Patents Examined by Sakinah Taylor
-
Patent number: 10389697Abstract: Technologies are described herein for managing the activation of software containers, for throttling of requests directed to tenants executing in a software container, and for priming the execution of software containers. The activation of software containers and tenants may be managed by maintaining an activation queue for storing requests to activate software containers or tenants on a host computer. Requests may be retrieved from the queue and utilized to determine whether a software container or a tenant is to be activated on a host. “Bounce” or hot swap tenant activations may be performed. Tenant activation requests might also be throttled by denying the requests or by postponing the requests until a later time. A software container might also be configured to throttle incoming requests to tenants executing therein. The execution of a software container might also be primed by replaying previously recorded network traffic to the software container.Type: GrantFiled: September 26, 2014Date of Patent: August 20, 2019Assignee: Amazon Technologies, Inc.Inventors: Vijay Ravindra Kulkarni, Kevin Michael Beranek, Keian Christopher, Chris Hasz, Samuel Leonard Moniz, Kyle Bradley Peterson, Ajit Ashok Varangaonkar, Jun Xu
-
Patent number: 9906538Abstract: A method for securing a computer system includes detecting a malware attack on a honeypot node, and, based on the detected malware attack, automatically generating investigation directives for verifying whether an endpoint of the computer system is subject to the malware attack. The investigation directives are distributed to one or more software agents that are each associated with one or more endpoints of the computer system. At least one infected endpoint in the computer system, which is subject to the malware attack, is identified by the software agents using the investigation directives.Type: GrantFiled: November 30, 2015Date of Patent: February 27, 2018Assignee: GUARDICORE LTD.Inventors: Ariel Zeitlin, Lior Neudorfer
-
Patent number: 9906548Abstract: A method to augment a plurality of IPS or SIEM evidence information is provided. The method may include monitoring a plurality of processes associated with a computer system. The method may also include identifying a plurality of processes that have network activity. The method may further include capturing the identified plurality of processes that have network activity. The method may also include storing the identified captured plurality of processes that have network activity. The method may include monitoring a plurality of selected programs associated with an operating system of the computer system. The method may also include identifying a plurality of selected programs that have network activity. The method may further include capturing a plurality of screen capture images associated with the identified plurality of selected programs. The method may include storing, by the second component the captured plurality of system process activity.Type: GrantFiled: October 12, 2016Date of Patent: February 27, 2018Assignee: International Business Machines CorporationInventors: Chien Pang Lee, Hariharan Mahadevan
-
Patent number: 9906547Abstract: A method to augment a plurality of IPS or SIEM evidence information is provided. The method may include monitoring a plurality of processes associated with a computer system. The method may also include identifying a plurality of processes that have network activity. The method may further include capturing the identified plurality of processes that have network activity. The method may also include storing the identified captured plurality of processes that have network activity. The method may include monitoring a plurality of selected programs associated with an operating system of the computer system. The method may also include identifying a plurality of selected programs that have network activity. The method may further include capturing a plurality of screen capture images associated with the identified plurality of selected programs. The method may include storing, by the second component the captured plurality of system process activity.Type: GrantFiled: August 26, 2016Date of Patent: February 27, 2018Assignee: International Business Machines CorporationInventors: Chien Pang Lee, Hariharan Mahadevan
-
Patent number: 9900287Abstract: Methods and apparatus for encrypting and decrypting data for wearable devices that are not based on authentication techniques, such as login/password or handshaking, are provided. A computing device receives a message. The message includes encrypted data and a cryptographic reference. The encrypted data includes physiological data of a wearer of the wearable device. The cryptographic reference includes a reference to a first cryptographic technique. The computing device determines the first cryptographic technique based on the reference to the first cryptographic technique. The computing device determines a cryptographic key. The computing device decrypts the encrypted data using the first cryptographic technique and the cryptographic key to obtain decrypted data. The computing device stores the decrypted data.Type: GrantFiled: September 12, 2014Date of Patent: February 20, 2018Assignee: Verily Life Sciences, LLCInventors: Sarel Kobus Jooste, Jonathan Dixon, Shane Alexander Farmer, Patrick Lin Wheeler
-
Patent number: 9898594Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password where the organizations providing/controlling access can establish geo-fences relating to the credential information.Type: GrantFiled: March 19, 2015Date of Patent: February 20, 2018Assignee: BluInk Ltd.Inventor: Laurence Hamid
-
