Patents Examined by Shanto M Abedin
  • Patent number: 9578064
    Abstract: A computer-implemented process receives a request to utilize one or more virtual data center (VDC) resources at a virtual data center and determines a particular service level applicable to request. Based on the particular service level and mapping information that indicates associations between VDC resource utilization policies and service levels, the process determines a particular VDC resource utilization policy corresponding to the request and causes completion of the request according to the particular VDC resource utilization policy. Another process determines that a resource utilization performance is incompatible with a requested service level and selects a new resource utilization based in part on the resource utilization performance information and mapping information. The process causes data distributed according to a prior resource utilization policy to be distributed according to the new resource utilization policy in one or more resources at a virtual data center.
    Type: Grant
    Filed: March 30, 2016
    Date of Patent: February 21, 2017
    Assignee: Bracket Computing, Inc.
    Inventors: Jason A. Lango, John K. Edwards, Nitin Muppalaneni
  • Patent number: 9578014
    Abstract: A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: February 21, 2017
    Assignee: Oracle International Corporation
    Inventors: Ajay Sondhi, Ching-Wen Chu, Venkata S. Evani
  • Patent number: 9578056
    Abstract: Concepts and technologies are disclosed herein for preventing spoofing attacks for bone conduction applications. According to one aspect, a device can receive an authentication signal that has propagated through a body. The device can prevent an adversary from using the authentication signal to spoof a user to be authenticated by the device. The device can also authenticate the user.
    Type: Grant
    Filed: August 1, 2016
    Date of Patent: February 21, 2017
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Christopher Baldwin, Brian S. Amento
  • Patent number: 9563784
    Abstract: Event driven permissive sharing of information is disclosed. In an aspect, user equipment can include information sharing profiles that can facilitate sharing information with other devices or users, such as sharing location information. The information sharing profiles can include trigger values, such that when a target value transitions the trigger value, a permission value is updated to restrict or allow access to sharable information. As such, event driven permissive sharing of information allows for designation of temporary friend information sharing with user-defined triggers.
    Type: Grant
    Filed: November 20, 2014
    Date of Patent: February 7, 2017
    Assignee: AT&T MOBILITY II LLC
    Inventors: Sheldon Kent Meredith, Mario Kosseifi, John Pastore
  • Patent number: 9558333
    Abstract: Systems and methods are disclosed for allowing a primary user to share a digital service, in a bundle of services implemented by a plurality of different service providers, with a secondary user. In accordance with one implementation, a method includes receiving a request from the primary user to share a first service in the bundle of services with the secondary user. The method also includes generating, using at least one processor, a first token that associates the secondary user with the first service. The method further includes sending the first token to one of the plurality of different service providers for the first service. Additionally, the method includes modifying a status of the primary user to restrict access to the first service by the primary user while the first service is being shared with the secondary user.
    Type: Grant
    Filed: May 3, 2013
    Date of Patent: January 31, 2017
    Assignee: AOL INC.
    Inventors: Benjamin G. Hills, Umesh S. Chhatre, George F. Fletcher, Joyce R. Cruickshank
  • Patent number: 9548867
    Abstract: A method and apparatus to securely distribute embedded firmware to a module in an industrial control system is disclosed. A security certificate corresponding to the firmware is generated utilizing a proprietary algorithm. The certificate includes an identifier corresponding to the module on which the firmware is to be loaded and an identifier corresponding to a removable medium on which the firmware is distributed. The removable medium is inserted into the module in the industrial control system on which the firmware is to be loaded. The module reads the security certificate and verifies that the firmware is intended for the module and verifies that the security certificate includes the identifier for the removable medium which was inserted into the module. If the firmware is intended for the module and the security certificate includes the identifier for the removable medium, the module loads the firmware from the removable medium.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: January 17, 2017
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Daniel Clark, James Kay, Robert P. Anderson
  • Patent number: 9516062
    Abstract: A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: December 6, 2016
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Michael W. Green, Robert Ma
  • Patent number: 9516061
    Abstract: In one implementation, a policy server establishes a smart virtual private network between two client devices. The smart virtual private network includes a secure communication session using a security level or security algorithm that is variable and defined as a function of the two client devices. A first client device may generate a registration request including a first security configuration including the security level. Based on the registration request, the policy server generates a routing message that defines routing for communication from the first client device to a second client device. The routing message may update a routing table to associate the policy server with the second client device.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: December 6, 2016
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Pranav Bhalerao, Sunil Nr, Chandra Balaji
  • Patent number: 9509705
    Abstract: Systems, methods, and other embodiments associated with automated secondary linking for fraud detection systems. According to one embodiment, a system includes a parsing logic configured to receive an incoming fraud report based on a first fraud detection strategy. The parse logic is also configured to parse the incoming fraud report into fraud data. The system further includes a search logic configured to search a set of fraud reports to identify instances of the fraud data. The system also includes an alert logic configured to generate an alert in response to an instance of the fraud data being identified in the set of fraud reports.
