Patents Examined by Ronald Baum
-
Patent number: 9967259Abstract: In one embodiment, a method includes analyzing information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of a social-networking system, the first network-enabled device being associated with a first user of the social-networking system. The method also includes determining (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, where the authorization is based on social-networking information. The method further includes providing the instructions to the second network-enabled device.Type: GrantFiled: July 18, 2014Date of Patent: May 8, 2018Assignee: Facebook, Inc.Inventors: Yael G. Maguire, Damian Kowalewski
-
Patent number: 9961052Abstract: In virtualized environments a method of determining authorization to a resource cannot use a hardware specific identifier, such as a MAC address. As a result upgrading a virtual host may cause licenses associated with that host to be invalid, even though the upgraded virtual host should be authorized. Authentication methods and systems are disclosed such that a key may be shared with a second host along with a license file and, provided at least the second host has a key associated with its system identifier and a key associated with a license file, access to a licensed resource may be authorized.Type: GrantFiled: June 28, 2013Date of Patent: May 1, 2018Assignee: Extreme Networks, Inc.Inventors: William T. Walker, Aabha Biyani
-
Patent number: 9953172Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: GrantFiled: September 14, 2017Date of Patent: April 24, 2018Assignee: International Business Machines CorporationInventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Patent number: 9929861Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: GrantFiled: April 26, 2017Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Patent number: 9916460Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: GrantFiled: October 31, 2016Date of Patent: March 13, 2018Assignee: International Business Machines CorporationInventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Patent number: 9894039Abstract: Architecture for generating a temporary account (e.g., an email address) with a user-supplied friendly name and a secret used to the sign the temporary account. For example, when a user wishes to create a temporary email address to use with an online organization, a friendly name is provided and the system generates a temporary email address including the friendly name. A signing component signs the temporary email address with a secret. One or more of these secrets can be provisioned prior to the user's creation of a friendly name, which eliminates propagation delay. During use, only incoming email messages having the temporary email address signed with the secret are validated. When the user revokes the temporary email address, the secret is revoked and the revocation is propagated to network gateways, rejecting any email sent to that address.Type: GrantFiled: July 10, 2014Date of Patent: February 13, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Charles R. Salada, Mayerber Carvalho Neto, Charlie Chung, Mayank Mehta
-
Patent number: 9866590Abstract: An information processing apparatus includes a policy acquisition unit configured to acquire a policy on disclosure of information on a target user; a collection unit configured to collect attributes that may be related to the target user from public information disclosed on a network to create an attribute set related to the target user; and a determination unit configured to determine whether or not the attribute set satisfies the policy.Type: GrantFiled: January 19, 2015Date of Patent: January 9, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kohichi Kamijoh, Takayuki Osogami
-
Patent number: 9866533Abstract: A method is provided to share a content stored on a secured server. The content is associated to a first electronic device and encrypted using a public key of the first electronic device. The secured server stores a first re-encryption key from the first electronic device to a second electronic device. The method is implemented by the secured server and includes the steps of determining association of the content with the second electronic device, re-encrypting the content using the first re-encryption key, sending the content to the second electronic device for encryption using a second device public key and storing the encrypted content received from the second electronic device in association with the second electronic device.Type: GrantFiled: July 1, 2013Date of Patent: January 9, 2018Assignee: ORANGEInventors: Boris Chazalet, Tansir Ahmed
-
Patent number: 9780950Abstract: A method and system for authenticating a credential via a one time password which includes receiving a user ID, a client ID, and the one time password from a client device, and then validating the one time password based on the user ID and the credential ID. Upon validating the one time password, a response is sent to the client device, and the response includes at least one of an authorization to access a private key stored on the client device or at least a portion of the private key.Type: GrantFiled: June 14, 2013Date of Patent: October 3, 2017Assignee: Symantec CorporationInventors: Alan Dundas, Eirik Herskedal
-
Patent number: 9760863Abstract: Aspects of the present invention are directed to a method and system for distributing information from an information distributor in a banking environment. The method may include composing an electronic notification instrument by providing a notification component and providing a payload component, the payload component including a selectable link. The method may additionally include pushing the electronic notification instrument to an information client and allowing a pull from the information distributor through the electronic notification instrument such that the payload component including the selectable link is activated by an authorized information recipient, the authorized information recipient determined by the information client. The method may additionally include determining through a tracer whether the electronic notification instrument has an acceptable disposition and rendering the electronic notification instrument inaccessible if the disposition is not acceptable.Type: GrantFiled: July 28, 2014Date of Patent: September 12, 2017Assignee: JPMorgan Chase Bank, N.A.Inventors: Sih Lee, Adrian Kunzle
-
Patent number: 9763089Abstract: Managing data security on a mobile device. Data associated with a mobile device is received; the data includes an identification (ID) of the mobile device and a location of the mobile device relative to one or more location sensor devices. A path is determined, relative to the one or more location sensor devices, through which the mobile device has travelled. An electronic security key is communicated to the mobile device based on determining that the path corresponds to a defined path associated with the mobile device.Type: GrantFiled: June 23, 2015Date of Patent: September 12, 2017Assignee: International Business Machines CorporationInventors: Ye Chen, Ruomeng Hao, Ting Jiang, Ning Wang, Shu Xi Wei, Youmiao Zhang
-