Patent number: 9894066Abstract: Disclosed are methods and devices for securely updating firmware of locking devices. One method includes receiving a lock identifier from a locking device; determining that the lock identifier is associated with a user profile by comparing the lock identifier to a set of lock identifiers; receiving a firmware update packet from a server, wherein the firmware packet is encrypted by a lock key; transmitting the firmware update packet to the lock; decrypting the firmware update using the lock key; validating the encrypted firmware update; and installing the firmware update.Type: GrantFiled: October 14, 2015Date of Patent: February 13, 2018Assignee: Master Lock Company LLCInventor: Nathan Conrad
-
Patent number: 9888379Abstract: Techniques described herein may provide for affiliation and disaffiliation of devices, such as office communication devices, associated with a user. The affiliation/disaffiliation may be performed using a mobile device (e.g., a smart phone). In one implementation, a method may include receiving a request to affiliate a user with one or more office devices; and receiving context data, from a mobile device, relating to a current context of the mobile device. The method may further include determining, based on the context data, to authorize the affiliation of the user with the one or more office devices; and provisioning, based on the determination to authorize the affiliation, the one or more office devices to customize the one or more office devices for the user.Type: GrantFiled: April 16, 2014Date of Patent: February 6, 2018Assignee: Verizon Patent and Licensing Inc.Inventors: Paul T. Schultz, Robert A. Sartini
-
Patent number: 9881156Abstract: Detecting heap spraying on a computer by determining that values of characteristics of a plurality of requests to allocate portions of heap memory are consistent with benchmark values of the characteristics, wherein the benchmark values of the characteristics are associated with heap spraying; and performing a computer-security-related remediation action responsive to determining that the values of the characteristics are consistent with the benchmark values of the characteristics.Type: GrantFiled: April 4, 2016Date of Patent: January 30, 2018Assignee: International Business Machines CorporationInventors: Zohar Basil, Amit Klein, Ron Peleg, Shmuel Regev
-
Patent number: 9875345Abstract: A method for preparing content for watermarking is disclosed. The content is available in different versions on a server for at least a client and the different versions of the content are subdivided into temporally aligned chunks. For each version of the content, candidate locations for watermarking are obtained. A watermark payload bit insertion rate is determined according to a minimum path. Watermark embedding metadata is generated for each version of the content such that the watermark payload bit insertion rate is the same. A device for implementing the method and a non-transitory program storage device are also disclosed.Type: GrantFiled: August 29, 2014Date of Patent: January 23, 2018Assignee: CONTENTARMORInventors: Antoine Robert, Gwenael Doerr, Omar Julian Alvarez Gomez
-
Patent number: 9858360Abstract: A system and method for controlling manufacturing of one or more items may include providing a first 3D design representation, the first 3D design representation usable by a manufacturing device for manufacturing the item; encrypting the first 3D design representation to produce an encrypted 3D design representation; associating a set of tokens with the encrypted 3D design representation and providing the encrypted 3D design representation. A method or system may include obtaining a token and including the token in a request to manufacture the item; using the token to determine whether or not to provide a decryption key; and, if determining to provide the decryption key, using the decryption key to produce a second 3D design representation, the second 3D design representation usable by a manufacturing device for manufacturing the item.Type: GrantFiled: March 10, 2014Date of Patent: January 2, 2018Assignee: MAKE IT LEO LTDInventors: Lee-Bath Nelson, Moshe Molcho
-
Patent number: 9843442Abstract: An operation apparatus includes a message expansion unit, a state data initiation unit, a state data generation unit, and a chain variable update unit. The message expansion unit generates a plurality of expanded messages using a message. The state data initiation unit generates the initial value of state data using chain variable data. The state data generation unit generates the final value of the state data by iterating a combination function and a step function using the state data and the plurality of expanded messages. The chain variable update unit updates the chain variable data using the state data of the final value.Type: GrantFiled: June 17, 2015Date of Patent: December 12, 2017Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Deukjo Hong, Jung Keun Lee, Woo-Hwan Kim, Daesung Kwon
-
Patent number: 9836620Abstract: A computing system includes a control unit configured to determine a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device; analyze a privacy risk level of a resource based on a resource content included in the resource, a metadata concerning the resource, a collective input regarding the resource, and the usage context; and generate one or more options for sharing the resource with the device based on the privacy risk level and the usage context.Type: GrantFiled: December 30, 2014Date of Patent: December 5, 2017Assignee: Samsung Electronic Co., Ltd.Inventor: Hongxia Jin
-
