Patents Examined by Shanto M Abedin
  • Patent number: 9911009
    Abstract: A device and method for providing the security of data by using multiple modes in the device are provided. The device includes a storage unit that includes a normal mode data area and a security mode data area which is isolated from the normal mode data area and access to which is allowed only in a security mode; and a controller that processes data in the normal mode data area during a normal mode, and processes data in the security mode data area during the security mode.
    Type: Grant
    Filed: February 24, 2014
    Date of Patent: March 6, 2018
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Je-Won Lee, Young-Kyoo Kim, Sung-Jo Oh, Dong-Ho Jang
  • Patent number: 9904812
    Abstract: A method for a power receiver for protecting a power receiver from being taken without permission while charged wirelessly includes receiving wireless power from a power transmitter and performing wireless charging in a security mode by the power receiver; detecting whether the wireless charging is interrupted without receiving a security code for authorization; and starting a protection function if the power receiver detects that the wireless charging is interrupted without receiving the security code for authorization.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: February 27, 2018
    Assignee: HTC Corporation
    Inventor: Feng-Seng Chu
  • Patent number: 9904967
    Abstract: Systems, methods, and other embodiments associated with automated secondary linking for fraud detection systems. According to one embodiment, a system includes a parsing logic configured to receive an incoming fraud report based on a first fraud detection strategy. The parse logic is also configured to parse the incoming fraud report into fraud data. The system further includes a search logic configured to search a set of fraud reports to identify instances of the fraud data. The system also includes an alert logic configured to generate an alert in response to an instance of the fraud data being identified in the set of fraud reports.
    Type: Grant
    Filed: October 25, 2016
    Date of Patent: February 27, 2018
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Sean S. Hamidi, Beth S. Moss, Jason M. Stokes, Ryan S. Alexander, Wendy M. Stutz, Angela C. Berkery, Benjamin W. Geertz
  • Patent number: 9900334
    Abstract: A computer-implemented method for using multi-dimensional geometry in simulations of packet flows through network devices, is provided. The computer-implemented method includes receiving an input object for traffic simulation of network devices, comprising a source and destination host ranges and source and destination port ranges, and protocol, application and vulnerability ranges, targeted for the destination host ranges. The computer-implemented method further includes representing blocked traffic of the simulated traffic by an intersection of at least two n-dimensional cuboids in n-dimensional space. The computer-implemented method further includes subtracting an access control list shape from an input shape to obtain a concave form representing permitted host, port, protocol, application, and vulnerability combinations of ranges. The computer-implemented method further includes decomposing the obtained concave shape into multiple convex shapes that satisfy a set of predetermined input conditions.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: February 20, 2018
    Assignee: International Business Machines Corporation
    Inventor: Cezar P. Grzelak
  • Patent number: 9882728
    Abstract: Methods for managing digital certificates, including issuance, validation, and revocation are disclosed. Various embodiments involve querying a directory service with entries that correspond to a particular client identity and have attributes including certificate issuance limits and certificate validity time values. The validity time values are adjustable to revoke selectively the certificates based upon time intervals set forth in validity identifiers included therein.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: January 30, 2018
    Assignee: SecureAuth Corporation
    Inventors: Garret Florian Grajek, Jeffrey Chiwai Lo, Mark V. Lambiase
  • Patent number: 9864875
    Abstract: Event driven permissive sharing of information is disclosed. In an aspect, user equipment can include information sharing profiles that can facilitate sharing information with other devices or users, such as sharing location information. The information sharing profiles can include trigger values, such that when a target value transitions the trigger value, a permission value is updated to restrict or allow access to sharable information. As such, event driven permissive sharing of information allows for designation of temporary friend information sharing with user-defined triggers.
    Type: Grant
    Filed: October 7, 2015
    Date of Patent: January 9, 2018
    Assignee: AT&T MOBILITY II LLC
    Inventors: Sheldon Kent Meredith, Mario Kosseifi, John Pastore
  • Patent number: 9860264
    Abstract: A computer-implemented method for using multi-dimensional geometry in simulations of packet flows through network devices, is provided. The computer-implemented method includes receiving an input object for traffic simulation of network devices, comprising a source and destination host ranges and source and destination port ranges, and protocol, application and vulnerability ranges, targeted for the destination host ranges. The computer-implemented method further includes representing blocked traffic of the simulated traffic by an intersection of at least two n-dimensional cuboids in n-dimensional space. The computer-implemented method further includes subtracting an access control list shape from an input shape to obtain a concave form representing permitted host, port, protocol, application, and vulnerability combinations of ranges. The computer-implemented method further includes decomposing the obtained concave shape into multiple convex shapes that satisfy a set of predetermined input conditions.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventor: Cezar P. Grzelak
  • Patent number: 9853955
    Abstract: Techniques for securing the delivery of an audio message on a device are described. A method may include receiving a message encrypted with a public key from a sender at a recipient device; authenticating a recipient using an image of an ear of the recipient; retrieving a private key when the authentication succeeds; decrypting the message using the private key; and presenting the decrypted message through a speaker on the recipient device. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: December 26, 2017
    Assignee: FACEBOOK, INC.
    Inventor: Shahar Mintz
  • Patent number: 9843564
    Abstract: A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: December 12, 2017
    Assignee: McAfee, Inc.
