, which assigns the security element (1) to a person, an object, a medium, or a group of these, a local or central memory device for storing security feature, an interrogator for retrieving a current visual appearance of the security feature, a data synchronization means for comparing the retrieved visual appearance with the visual appearance of the security element (1) stored in the local or central memory device, wherein an inherent or external trigger means is present, which effects a change at least in some areas of a surface (6), structure or characteristic of the security element (1), such that a dynamically changed security element (1) is produced which is available as the current visual appearance for a query by the interrogator.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: May 28, 2019
    Inventor: Friedrich Kisters
  • Patent number: 10305977
    Abstract: Technical solutions are described automatically filtering user images being uploaded to a social network. An example computer-implemented method includes detecting an image file, which contains an image of a user, being uploaded to the social network server. The method further includes determining compliance of the image file with a predetermined profile associated with the user. The method further includes, in response to the image failing to comply with the predetermined profile, modifying the image file to generate a modified image file, and uploading the modified image file to the social network server.
    Type: Grant
    Filed: August 5, 2016
    Date of Patent: May 28, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Al Chakra, Jonathan Dunne, Liam Harpur, Asima Silva
  • Patent number: 10282566
    Abstract: A base member for a tablet computing device including a fastener to removably couple a tablet computing device to the base. A receptacle can receive a security lock to secure the base, wherein the security lock is to prevent the fastener from releasing the tablet computing device in a first mode and allows the releasing of the tablet computing device in a second mode.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: May 7, 2019
    Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventor: Earl W Moore
  • Patent number: 10257051
    Abstract: Method and device for managing cloud computing resources with an external account, the resources being associated with one or more internal main accounts. The method includes verifying an identity of the external account via a server, determining, if the identity of the external account is verified, whether a virtual sub-account is bound to the external account, the virtual sub-account being subordinate to an internal main account of the one or more internal main accounts, and allowing, if it is determined that the virtual sub-account is bound to the external account, the external account to manage the resources associated with the internal main account based on pre-configured rights of the virtual sub-account.
    Type: Grant
    Filed: August 2, 2016
    Date of Patent: April 9, 2019
    Assignee: ALIBABA GROUP HOLDING LIMITED
    Inventors: Boyang Liu, Jun Li
  • Patent number: 10231124
    Abstract: The invention provides an anti-theft method and client for a mobile terminal. Wherein, the anti-theft method for a mobile terminal comprises: receiving a background anti-theft opening instruction from a server, wherein the background anti-theft opening instruction carries verification information of the mobile terminal; parsing the background anti-theft opening instruction, obtaining the verification information and performing verification; and opening the anti-theft function in the background according to the background anti-theft opening instruction if the verification is passed. The embodiment of the invention can open the anti-theft function of a mobile terminal after the mobile terminal is lost, and then perform a corresponding anti-theft operation according to an anti-theft instruction, which achieves the beneficial effects of guaranteeing the security of the mobile terminal and fighting against theft crimes more reasonably and effectively.
    Type: Grant
    Filed: November 28, 2014
    Date of Patent: March 12, 2019
    Assignee: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Zheng Huang, Jiongxuan Zhang, Guofeng Fan, Xuesong Yan, Yunyu Tan
  • Patent number: 10223758
    Abstract: In one embodiment, a social-networking system authenticates a user of a mobile device, receives a request from the mobile device to install a software application, transmits data to the mobile device comprising the software application and an installation identifier (ID), receives another request including the installation ID from the mobile device to authorize the software application, evaluates the installation ID for validity, and transmits yet another response to the mobile device in accordance with the evaluation.
    Type: Grant
    Filed: June 5, 2017
    Date of Patent: March 5, 2019
    Assignee: Facebook, Inc.
    Inventors: Thomas Alison, Micha Berdichevsky, Bosmat Mazal Eldar, Shashank Pandit
  • Patent number: 10198570
    Abstract: Disclosed are a dynamic password lock and a remote password lock apparatus. The dynamic password lock includes a bolt, a bolt actuation device, a microprocessor, an unlocking authentication device and a power supply conversion device, the unlocking authentication device being connected electrically with the bolt actuation device through the microprocessor to actuate the bolt, in which: the dynamic password lock further includes a physical interface, the physical interface is connected electrically with the microprocessor to serve as a communication interface for the dynamic password lock to communicate with external communication equipment; and the physical interface is connected electrically with the power supply conversion device to serve as a powering interface for external powering equipment to power the dynamic password lock. The remote password lock includes the dynamic password lock, an IPC and a storage device.
