Patents Examined by Sharon Lynch
  • Patent number: 9633399
    Abstract: Disclosed is an approach for implementing a system, method, and computer program product for performing social marketing using a cloud-based system. The approach is capable of accessing data across multiple types of internet-based sources of social data and commentary and to perform analysis upon that data. A social marketing campaign can then be generated and implemented in an integrated manner using the system. This permits realtime reaction to trends, with rapid ability to react to opportunities in the marketplace.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: April 25, 2017
    Assignee: Oracle International Corporation
    Inventors: Biju George, Mehrshad Setayesh, Timothy P. McCandless, Patricia Pichardo, Kimberly Ann Wolfe, Reza Parang, Maria Fernanda Diaz-Arscott, Jeff Condit, Brian Culler, Noah Horton, Michael James Strutton
  • Patent number: 9635001
    Abstract: A re-encryption system according to this embodiment includes a file sharing apparatus and a re-encryption apparatus. Upon receiving a file request from the client apparatus, the file sharing apparatus acquires a first encrypted file based on the file request, and transmits a re-encryption request including the first encrypted file to the re-encryption apparatus. The re-encryption apparatus re-encrypts the first encrypted file included in the re-encryption request to the second encrypted file based on the re-encryption key, and transmits the second encrypted file to the file sharing apparatus. The file sharing apparatus transmits the second encrypted file to the client apparatus. The client apparatus obtains the file by decrypting the second encrypted file based on a private key corresponding to the public key of the member.
    Type: Grant
    Filed: May 9, 2014
    Date of Patent: April 25, 2017
    Assignees: KABUSHIKI KAISHA TOSHIBA, TOSHIBA SOLUTIONS CORPORATION
    Inventors: Yuki Kaseda, Takuya Yoshida, Yoshihiro Fujii, Shingo Abe, Masataka Yamada
  • Patent number: 9621517
    Abstract: A HTTP request addressed to a first resource on a second device outside the network is received from a first device within the network. The HTTP request is redirected to a third device within the network. A first encrypted connection is established between the first device and the third device, and a second encrypted connection between the third device and the second device. The third device retrieves the first resource from the second device. The first resource is modified to change pointers within the first resource to point to location in a domain associated with the third device within the network. The third device serves, to the first device, the second resource.
    Type: Grant
    Filed: April 9, 2015
    Date of Patent: April 11, 2017
    Assignee: iboss, Inc.
    Inventor: Paul Michael Martini
  • Patent number: 9576133
    Abstract: A device includes storage hardware to store a secret value and processing hardware coupled to the storage hardware. The processing hardware is to receive an encrypted data segment with a validator and derive a decryption key using the secret value and a plurality of entropy distribution operations. The processing hardware is further to verify, using the received validator, that the encrypted data segment has not been modified. The processing hardware is further to decrypt the encrypted data segment using the decryption key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified.
    Type: Grant
    Filed: June 11, 2015
    Date of Patent: February 21, 2017
    Assignee: Cryptography Research, Inc.
    Inventors: Paul C. Kocher, Pankaj Rohatgi, Joshua M. Jaffe
  • Patent number: 9569623
    Abstract: A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified.
    Type: Grant
    Filed: February 9, 2015
    Date of Patent: February 14, 2017
    Assignee: Cryptography Research, Inc.
    Inventors: Paul C. Kocher, Pankaj Rohatgi, Joshua M. Jaffe
  • Patent number: 9560027
    Abstract: There is disclosed some techniques for processing an authentication request. In one example, a method comprises the step of determining the velocity between authentication requests of a user associated with the requests. Additionally, the method determines the likelihood that a location associated with one of the requests is associated with the user location. Furthermore, the method generates an authentication result based on the likelihood that a location associated with one of the requests is associated with the user location.
    Type: Grant
    Filed: March 28, 2013
    Date of Patent: January 31, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Eyal Kolman, Alon Kaufman, Yael Villa, Alex Vaystikh, Ereli Eran, Liron Liptz
  • Patent number: 9553982
    Abstract: A system and method for securely recording voice communications, comprising an authentication server, further comprising at least a software components operating on a network-capable computing device, and a database, wherein an authentication server verifies the validity of voice communications and a database stores voice communication recordings.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: January 24, 2017
    Assignee: NewVoiceMedia, Ltd.