Patent number: 9825933Abstract: Systems and method for providing single sign on access to an application executing at a client device. An API request is intercepted at the client device for signing on a user of the client device for accessing the application. The API request is sent to a remote system where user credentials are determined based on the intercepted API request. The user credentials are returned to the client device where they are used to agnostically sign on the user for accessing the application.Type: GrantFiled: September 12, 2014Date of Patent: November 21, 2017Assignee: DATA ACCELERATOR LTD.Inventors: Matthew P. Clothier, Sean P. Corbett
-
Patent number: 9817842Abstract: It is an object to reduce a troublesomeness required to export/import an address book (destination table) between image processing apparatuses. For this purpose, at the time of import request of destination data for import, an import instruction to a group destination table is made. A group destination table ID which coincides with a destination table ID obtained from the destination data for import is retrieved. The group destination table associated with the group destination table ID is specified as a group destination table of an import destination side. The destination data obtained from the destination data for import is imported as destination data into the specified group destination table (group destination table DB).Type: GrantFiled: July 1, 2015Date of Patent: November 14, 2017Assignee: Canon Kabushiki KaishaInventor: Yoshihide Terao
-
Patent number: 9813414Abstract: Embodiments include methods for managing encrypted files by storing a user password hash including a predetermined function of the user password associated with that user ID and the secret keys. Aspects also include, in response to receipt from a user computer of an input password and a the user ID for a required encrypted file, communicating with authentication servers to implement a key-reconstruction protocol in which each server computes first and second hash values for the required encrypted file. The file management server uses the first hash values to compute an input password hash including the predetermined function of the input password and the secret keys, checks if the input password hash matches the user password hash for the received user ID, and reconstructs the encryption key for the required encrypted file.Type: GrantFiled: November 30, 2015Date of Patent: November 7, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jan L. Camenisch, Daniel Kovacs, Anja Lehmann, Gregory Neven
-
Patent number: 9813235Abstract: Technology is generally described for improving resistance to cache timing attacks made on block cipher encryption implementations. In some examples, the technology can include identifying one or more tunable parameters of the block cipher encryption algorithm; creating multiple encryption algorithm implementations by varying one or more of the parameter values; causing a computing system to encrypt data using the implementations; measuring average execution times at the computing system for the implementations subjecting the implementations to a cache timing attack; measuring average execution times at the computing system for the implementations subjected to a cache timing attack; computing a time difference between the average execution times for the implementations when not subjected and when subjected to a cache timing attack; selecting an implementation having a lower time difference; and using the selected implementation for a subsequent encryption operation.Type: GrantFiled: April 25, 2013Date of Patent: November 7, 2017Assignee: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPURInventors: Debdeep Mukhopadhyay, Chester Dominic Rebeiro
-
Patent number: 9811679Abstract: An electronic system includes: a control unit configured to operate on a user interface; and the user interface, coupled to the control unit, configure to: present an application coupled to an access configuration to customize a permission level for a service type, and receive an input for changing the permission level of the service type for accessing a resource type for customizing an operation of the application on a device.Type: GrantFiled: December 30, 2014Date of Patent: November 7, 2017Assignee: Samsung Electronics Co., Ltd.Inventors: Bin Liu, Hongxia Jin, Na Wang
-
Patent number: 9794284Abstract: A search engine includes a network interface that receives a search query and a search module. The search module determines a consideration set of applications corresponding to the search query based on application data stored for a plurality of applications, determines a respective number of source objects associated with each of the applications in the consideration set, determines whether each of the applications is a spam application based on the respective number of source objects associated with each of the applications, applies respective penalties to selected ones of the applications based on the determination of whether each of the applications is a spam application, generates search results based on the respective penalties applied to the selected ones of the applications, and provides the search results to be transmitted by the network interface.Type: GrantFiled: August 29, 2016Date of Patent: October 17, 2017Assignee: Quixey, Inc.Inventors: Eric Glover, Nachum Plonka
-
Patent number: 9792452Abstract: A Pervasive Intermediate Network Attached Storage Application (PINApp) enables users to digitally assign (pin/tack) a folder or drive to a public cloud storage service for the purpose of sharing their digital content with others. The PINApp enables users to engage the cloud storage services without the need to upload the digital content to the cloud in order for it to be viewed or shared. The PINApp can be used to unify all of the digital content stored on multiple devices and cloud services for a single owner or user.Type: GrantFiled: September 12, 2014Date of Patent: October 17, 2017Inventor: Anthony Tan