    Type: Grant
    Filed: May 13, 2016
    Date of Patent: February 5, 2019
    Assignee: SGSG SCIENCE & TECHNOLOGY CO., LTD. ZHUHAI
    Inventors: Zheng Ma, Zhihong Xiao, Jiaxian Chen, Ming Peng
  • Patent number: 10185823
    Abstract: Technologies are described herein for examining memory data of execution environments to identify potential anomalies. An execution environment is identified as having a potential anomaly. The memory data associated with the execution environment is identified as having a potential anomaly. Checksums may be generated for the identified memory and for memory associated with other execution environments. Execution environments may be identified as having potential anomalies based, at least in part, on a commonality of the memory data of the execution environment that is identified as a having a potential anomaly with the memory data of another execution environment. Different actions may be performed on the execution environments that are identified as having a potential anomaly.
    Type: Grant
    Filed: November 18, 2014
    Date of Patent: January 22, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Eden Grail Adogla, Brijesh Singh
  • Patent number: 10181057
    Abstract: In particular embodiments, a method may include automatically determining that a mobile computing device is unlocked and away from a pre-determined trusted user associated with the mobile computing device, where the determining that the mobile computing device is away from the pre-determined trusted user is based on communication between the mobile computing device and an identification device carried by the trusted user, and by the mobile computing device, automatically erasing all software and data on the mobile computing device. The identification device may include a BLUETOOTH fob, a Near-Field Communication (NFC) tag, or a Radio-Frequency Identification (RFID) tag. The method may include communicating with the identification device to verify that the identification device is in a vicinity of the mobile computing device. The communication may be via a communication protocol such as BLUETOOTH, a Near-Field Communication (NFC), or Radio-Frequency Identification (RFID).
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: January 15, 2019
    Assignee: Facebook, Inc.
    Inventor: Jason S. Sobel
  • Patent number: 10169582
    Abstract: A system, method, and computer program product are provided for identifying a file utilized to automatically launch content as unwanted. In one embodiment, a file is identified in response to a detection of unwanted code, the file utilized to automatically launch content. Additionally, it is determined whether an identifier associated with the unwanted code is included in the file. Further, the file is identified as unwanted based on the determination.
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: January 1, 2019
    Assignee: McAfee, LLC
    Inventors: Vinoo Thomas, Palasamudram Ramagopal Prashanth, Rahul Mohandas
  • Patent number: 10169253
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Grant
    Filed: August 21, 2017
    Date of Patent: January 1, 2019
    Inventors: Xiaoxin Chen, Carl A. Waldspurger, Pratap Subrahmanyam, Tal Garfinkel, Dan Boneh
  • Patent number: 10169555
    Abstract: In particular embodiments, two or more users are provided with personalized experiences while using a shared mobile computing device. A login interface is presented for a plurality of users of the shared mobile computing device. When an indication of a login action by a first user of the plurality of users is detected, access to restricted information associated with any other user of the plurality of users is disabled. Cached information associated with the first user is retrieved from a local data store. A personalized user interface is then presented, based on the cached information. Updates to information and/or content may be cached and/or stored remotely. When an indication of a logout action by a first user of the plurality of users is detected, particular information and/or content is flushed from the local data store.
    Type: Grant
    Filed: June 20, 2016
    Date of Patent: January 1, 2019
    Assignee: Facebook, Inc.
    Inventors: Erick Tseng, Eyal Michael Sharon
  • Patent number: 10162951
    Abstract: A non-modal notification user interface element is displayed persistently but unobtrusively such that a user may easily determine that authentication credentials are required by a background synchronization process. The non-modal notification is configured such that it may be ignored by the user such that their workflow is not interrupted. The background synchronization continues to synchronize the data it can even though the background synchronization may require authentication credentials for a subset of the data to be synchronized. The user may select the non-modal notification user interface element at any point in time in order to supply the required authentication credentials. The non-modal notification is removed from the display when there are no further authentication credentials required.
    Type: Grant
    Filed: September 28, 2017
    Date of Patent: December 25, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: David J. Rasmussen, Ilya Koulchin