    Type: Grant
    Filed: August 7, 2014
    Date of Patent: November 29, 2016
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Sean S. Hamidi, Beth S. Moss, Jason M. Stokes, Ryan S. Alexander, Wendy M. Stutz, Angela C. Berkery, Benjamin W. Geertz
  • Patent number: 9509722
    Abstract: A method is disclosed, and a corresponding data carrier and policy converter, for producing at least one Security Descriptor Definition Language, SDDL, rule from an eXtensible Access Control Markup Language, XACML, policy (P), wherein said at least one SDDL rule is enforceable for controlling access to one or more resources in a computer network. A reverse query is produced indicating a given decision (d), which is one of permit access and deny access, and a set (R) of admissible access requests. Based on the reverse query, the XACML policy (P) and the given decision (d) are translated into a satisfiable logic proposition in Boolean variables (vi, i=1, 2, . . . ) From said ROBDD, variable assignments (RCj=[ARCj1: v1=xj1, ARCj2: v2=xj2, . . . ], j=1, 2, . . . ) satisfying the logic proposition are derived and at least one SDDL rule is created based on said variable assignments (RCj=[ARCj1: v1=xj1, ARCj2: v2=xj2, . . . ], j=1, 2, . . . ) satisfying the logic proposition.
    Type: Grant
    Filed: February 16, 2015
    Date of Patent: November 29, 2016
    Assignee: AXIOMATICS AB
    Inventors: Pablo Giambiagi, Erik Rissanen, Travis Spencer
  • Patent number: 9507969
    Abstract: A method for a power receiver for protecting a power receiver from being taken without permission while charged wirelessly includes receiving wireless power from a power transmitter and performing wireless charging in a security mode by the power receiver; detecting whether the wireless charging is interrupted without receiving a security code for authorization; and starting a protection function if the power receiver detects that the wireless charging is interrupted without receiving the security code for authorization.
    Type: Grant
    Filed: February 24, 2014
    Date of Patent: November 29, 2016
    Assignee: HTC Corporation
    Inventor: Feng-Seng Chu
  • Patent number: 9495548
    Abstract: A method for routing at least one message, this method being implementation-dependent on a trusted operating system of an electronic device comprising an electronic assembly on which the trusted operating system and a Rich-OS operating system are executed. The method may include operations for consulting a trusted memory of a terminal, which may be called a first memory, and when the first memory contains a message, determining the operating system targeted by the message from among at least the Rich-OS operating system and the trusted operating system. And when the message targets the Rich-OS system, transferring the message from the first memory to a memory accessible to the Rich-OS system, which may be called a second memory.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: November 15, 2016
    Assignee: OBERTHUR TECHNOLOGIES
    Inventor: Nicolas Bousquet
  • Patent number: 9491195
    Abstract: A message flooding prevention system (1) has multiple interceptors (2, 3, 4), each with an interceptor unit linked with an RCS server, and SMSC, or an MMSC. The interceptors (2, 3, 4) are connected to flood detect nodes (10) for receiving messages at a point in a communications network, extracting data from a message, generating at least one code from extracted data, and comparing the code or codes with one or more previous codes. The flood detect nodes (10) determine according to the comparison if the received message is suspected to be a flooding message and if so, performs code generation including hashing. The flood detect nodes (10) save the code to one of a set of database buckets (21), each bucket being associated with a code, and select a bucket according to the generated code, and increment a fill parameter of the selected bucket.
