Patents Examined by Nega Woldemariam
-
Patent number: 10380095Abstract: Exemplary embodiments are directed to a method and apparatus for storing data for a batch of manufactured items. The method comprises defining in a processor, using a lower limit identifier and an upper limit identifier, a range of unique item identifiers for the batch, wherein each manufactured item in the batch is allocated a unique item identifier falling within the range. The item identifiers are stored in allocated storage space. If an upper limit identifier is specified for each time interval, an amount of storage specified for all manufactured items during a production time period is calculated as a sum of a first product and a second product, the first product being a product of a production time and a size allocated to each upper limit identifier, and the second product being a product of the production time, a total number of manufactured items, and a percentage of unused identifiers.Type: GrantFiled: March 22, 2018Date of Patent: August 13, 2019Assignee: Philip Morris USA Inc.Inventors: Erwan Fradet, Alain Sager, Patrick Mauroux, Patrick Chanez, Philippe Chatelain
-
Patent number: 10368240Abstract: A profile downloading method and apparatus is provided for a terminal to download and install a profile in a communication system. The communication method of the terminal includes transmitting a first message including information on a profile to be received from a profile provision server; receiving a second message including information indicating whether an encryption code input is required and a first modified encryption code; generating, when the first modified encryption code is successfully authenticated, a second modified encryption code; transmitting to the profile provision server a third message including information requesting to the profile provision server for the second modified encryption code and profile download, and receiving a fourth message including information on the profile from the profile provision server.Type: GrantFiled: August 31, 2016Date of Patent: July 30, 2019Assignee: Samsung Electronics Co., Ltd.Inventors: Jonghan Park, Duckey Lee, Hyewon Lee, Sangsoo Lee
-
Patent number: 10346370Abstract: Some external users in a public on-line community may post excessive numbers of items, causing annoyance to others and unnecessary loading on database resources. A robust moderation framework enables an individual community moderator or admin to specify a set of rules and actions to mitigate this problem. Scalable, performant rate limiting rules employ windowed counters, separately for each rule, with the counters maintained in cache memory resources outside the main database.Type: GrantFiled: September 22, 2016Date of Patent: July 9, 2019Assignee: SALESFORCE.COM, INC.Inventors: Kenneth Chung Kay Ko, Joshua Luft-Glidden, Lucas Pfister
-
Patent number: 10341114Abstract: A providing device according to the present application includes a detecting unit and a providing unit. The detecting unit detects a function, from among functions used for communication with an authentication server that authenticates the identity of a user by verifying a signature of authentication result information that is information created by adding the signature using a predetermined key to an authentication result obtained by an authentication device that performs personal authentication on the user and that is information processed by a specific authentication procedure, that is not held by a terminal device that is used by the user. The providing unit provides the function detected by the detecting unit to the terminal device that is used by the user.Type: GrantFiled: August 1, 2016Date of Patent: July 2, 2019Assignee: YAHOO JAPAN CORPORATIONInventors: Takashi Kusumi, Hidehito Gomi, Hiroshi Ueno, Shuji Yamaguchi, Yusuke Kondo
-
Patent number: 10341110Abstract: A password is secured using a first key. At least one of a password record, a username record, and as domain name record is created. The at least one password record, username record, and domain name record are associated. The associated records are encrypted using a second key, where the second key is different from the first key. A credentials record is created based on the encrypted associated records.Type: GrantFiled: March 29, 2013Date of Patent: July 2, 2019Assignee: Hewlett-Packard Development Company, L.P.Inventors: Gary Lewis Poole, John Luke Herndon, Donald Gonzalez
-
Patent number: 10334445Abstract: A computer-implemented method is provided for a management entity to detect where a rogue access point is connected to the network infrastructure. The management entity receives from a wireless network controller an indication of an unauthorized frame wirelessly intercepted by an authorized access point. The unauthorized frame carries data between a rogue access point and a wireless client device. The rogue access point is connected to a compromised network element in a managed network at a compromised port of the compromised network element. The management entity extracts a client network address and a gateway network address from the indication of the unauthorized frame. The management entity traces a path through the managed network from a gateway network element associated with the gateway network address to the compromised network element. The management entity determines the compromised port in the compromised network element at which the rogue access point is connected.Type: GrantFiled: October 14, 2015Date of Patent: June 25, 2019Assignee: Cisco Technology, Inc.Inventors: Sanjay Kumar Hooda, Poon Kuen Leung, Liu Huang, Vishwas Vijendra Bhat, Shweta Arvind Saraf
-
