Patents Examined by Sakinah Taylor
  • Patent number: 10389697
    Abstract: Technologies are described herein for managing the activation of software containers, for throttling of requests directed to tenants executing in a software container, and for priming the execution of software containers. The activation of software containers and tenants may be managed by maintaining an activation queue for storing requests to activate software containers or tenants on a host computer. Requests may be retrieved from the queue and utilized to determine whether a software container or a tenant is to be activated on a host. “Bounce” or hot swap tenant activations may be performed. Tenant activation requests might also be throttled by denying the requests or by postponing the requests until a later time. A software container might also be configured to throttle incoming requests to tenants executing therein. The execution of a software container might also be primed by replaying previously recorded network traffic to the software container.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: August 20, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Vijay Ravindra Kulkarni, Kevin Michael Beranek, Keian Christopher, Chris Hasz, Samuel Leonard Moniz, Kyle Bradley Peterson, Ajit Ashok Varangaonkar, Jun Xu
  • Patent number: 9906538
    Abstract: A method for securing a computer system includes detecting a malware attack on a honeypot node, and, based on the detected malware attack, automatically generating investigation directives for verifying whether an endpoint of the computer system is subject to the malware attack. The investigation directives are distributed to one or more software agents that are each associated with one or more endpoints of the computer system. At least one infected endpoint in the computer system, which is subject to the malware attack, is identified by the software agents using the investigation directives.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: February 27, 2018
    Assignee: GUARDICORE LTD.
    Inventors: Ariel Zeitlin, Lior Neudorfer
  • Patent number: 9906548
    Abstract: A method to augment a plurality of IPS or SIEM evidence information is provided. The method may include monitoring a plurality of processes associated with a computer system. The method may also include identifying a plurality of processes that have network activity. The method may further include capturing the identified plurality of processes that have network activity. The method may also include storing the identified captured plurality of processes that have network activity. The method may include monitoring a plurality of selected programs associated with an operating system of the computer system. The method may also include identifying a plurality of selected programs that have network activity. The method may further include capturing a plurality of screen capture images associated with the identified plurality of selected programs. The method may include storing, by the second component the captured plurality of system process activity.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: February 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Chien Pang Lee, Hariharan Mahadevan
  • Patent number: 9906547
    Abstract: A method to augment a plurality of IPS or SIEM evidence information is provided. The method may include monitoring a plurality of processes associated with a computer system. The method may also include identifying a plurality of processes that have network activity. The method may further include capturing the identified plurality of processes that have network activity. The method may also include storing the identified captured plurality of processes that have network activity. The method may include monitoring a plurality of selected programs associated with an operating system of the computer system. The method may also include identifying a plurality of selected programs that have network activity. The method may further include capturing a plurality of screen capture images associated with the identified plurality of selected programs. The method may include storing, by the second component the captured plurality of system process activity.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: February 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Chien Pang Lee, Hariharan Mahadevan
  • Patent number: 9900287
    Abstract: Methods and apparatus for encrypting and decrypting data for wearable devices that are not based on authentication techniques, such as login/password or handshaking, are provided. A computing device receives a message. The message includes encrypted data and a cryptographic reference. The encrypted data includes physiological data of a wearer of the wearable device. The cryptographic reference includes a reference to a first cryptographic technique. The computing device determines the first cryptographic technique based on the reference to the first cryptographic technique. The computing device determines a cryptographic key. The computing device decrypts the encrypted data using the first cryptographic technique and the cryptographic key to obtain decrypted data. The computing device stores the decrypted data.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: February 20, 2018
    Assignee: Verily Life Sciences, LLC
    Inventors: Sarel Kobus Jooste, Jonathan Dixon, Shane Alexander Farmer, Patrick Lin Wheeler
  • Patent number: 9898594
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password where the organizations providing/controlling access can establish geo-fences relating to the credential information.
    Type: Grant
    Filed: March 19, 2015
    Date of Patent: February 20, 2018
    Assignee: BluInk Ltd.