Patent number: 9749864Abstract: Embodiments of the disclosure relate to controlling access to a mobile device with a paired device. Aspects include pairing the paired device with the mobile device and defining a security profile for the mobile device. Aspects also include receiving a user access request for a desired action via the mobile device and determining signal strength between the paired device and the mobile device. Aspects further include executing the desired action based on a determination that the signal strength is greater than a threshold in the security profile for the desired action.Type: GrantFiled: June 25, 2015Date of Patent: August 29, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yu Deng, Jenny S. Li, Theresa Y. Tai, Liangzhao Zeng
-
Patent number: 9747441Abstract: A method, system and program product for preventing phishing attacks, wherein the method comprises: acquiring links in a Web page; classifying the acquired links according link types; and determining whether a phishing attack exists according to the classified links, wherein the links are classified into two types: internal links belonging to the same domain as the address of the Web page, and external links belonging to a different domain from the address of the Web page. By carrying out the method or system according to the above one or more embodiments of the present disclosure, since it is first detected whether a Web page is a fake website of a phishing attack before displaying the reproduced Web page to the user and the user is warned upon detecting a fake website, unnecessary losses due to phishing attacks can be prevented.Type: GrantFiled: August 2, 2012Date of Patent: August 29, 2017Assignee: International Business Machines CorporationInventors: Bin Wang, Lin Xie, Yin Song, Lei Zhang, Man Sun, Dong Li
-
Patent number: 9736121Abstract: A manifest transfer engine for a one-way file transfer system is disclosed. The manifest transfer engine comprises a send side, a receive side, and a one-way data link enforcing unidirectional data flow from the send side to the receive side. The send side receives and stores a file manifest table from an administrator server. The send side also receives a file from a user and compares it with the file manifest table. Transfer of the file to the receive side via the one-way data link is allowed only when there is a match between the file and the file manifest table. In an alternative embodiment, the receive side instead receives and stores the file manifest table from the administrator server and compares it with the file received from the send side via the one-way data link to determine whether to allow transfer of the file.Type: GrantFiled: January 23, 2013Date of Patent: August 15, 2017Assignee: OWL Cyber Defense Solutions, LLCInventors: Ronald Mraz, James Hope
-
Patent number: 9715594Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: GrantFiled: October 15, 2015Date of Patent: July 25, 2017Assignee: International Business Machines CorporationInventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Patent number: 9712520Abstract: Techniques for authenticating a user may be described. In particular, a network-based document may be provided to a computing system of a user. The network-based document may include code and an identifier of another network-based document. The code may be configured to, upon execution, determine whether the other network-based document was accessed prior to providing the network-based document to the computing system. The other network-based document may be accessible to the user based on an identifier of the user. An indication that the other network-based document was accessed may be determined. For example, the indication may be received from the computing system based on an execution of the code at the computing system. The user may be authenticated based on the indication.Type: GrantFiled: June 23, 2015Date of Patent: July 18, 2017Assignee: Amazon Technologies, Inc.Inventors: Darren Ernest Canavor, William Alexander Strand
-
Patent number: 9692605Abstract: This invention includes a solution to enable a digital authentication solution comprising a network. Next, a first device is coupled to the network. The first device may include an authentication key generator that is able to generate both public and private keys in electronic formats. Next, the first device is coupled to a certificate authority gateway. The certificate authority gateway includes devices capable of converting the electronically formatted public key to a non-electronic format, and vice versa. Next, the certificate authority gateway is coupled to a certificate authority server. The certificate authority server includes devices capable of converting the electronically formatted public key to a non-electronic format, and vice versa. The certificate authority server is also contained in a secure area such as a locked room, or a safe. The secure area includes features that allow the non-electronically formatted public key to be passed across the boundary of the secure area.Type: GrantFiled: June 25, 2016Date of Patent: June 27, 2017Assignee: SAIFE, Inc.Inventors: Ty Lindteigen, James Chester Jones
-
Patent number: 9686080Abstract: A system and method is illustrated for providing secure credential using a secure credential package stored on a client device and at least one key stored in a corporate network. In embodiments, an access connector receives credentials and a device unique identifier from the client device over a secure link, obtain the at least one key from the corporate network, apply the at least one key to the credentials and the device unique identifier to generate the secure credential package including the encrypted credential and the device unique identifier, send the secure credential package to the client device over the secure link, upon receiving the secure credential package from the client device, retrieve the at least one key via the key manager, decrypting the secure credential package using the at least one key to obtain the credentials, and validate the credentials against a user directory located in the corporate network.Type: GrantFiled: July 14, 2016Date of Patent: June 20, 2017Assignee: EMC CorporationInventor: Leonard Chung
-
Patent number: 9672339Abstract: Electro-biometric data obtained from a user of a processor-based device may be used to authenticate that user. In some cases, no special action may need to be taken to initiate authentication.Type: GrantFiled: December 12, 2012Date of Patent: June 6, 2017Assignee: Intel CorporationInventor: Daniel H. Lange
-
Patent number: 9674207Abstract: In one embodiment, a device in a network identifies a set of traffic flow records that triggered an attack detector. The device selects a subset of the traffic flow records and calculates aggregated metrics for the subset. The device provides the aggregated metrics for the subset to the attack detector to generate an attack detection determination for the subset of traffic flow records. The device identifies one or more attack traffic flows from the set of traffic flow records based on the attack detection determination for the subset of traffic flow records.Type: GrantFiled: July 23, 2014Date of Patent: June 6, 2017Assignee: Cisco Technology, Inc.Inventors: Andrea Di Pietro, Jean-Philippe Vasseur, Javier Cruz Mota