Patent number: 10313307Abstract: The present disclosure provides methods and apparatus for administering an interface between a machine-to-machine, M2M, device and a network application function, NAF, for secure communication between the M2M device and the NAF. In one method, the M2M device comprises security information for enabling secure communication via the interface, and administers the interface by: setting a secure interface lifetime parameter based on a lifetime of at least part of the security information; and transmitting administration data to the NAF, wherein the administration data comprises the secure interface lifetime parameter.Type: GrantFiled: September 12, 2014Date of Patent: June 4, 2019Assignee: VODAFONE IP LICENSING LIMITEDInventor: Nick Bone
-
Patent number: 10305896Abstract: The invention relates to an authentication system, comprising a security element (1) having a changing or changeable surface (6), structure, volume, composition, or sequence of characters, an assignment means, which assigns the security element (1) to a person, an object, a medium, or a group of these, a local or central memory device for storing security feature, an interrogator for retrieving a current visual appearance of the security feature, a data synchronization means for comparing the retrieved visual appearance with the visual appearance of the security element (1) stored in the local or central memory device, wherein an inherent or external trigger means is present, which effects a change at least in some areas of a surface (6), structure or characteristic of the security element (1), such that a dynamically changed security element (1) is produced which is available as the current visual appearance for a query by the interrogator.Type: GrantFiled: March 18, 2015Date of Patent: May 28, 2019Inventor: Friedrich Kisters
-
Patent number: 10305977Abstract: Technical solutions are described automatically filtering user images being uploaded to a social network. An example computer-implemented method includes detecting an image file, which contains an image of a user, being uploaded to the social network server. The method further includes determining compliance of the image file with a predetermined profile associated with the user. The method further includes, in response to the image failing to comply with the predetermined profile, modifying the image file to generate a modified image file, and uploading the modified image file to the social network server.Type: GrantFiled: August 5, 2016Date of Patent: May 28, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Al Chakra, Jonathan Dunne, Liam Harpur, Asima Silva
-
Patent number: 10282566Abstract: A base member for a tablet computing device including a fastener to removably couple a tablet computing device to the base. A receptacle can receive a security lock to secure the base, wherein the security lock is to prevent the fastener from releasing the tablet computing device in a first mode and allows the releasing of the tablet computing device in a second mode.Type: GrantFiled: November 25, 2013Date of Patent: May 7, 2019Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventor: Earl W Moore
-
Patent number: 10257051Abstract: Method and device for managing cloud computing resources with an external account, the resources being associated with one or more internal main accounts. The method includes verifying an identity of the external account via a server, determining, if the identity of the external account is verified, whether a virtual sub-account is bound to the external account, the virtual sub-account being subordinate to an internal main account of the one or more internal main accounts, and allowing, if it is determined that the virtual sub-account is bound to the external account, the external account to manage the resources associated with the internal main account based on pre-configured rights of the virtual sub-account.Type: GrantFiled: August 2, 2016Date of Patent: April 9, 2019Assignee: ALIBABA GROUP HOLDING LIMITEDInventors: Boyang Liu, Jun Li
-
Patent number: 10231124Abstract: The invention provides an anti-theft method and client for a mobile terminal. Wherein, the anti-theft method for a mobile terminal comprises: receiving a background anti-theft opening instruction from a server, wherein the background anti-theft opening instruction carries verification information of the mobile terminal; parsing the background anti-theft opening instruction, obtaining the verification information and performing verification; and opening the anti-theft function in the background according to the background anti-theft opening instruction if the verification is passed. The embodiment of the invention can open the anti-theft function of a mobile terminal after the mobile terminal is lost, and then perform a corresponding anti-theft operation according to an anti-theft instruction, which achieves the beneficial effects of guaranteeing the security of the mobile terminal and fighting against theft crimes more reasonably and effectively.Type: GrantFiled: November 28, 2014Date of Patent: March 12, 2019Assignee: BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Zheng Huang, Jiongxuan Zhang, Guofeng Fan, Xuesong Yan, Yunyu Tan
-
Patent number: 10223758Abstract: In one embodiment, a social-networking system authenticates a user of a mobile device, receives a request from the mobile device to install a software application, transmits data to the mobile device comprising the software application and an installation identifier (ID), receives another request including the installation ID from the mobile device to authorize the software application, evaluates the installation ID for validity, and transmits yet another response to the mobile device in accordance with the evaluation.Type: GrantFiled: June 5, 2017Date of Patent: March 5, 2019Assignee: Facebook, Inc.Inventors: Thomas Alison, Micha Berdichevsky, Bosmat Mazal Eldar, Shashank Pandit
-