    Inventor: Laurence Hamid
  • Patent number: 9894066
    Abstract: Disclosed are methods and devices for securely updating firmware of locking devices. One method includes receiving a lock identifier from a locking device; determining that the lock identifier is associated with a user profile by comparing the lock identifier to a set of lock identifiers; receiving a firmware update packet from a server, wherein the firmware packet is encrypted by a lock key; transmitting the firmware update packet to the lock; decrypting the firmware update using the lock key; validating the encrypted firmware update; and installing the firmware update.
    Type: Grant
    Filed: October 14, 2015
    Date of Patent: February 13, 2018
    Assignee: Master Lock Company LLC
    Inventor: Nathan Conrad
  • Patent number: 9888379
    Abstract: Techniques described herein may provide for affiliation and disaffiliation of devices, such as office communication devices, associated with a user. The affiliation/disaffiliation may be performed using a mobile device (e.g., a smart phone). In one implementation, a method may include receiving a request to affiliate a user with one or more office devices; and receiving context data, from a mobile device, relating to a current context of the mobile device. The method may further include determining, based on the context data, to authorize the affiliation of the user with the one or more office devices; and provisioning, based on the determination to authorize the affiliation, the one or more office devices to customize the one or more office devices for the user.
    Type: Grant
    Filed: April 16, 2014
    Date of Patent: February 6, 2018
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Paul T. Schultz, Robert A. Sartini
  • Patent number: 9881156
    Abstract: Detecting heap spraying on a computer by determining that values of characteristics of a plurality of requests to allocate portions of heap memory are consistent with benchmark values of the characteristics, wherein the benchmark values of the characteristics are associated with heap spraying; and performing a computer-security-related remediation action responsive to determining that the values of the characteristics are consistent with the benchmark values of the characteristics.
    Type: Grant
    Filed: April 4, 2016
    Date of Patent: January 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Zohar Basil, Amit Klein, Ron Peleg, Shmuel Regev
  • Patent number: 9875345
    Abstract: A method for preparing content for watermarking is disclosed. The content is available in different versions on a server for at least a client and the different versions of the content are subdivided into temporally aligned chunks. For each version of the content, candidate locations for watermarking are obtained. A watermark payload bit insertion rate is determined according to a minimum path. Watermark embedding metadata is generated for each version of the content such that the watermark payload bit insertion rate is the same. A device for implementing the method and a non-transitory program storage device are also disclosed.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: January 23, 2018
    Assignee: CONTENTARMOR
    Inventors: Antoine Robert, Gwenael Doerr, Omar Julian Alvarez Gomez
  • Patent number: 9858360
    Abstract: A system and method for controlling manufacturing of one or more items may include providing a first 3D design representation, the first 3D design representation usable by a manufacturing device for manufacturing the item; encrypting the first 3D design representation to produce an encrypted 3D design representation; associating a set of tokens with the encrypted 3D design representation and providing the encrypted 3D design representation. A method or system may include obtaining a token and including the token in a request to manufacture the item; using the token to determine whether or not to provide a decryption key; and, if determining to provide the decryption key, using the decryption key to produce a second 3D design representation, the second 3D design representation usable by a manufacturing device for manufacturing the item.
    Type: Grant
    Filed: March 10, 2014
    Date of Patent: January 2, 2018
    Assignee: MAKE IT LEO LTD
    Inventors: Lee-Bath Nelson, Moshe Molcho
  • Patent number: 9843442
    Abstract: An operation apparatus includes a message expansion unit, a state data initiation unit, a state data generation unit, and a chain variable update unit. The message expansion unit generates a plurality of expanded messages using a message. The state data initiation unit generates the initial value of state data using chain variable data. The state data generation unit generates the final value of the state data by iterating a combination function and a step function using the state data and the plurality of expanded messages. The chain variable update unit updates the chain variable data using the state data of the final value.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: December 12, 2017
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Deukjo Hong, Jung Keun Lee, Woo-Hwan Kim, Daesung Kwon
  • Patent number: 9836620
    Abstract: A computing system includes a control unit configured to determine a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device; analyze a privacy risk level of a resource based on a resource content included in the resource, a metadata concerning the resource, a collective input regarding the resource, and the usage context; and generate one or more options for sharing the resource with the device based on the privacy risk level and the usage context.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: December 5, 2017
    Assignee: Samsung Electronic Co., Ltd.