    Type: Grant
    Filed: May 9, 2016
    Date of Patent: November 8, 2016
    Assignee: MARKPORT LIMITED
    Inventors: Klaas Wijbrans, Jim Plimmer
  • Patent number: 9479929
    Abstract: Selective regulation of information transmission from mobile applications to a third-party privacy compliant target system. A privacy policy is configured for and mapped to each of a multiplicity of mobile application concerns, with each privacy policy comprising rules regulating the transmission of information to a third-party privacy compliant target system. Instrumentation instructions can be integrated with a mobile application and provided to a mobile device. The instrumentation instructions direct the mobile application to submit a privacy policy request comprising a mobile application identifier from the mobile device to a third-party privacy compliance system and enable sending information from the mobile device to the third-party privacy compliant target system, subject to the privacy policy.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: October 25, 2016
    Assignee: Quantcast Corporation
    Inventors: Crispin Edward Harold Flowerday, Michael F. Kamprath, Faraaz A. Sareshwala, Daniel Vogel Fernandez de Castro
  • Patent number: 9471804
    Abstract: A method, computer program product, and computer system for managing and controlling direct access of an administrator to a computer system. An interceptor application resides on the computer system and intercepts the direct access. The interceptor application receives a request for the direct access to the computer system and determines whether the administrator requests for a new ticket. The interceptor application redirects the administrator to log onto the service management system for generating the new ticket by the service management system, in response to determining that the administrator requests for the new ticket or open tickets are not found. The interceptor application receives from the service management system the new ticket and grants the administrator the direct access to the computer system.
    Type: Grant
    Filed: April 8, 2015
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Anderson, Christopher J. Dawson, Leslie A. Nelson, Brett W. Singletary
  • Patent number: 9473310
    Abstract: Methods for managing digital certificates, including issuance, validation, and revocation are disclosed. Various embodiments involve querying a directory service with entries that correspond to a particular client identity and have attributes including certificate issuance limits and certificate validity time values. The validity time values are adjustable to revoke selectively the certificates based upon time intervals set forth in validity identifiers included therein.
    Type: Grant
    Filed: April 18, 2014
    Date of Patent: October 18, 2016
    Assignee: SecureAuth Corporation
    Inventors: Garret Florian Grajek, Jeffrey Chiwai Lo, Mark V. Lambiase
  • Patent number: 9465923
    Abstract: In embodiments, apparatuses, methods and storage media are described that are associated with blackout rules for media content. In embodiments, one or more segments may be generated from the media content, one or more of the generated segments containing a blackout rule identifier. The blackout rule identifier may identify a blackout rule describing one or more limitations to access to the piece of media content. When displaying the media content, a client device may retrieve the blackout rule based at least in part on the blackout rule identifier. The client device may then limit access to the media content if directed to do so by the blackout rule.
    Type: Grant
    Filed: March 8, 2013
    Date of Patent: October 11, 2016
    Assignee: Intel Corporation
    Inventor: Kevin Shen
  • Patent number: 9467293
    Abstract: A method and system for use in generating authentication codes associated with devices is disclosed. In at least one embodiment, the method and system may generate a secret value that depends on event state data that specifies an operating condition of a device, and may generate a series of authentication codes that depends on the secret value and a series of dynamic values.
    Type: Grant
    Filed: December 22, 2010
    Date of Patent: October 11, 2016
    Assignee: EMC Corporation
    Inventors: John G. Brainard, Ari Juels
  • Patent number: 9462078
    Abstract: An information transmission device stores an identifier representing an information processing device connected to a network in association with an identifier representing a storage device used by the information processing device. When transmission of information is requested from the information processing device, the information transmission device specifies an identifier representing an information processing device. The information transmission device acquires an identifier representing a storage device stored in association with the specified identifier. The information transmission device transmits information on a request for transmission by the information processing device to the storage device represented by the acquired identifier.
    Type: Grant
    Filed: March 30, 2011
    Date of Patent: October 4, 2016
    Assignee: FUJITSU LIMITED
    Inventors: Masazumi Matsubara, Atsuji Sekiguchi, Yuji Wada
  • Patent number: 9443090
    Abstract: The disclosure relates to systems and methods for targeted messaging, workflow management, and digital rights management for geofeeds, including content that is related to geographically definable locations and aggregated from a plurality of social media or other content providers. The system may facilitate targeted messaging to users who create content. The targeted messaging may be based on the content (or location related to the content) such as a request for additional information or a promotional message. The system may generate workflows that allow management of the content with respect to operational processes of an entity that wishes to use the content and facilitates the management of usage rights related to the content as well as payments related to such usage rights. For example, the system may store whether content requires permission to use the content and/or whether such permission was obtained and facilitates payment.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: September 13, 2016
    Assignee: Geofeedia, Inc.
    Inventors: Philip B. Harris, Scott K. Mitchell, Michael J. Mulroy