Patent number: 10198570Abstract: Disclosed are a dynamic password lock and a remote password lock apparatus. The dynamic password lock includes a bolt, a bolt actuation device, a microprocessor, an unlocking authentication device and a power supply conversion device, the unlocking authentication device being connected electrically with the bolt actuation device through the microprocessor to actuate the bolt, in which: the dynamic password lock further includes a physical interface, the physical interface is connected electrically with the microprocessor to serve as a communication interface for the dynamic password lock to communicate with external communication equipment; and the physical interface is connected electrically with the power supply conversion device to serve as a powering interface for external powering equipment to power the dynamic password lock. The remote password lock includes the dynamic password lock, an IPC and a storage device.Type: GrantFiled: May 13, 2016Date of Patent: February 5, 2019Assignee: SGSG SCIENCE & TECHNOLOGY CO., LTD. ZHUHAIInventors: Zheng Ma, Zhihong Xiao, Jiaxian Chen, Ming Peng
-
Patent number: 10185823Abstract: Technologies are described herein for examining memory data of execution environments to identify potential anomalies. An execution environment is identified as having a potential anomaly. The memory data associated with the execution environment is identified as having a potential anomaly. Checksums may be generated for the identified memory and for memory associated with other execution environments. Execution environments may be identified as having potential anomalies based, at least in part, on a commonality of the memory data of the execution environment that is identified as a having a potential anomaly with the memory data of another execution environment. Different actions may be performed on the execution environments that are identified as having a potential anomaly.Type: GrantFiled: November 18, 2014Date of Patent: January 22, 2019Assignee: Amazon Technologies, Inc.Inventors: Eden Grail Adogla, Brijesh Singh
-
Patent number: 10181057Abstract: In particular embodiments, a method may include automatically determining that a mobile computing device is unlocked and away from a pre-determined trusted user associated with the mobile computing device, where the determining that the mobile computing device is away from the pre-determined trusted user is based on communication between the mobile computing device and an identification device carried by the trusted user, and by the mobile computing device, automatically erasing all software and data on the mobile computing device. The identification device may include a BLUETOOTH fob, a Near-Field Communication (NFC) tag, or a Radio-Frequency Identification (RFID) tag. The method may include communicating with the identification device to verify that the identification device is in a vicinity of the mobile computing device. The communication may be via a communication protocol such as BLUETOOTH, a Near-Field Communication (NFC), or Radio-Frequency Identification (RFID).Type: GrantFiled: August 5, 2015Date of Patent: January 15, 2019Assignee: Facebook, Inc.Inventor: Jason S. Sobel
-
Patent number: 10169582Abstract: A system, method, and computer program product are provided for identifying a file utilized to automatically launch content as unwanted. In one embodiment, a file is identified in response to a detection of unwanted code, the file utilized to automatically launch content. Additionally, it is determined whether an identifier associated with the unwanted code is included in the file. Further, the file is identified as unwanted based on the determination.Type: GrantFiled: January 13, 2015Date of Patent: January 1, 2019Assignee: McAfee, LLCInventors: Vinoo Thomas, Palasamudram Ramagopal Prashanth, Rahul Mohandas
-
Patent number: 10169253Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.Type: GrantFiled: August 21, 2017Date of Patent: January 1, 2019Inventors: Xiaoxin Chen, Carl A. Waldspurger, Pratap Subrahmanyam, Tal Garfinkel, Dan Boneh
-
Patent number: 10169555Abstract: In particular embodiments, two or more users are provided with personalized experiences while using a shared mobile computing device. A login interface is presented for a plurality of users of the shared mobile computing device. When an indication of a login action by a first user of the plurality of users is detected, access to restricted information associated with any other user of the plurality of users is disabled. Cached information associated with the first user is retrieved from a local data store. A personalized user interface is then presented, based on the cached information. Updates to information and/or content may be cached and/or stored remotely. When an indication of a logout action by a first user of the plurality of users is detected, particular information and/or content is flushed from the local data store.Type: GrantFiled: June 20, 2016Date of Patent: January 1, 2019Assignee: Facebook, Inc.Inventors: Erick Tseng, Eyal Michael Sharon
-
Patent number: 10162951Abstract: A non-modal notification user interface element is displayed persistently but unobtrusively such that a user may easily determine that authentication credentials are required by a background synchronization process. The non-modal notification is configured such that it may be ignored by the user such that their workflow is not interrupted. The background synchronization continues to synchronize the data it can even though the background synchronization may require authentication credentials for a subset of the data to be synchronized. The user may select the non-modal notification user interface element at any point in time in order to supply the required authentication credentials. The non-modal notification is removed from the display when there are no further authentication credentials required.Type: GrantFiled: September 28, 2017Date of Patent: December 25, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: David J. Rasmussen, Ilya Koulchin