    Inventors: Elad Zucker, Eran Werner, Mattias Weidhagen
  • Patent number: 9838432
    Abstract: A method of protecting data items in an organizational computer network, including, defining multiple information profiles for classifying the data item, defining rules for protecting the data item belonging to a specific information profile, classifying the data item according to the defined information profiles, applying a protection method to the data item responsive to the classification and the defined rules, automatically updating the classification of the data item responsive to a change in the content or location of the data item; and automatically transforming the applied protection method, throughout the lifecycle of the data item, responsive to a change in classification or location of the data item, according to the defined rules.
    Type: Grant
    Filed: October 1, 2015
    Date of Patent: December 5, 2017
    Assignee: Secure Islands Technologies Ltd
    Inventors: Yuval Eldar, Roee Oz
  • Patent number: 9819658
    Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Virtual machines may further be isolated through a virtual gateway assigned to handle all communications between a virtual machine and a device outside of the virtual machine's COI. The virtual gateway may be a separate virtual machine for handling decrypting and encrypting messages for transmission between virtual machines and other devices.
    Type: Grant
    Filed: July 12, 2012
    Date of Patent: November 14, 2017
    Assignee: Unisys Corporation
    Inventors: David S. Dodgson, Ralph Farina, James A. Fontana, Robert A. Johnson, David Maw, Anthony Narisi
  • Patent number: 9805220
    Abstract: According to one embodiment, an electronic apparatus includes a processor configured to operate based on a clock, the processor includes a register in which a value added in accordance with the clock is stored, and a memory configured to store first period information indicating a first period in which a file is accessible. The processor is configured to acquire first time and date information indicating a first time and date from an external device, calculate a second time and date indicating a present time and date based on the first time and date information and the value, and restrict access to a resource of the electronic apparatus, when the second time and date does not correspond to the first period.
    Type: Grant
    Filed: May 21, 2015
    Date of Patent: October 31, 2017
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Tatsuo Yamaguchi, Yuki Kanbe
  • Patent number: 9794271
    Abstract: A method of transferring information between subscribers associated with a communication service is disclosed. The method includes receiving a first handle address associated with a first subscriber device, in which the first subscriber device transfers information to a group of subscriber devices, each of the group of subscriber devices is linked to different handle addresses, and each of the different handle addresses is included in a group of handle addresses. The method also includes determining whether the first handle address is included in the group of handle addresses, transferring information from the first subscriber device to the group of subscriber devices in response to the first handle address being included in the group of handle addresses, and verifying that the transferred information was received by the group of subscriber devices. A corresponding system and computer-readable device are also disclosed.
    Type: Grant
    Filed: October 29, 2014
    Date of Patent: October 17, 2017
    Assignee: AT&T MOBILITY II LLC
    Inventors: Sheldon Kent Meredith, Mark Austin
  • Patent number: 9794228
    Abstract: Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: October 17, 2017
    Assignee: Intel Corporation
    Inventors: Hong Li, Rita H Wouhaybi, Tobias Kohlenberg
  • Patent number: 9792440
    Abstract: A method for a secure boot of a vehicular system is provided. The method includes performing a security self-verification on a first electronic control unit (ECU) of a vehicular system and sending a security challenge to a second electronic control unit of the vehicular system. The method includes verifying a security response from the second electronic control unit, the security response relating to the security challenge and indicating an aspect of contents of memory of the second electronic control unit. The performing the security self-verification and verifying the security response establishes a chain of trust that includes the first electronic control unit and the second electronic control unit.
    Type: Grant
    Filed: September 2, 2014
    Date of Patent: October 17, 2017
    Assignee: Symantec Corporation
    Inventor: Qiyan Wang
  • Patent number: 9778842
    Abstract: Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device's functionality.
    Type: Grant
    Filed: January 26, 2015
    Date of Patent: October 3, 2017
    Assignee: Intel Corporation
    Inventor: Bran Ferren
  • Patent number: 9767300
    Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: September 19, 2017
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9767286
    Abstract: An electronic module that includes means for determining an operating system targeted by a message received by a transmitter-receiver of an electronic device, from among at least a Rich-OS operating system and a trusted operating system executed on a chipset of the electronic device, so that the message becomes accessible to the targeted operating system. The determining means may be set in operation in response to receipt of the message by the transmitter-receiver.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: September 19, 2017
    Assignee: OBERTHUR TECHNOLOGIES
    Inventor: Nicolas Bousquet
  • Patent number: 9760315
    Abstract: Disclosed is a dynamic device allocation apparatus capable of allocating dynamically and flexibly the I/O device, which inputs and outputs information, to the information processing carried out in the system.
    Type: Grant
    Filed: October 29, 2014
    Date of Patent: September 12, 2017
    Assignee: NEC CORPORATION
    Inventor: Masahiko Taguchi
  • Patent number: 9760723
    Abstract: Techniques for in-app user data authorization are described. An apparatus may comprise a processor circuit, a permissions component, and a token component. The permissions component may be operative on the processor circuit to receive a request from an application to perform a task on a device and to return a response to the request to the application based on active permissions for the application. The token component may be operative on the processor circuit to manage a token database and to determine the active permissions for the application based on the token database. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: September 12, 2017
    Assignee: FACEBOOK, INC.
    Inventors: Edward Kenneth O'Neil, Vladimir Fedorov, Tirunelveli R. Vishwanath