    Inventor: Ashley Unitt
  • Patent number: 9536116
    Abstract: Examples disclose a cable to secure data transmission. Examples of the cable include a connector to connect to a computing device for data transmission. Further, the examples of the cable include an active component coupled to the connector and embedded in the cable. The active component is to at least perform one of encrypt and decrypt the data transmitted on the cable.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: January 3, 2017
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Kent E Biggs, Michael Provencher, Thomas Flynn
  • Patent number: 9490970
    Abstract: Methods and a system involve secure communication between an RFID tag and a reader via the over-the-air interface, and to corresponding RFID tags and corresponding readers. A modification of the Rabin method is employed wherein within the framework of the encryption of a plaintext M into which an identification element of the RFID tag or of an object furnished therewith is incorporated, there is computed by the RFID tag, the Montgomery residue (Montgomery reduction) of the square of the plaintext M modulo n with respect to a Montgomery base R, i.e. C*=M2R?1 mod n, and the resultant ciphertext C* is employed for authenticating the RFID tag. The modulus n=p·q is the public key of the reader, the prime numbers p, q are the private key of the reader, and the Montgomery base R is an integer that is larger than the modulus n.
    Type: Grant
    Filed: December 8, 2015
    Date of Patent: November 8, 2016
    Assignee: GIESECKE & DEVRIENT GMBH
    Inventors: Walter Hinz, Klaus Finkenzeller, Martin Seysen
  • Patent number: 9454650
    Abstract: Disclosed herein are a system and method for updating information capable of providing media content, wherein when a service restriction is generated in a DMS in a home network system based on DLNA. The system include a DMS configured to send service limitation information to DMPs when service limitation is generated and to send an unable content list to a specific DMP of the DMPs when a request for the unable content list is received from the specific DMP and the DMPs each configured to request the unable content list from the DMS when receiving the service limitation information from the DMS, receive the unable content list from the DMS, and update a content list by applying the received unable content list to the content list.
    Type: Grant
    Filed: October 27, 2014
    Date of Patent: September 27, 2016
    Assignee: HUMAX CO., LTD.
    Inventor: Dong Hwan Kim
  • Patent number: 9450936
    Abstract: A method of processing requests for different digital services hosted by respective service entities is disclosed. The method including steps of receiving a request packet from a communication device, the request packet includes source and destination identifiers, determining which one of the different digital services the communication device is requesting a service, based on the destination identifier, authenticating the request packet based on the source identifier to determine an access permission of the communication device for accessing the determined digital service, and if the access permission is granted, modifying the request packet and forwarding the modified request packet based on the destination identifier to the determined digital service for processing.
    Type: Grant
    Filed: November 2, 2012
    Date of Patent: September 20, 2016
    Assignee: SILVERLAKE MOBILITY ECOSYSTEM SDN BHD
    Inventors: Tong Yap Chan, Chi Long Yeong
  • Patent number: 9419994
    Abstract: A method for identifying potentially malicious network elements within a network is useable in a network which includes a plurality of domains administrated by different operators P1, . . . , Pn. In the method, a functional entity receives qualifying information regarding at least one network element that has been transmitted by at least some of the operators P1, . . . , Pn. The at least one network element is qualified as being potentially malicious. The functional entity provides at least one of an alarm information and an alarm activity based on a predefined number of the operators P1, . . . , Pn having transmitted the qualifying information regarding a same potentially malicious network element to the functional entity.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: August 16, 2016
    Assignee: NEC CORPORATION
    Inventors: Jens-Matthias Bohli, Giuseppe Bianchi
  • Patent number: 9407602
    Abstract: A system is disclosed for protecting a network against malicious attacks or attempts for unauthorized access. A network is connected to an external network by a number of firewalls. Inspectors detect packets blocked by the firewalls and some or all of the packets are detected to a labyrinth configured to emulated an operational network and response to the packets in order to engage an attacker. Blocked packets may be detected by comparing packets entering and exiting a firewall. Packets for which a corresponding packets are not received within a transit delay may be identified as blocked. Entering and exiting packets may be compared by comparing only header information. A central module may receive information from the inspectors and generate statistical information and generate instructions for the inspectors, such as blacklists of addresses known to be used by attackers.
    Type: Grant
    Filed: November 7, 2013
    Date of Patent: August 2, 2016
    Assignee: ATTIVO NETWORKS, INC.
    Inventors: Marc Feghali, Albert Young, Mano Murthy, John F. Wakerly, Harihara Mahesh, Atul Shrivastava
  • Patent number: 9397990
    Abstract: A method of controlling the sharing of data between entities that are in electronic communication with each other may include generating an authentication credential comprising an identifier for the target service and a unique signature, attenuating the authentication credential, and determining whether a client device is authorized to access the target service, and, only if so, providing the authentication credential to the client device. In an embodiment, the method may include receiving an access request from the client device, identifying that the authentication credential includes the unique signature and a third party caveat that is associated with a third party authentication service, in response to the identifying, determining whether the request also comprises a discharge credential for the third party caveat, and if the request includes the discharge credential, providing the client device with the requested service, otherwise denying the request.