    Inventor: Hongxia Jin
  • Patent number: 9825933
    Abstract: Systems and method for providing single sign on access to an application executing at a client device. An API request is intercepted at the client device for signing on a user of the client device for accessing the application. The API request is sent to a remote system where user credentials are determined based on the intercepted API request. The user credentials are returned to the client device where they are used to agnostically sign on the user for accessing the application.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: November 21, 2017
    Assignee: DATA ACCELERATOR LTD.
    Inventors: Matthew P. Clothier, Sean P. Corbett
  • Patent number: 9817842
    Abstract: It is an object to reduce a troublesomeness required to export/import an address book (destination table) between image processing apparatuses. For this purpose, at the time of import request of destination data for import, an import instruction to a group destination table is made. A group destination table ID which coincides with a destination table ID obtained from the destination data for import is retrieved. The group destination table associated with the group destination table ID is specified as a group destination table of an import destination side. The destination data obtained from the destination data for import is imported as destination data into the specified group destination table (group destination table DB).
    Type: Grant
    Filed: July 1, 2015
    Date of Patent: November 14, 2017
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yoshihide Terao
  • Patent number: 9813414
    Abstract: Embodiments include methods for managing encrypted files by storing a user password hash including a predetermined function of the user password associated with that user ID and the secret keys. Aspects also include, in response to receipt from a user computer of an input password and a the user ID for a required encrypted file, communicating with authentication servers to implement a key-reconstruction protocol in which each server computes first and second hash values for the required encrypted file. The file management server uses the first hash values to compute an input password hash including the predetermined function of the input password and the secret keys, checks if the input password hash matches the user password hash for the received user ID, and reconstructs the encryption key for the required encrypted file.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: November 7, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jan L. Camenisch, Daniel Kovacs, Anja Lehmann, Gregory Neven
  • Patent number: 9813235
    Abstract: Technology is generally described for improving resistance to cache timing attacks made on block cipher encryption implementations. In some examples, the technology can include identifying one or more tunable parameters of the block cipher encryption algorithm; creating multiple encryption algorithm implementations by varying one or more of the parameter values; causing a computing system to encrypt data using the implementations; measuring average execution times at the computing system for the implementations subjecting the implementations to a cache timing attack; measuring average execution times at the computing system for the implementations subjected to a cache timing attack; computing a time difference between the average execution times for the implementations when not subjected and when subjected to a cache timing attack; selecting an implementation having a lower time difference; and using the selected implementation for a subsequent encryption operation.
    Type: Grant
    Filed: April 25, 2013
    Date of Patent: November 7, 2017
    Assignee: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR
    Inventors: Debdeep Mukhopadhyay, Chester Dominic Rebeiro
  • Patent number: 9811679
    Abstract: An electronic system includes: a control unit configured to operate on a user interface; and the user interface, coupled to the control unit, configure to: present an application coupled to an access configuration to customize a permission level for a service type, and receive an input for changing the permission level of the service type for accessing a resource type for customizing an operation of the application on a device.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: November 7, 2017
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Bin Liu, Hongxia Jin, Na Wang
  • Patent number: 9794284
    Abstract: A search engine includes a network interface that receives a search query and a search module. The search module determines a consideration set of applications corresponding to the search query based on application data stored for a plurality of applications, determines a respective number of source objects associated with each of the applications in the consideration set, determines whether each of the applications is a spam application based on the respective number of source objects associated with each of the applications, applies respective penalties to selected ones of the applications based on the determination of whether each of the applications is a spam application, generates search results based on the respective penalties applied to the selected ones of the applications, and provides the search results to be transmitted by the network interface.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: October 17, 2017
    Assignee: Quixey, Inc.
    Inventors: Eric Glover, Nachum Plonka
  • Patent number: 9792452
    Abstract: A Pervasive Intermediate Network Attached Storage Application (PINApp) enables users to digitally assign (pin/tack) a folder or drive to a public cloud storage service for the purpose of sharing their digital content with others. The PINApp enables users to engage the cloud storage services without the need to upload the digital content to the cloud in order for it to be viewed or shared. The PINApp can be used to unify all of the digital content stored on multiple devices and cloud services for a single owner or user.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: October 17, 2017
    Inventor: Anthony Tan