    Type: Grant
    Filed: November 8, 2013
    Date of Patent: July 19, 2016
    Assignee: Google Inc.
    Inventors: Ankur Taly, Ulfar Erlingsson, Arnar Birgisson, Joseph Gibbs Politz, Mark Lentczner
  • Patent number: 9396170
    Abstract: A method of presenting hyperlink data. The method comprises identifying when a web browser running on a web browser client retrieves, in response to a web document data request submitted to a target server, a first web document data for displaying a first web document containing a hyperlink having a label for display and a target destination defining an address of a second web document, evaluating a risk from content of the second web document, generating by the web browser to a reference evaluation indication of the risk, and processing the web document data and the reference evaluation indication by the web browser for generating a presentation on the client terminal which combines the first web document data and the reference evaluation indication such that when the reference evaluation indication is presented when the label is presented by the web browser.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: July 19, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Idan Ben-Harrush, Anat Berkman, Alexander Dvinsky, Nili Guy, Samuel Kallner, Andrei Kirshin, Dmitri Pikus, Yoav Rubin, Gal Shachor, Omer Tripp
  • Patent number: 9338008
    Abstract: Embodiments of the present disclosure include systems and methods for secure release of secret information over a network. The server can be configured to receive a request from a client to access the deposit of secret information, send an authorization request to at least one designated trustee in the set of designated trustees for the deposit of secret information, receive responses over the network from one or more of the designated trustees in the set of designated trustees and apply a trustee policy to the responses from the one or more designated trustees in the set of trustees to determine if the request is authorized. If the request is authorized, the server can send the secret information to the client. If the request is not authorized, the server denies access by the client to the secret information.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: May 10, 2016
    Assignee: Cloudera, Inc.
    Inventors: Dustin C. Kirkland, Eduardo Garcia
  • Patent number: 9313175
    Abstract: A system capable of automated mapping between a connectivity request and an ordered security rule-set and a method of operating thereof. The system includes an interface operable to obtain data characterizing at least one connectivity request; a module for automated recognizing at least one rule within the rule-set, the rule controlling traffic requested in the at least one connectivity request, wherein the recognizing is provided by comparing a set of combinations specified in the connectivity request with a set of combinations specified in the rule and matching connectivity-related actions specified in the connectivity request; a module for automated evaluating relationship between traffic controlled by the recognized at least one rule and traffic requested in the at least one connectivity request; and a module for automated classifying, in accordance with evaluation results, the at least one connectivity request with respect to the at least one rules and/or vice versa.
    Type: Grant
    Filed: November 18, 2014
    Date of Patent: April 12, 2016
    Assignee: TUFIN SOFTWARE TECHNOLOGES LTD.
    Inventor: Reuven Harrison
  • Patent number: 9307411
    Abstract: In accordance with the exemplary embodiments of the invention there is at least a method and apparatus to perform operations including triggering, with an entity of a device, an attestation with a trusted platform module/mobile platform module of the device; and in response to the triggering, sending information comprising a platform configuration register value towards the entity, where the platform configuration register depends on measurements of the entity triggering the attestation.
    Type: Grant
    Filed: November 7, 2013
    Date of Patent: April 5, 2016
    Assignee: Nokia Technologies Oy
    Inventor: Jan-Erik Ekberg
  • Patent number: 9306943
    Abstract: A technique controls access to a protected resource. The technique involves providing a tokencode prompt to a user. The tokencode prompt requests a tokencode from an electronic token in possession of the user. The technique further involves receiving, in response to the tokencode prompt, a current tokencode from the electronic token in possession of the user. The technique further involves performing, by a SOHO device having an embedded tokencode authentication server, an authentication operation based on the current tokencode. A result of the authentication operation (i) permits the user to access the protected resource when the authentication operation determines that the user is legitimate and (ii) denies the user access to the protected resource when the authentication operation determines that the user is not legitimate. For example, the SOHO device may be a NAS device or a firewall device which with tokencode authentication capabilities.
    Type: Grant
    Filed: March 29, 2013
    Date of Patent: April 5, 2016
    Assignee: EMC Corporation
    Inventors: Daniel V. Bailey, William M. Duane
  • Patent number: 9301138
    Abstract: A wireless communication apparatus includes an optical wireless receiving unit receiving a pseudo random number; an authentication code generator generating an authentication code based on the pseudo random number received by the optical wireless receiving unit; and a wireless communication unit determining whether authentication using the authentication code with a given wireless communication apparatus is successful, and performing wireless communications with the given wireless communication apparatus when determining that the authentication using the authentication code with a given wireless communication apparatus is successful.
    Type: Grant
    Filed: August 20, 2013
    Date of Patent: March 29, 2016
    Assignee: RICOH COMPANY, LTD.
    Inventor: Yoshikazu Azuma