Patents Examined by Taghi Arani
-
Patent number: 9716697Abstract: Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party server. The first identifier vector can include a first identifier, first parameters, and second parameters. The system can receive, from the third party server, the first identifier vector encrypted based on a third-party encryption. The system can receive, from the third party server, a second identifier vector encrypted based on the third-party encryption associated with the third party server. The second identifier vector can include a second identifier, third parameters, and fourth parameters. The system can determine a correlation count between the first identifier vector and the second identifier vector. The system can determine that the first identifier corresponds to the second identifier based on the correlation count. The system can generate one identifier key for both the first identifier and the second identifier.Type: GrantFiled: July 24, 2015Date of Patent: July 25, 2017Assignee: Google Inc.Inventors: Mahyar Salek, Philip McDonnell, Vinod Kumar Ramachandran, Shobhit Saxena, David Owen Shanahan
-
Patent number: 9715646Abstract: A computer system and method are provided to intercept a task from a primary user account 121 prior to execution of the task by the computer device 200, where the task relates to an untrusted content. A task isolation environment 350 is provisioned for executing the task, including programmatically creating a secondary user account 121b on the computer device. The task is executed in the task isolation environment 350 in relation to the untrusted content. A second folder 126b in the secondary user account 121b is mapped to a first folder 126a in the primary user account 121 and file access requests for the second folder 126b are intercepted by an agent 300 and redirected to the first folder 126a.Type: GrantFiled: October 21, 2014Date of Patent: July 25, 2017Assignee: Avecto LimitedInventors: Mark Austin, John Goodridge
-
Patent number: 9712548Abstract: A computer-implemented method for determining whether a computer network is compromised by unauthorized activity on the computer network. The computer-implemented method comprises identifying a behavioral anomaly of an entity on the computer network, classifying the anomaly as a system event based on an assigned score for the anomaly being at least at a predetermined score threshold, updating an incident based on at least one common parameter between the system event and other system events which comprise the incident, each system event of the incident including an assigned score from when the event was an anomaly, updating a system status based on at least the incident, and assigning a system status score to the system status, and, determining whether the system status score is at least at a predetermined threshold system status score indicating that the computer network may be compromised.Type: GrantFiled: October 27, 2014Date of Patent: July 18, 2017Assignee: Cyber-Ark Software Ltd.Inventors: Aviram Shmueli, Andrey Dulkin, Yair Sade, Assaf Weiss
-
Systems and methods for dynamically selecting model thresholds for identifying illegitimate accounts
Patent number: 9705896Abstract: Systems, methods, and non-transitory computer-readable media can determine a plurality of model scores for a set of accounts. Each model score in the plurality of model scores can be associated with at least one account in the set of accounts. The plurality of model scores can be ranked in descending order. One or more metrics can be determined for each model score in the plurality of model scores based on information about the at least one account associated with each model score. Specified criteria for selecting a model threshold utilized in identifying illegitimate accounts can be acquired. The specified criteria can be based on at least some of the one or more metrics. The model threshold can be selected as corresponding to a lowest ranked model score that satisfies the specified criteria. It is contemplated that there can be many variations and/or other possibilities.Type: GrantFiled: October 28, 2014Date of Patent: July 11, 2017Assignee: Facebook, Inc.Inventor: Michael Francis Zolli -
Patent number: 9705681Abstract: A method and system for generating a signature for a user are described. The system comprises a signature server, an initial transaction device for a user and a validation device for a user. The initial transaction device is configured to display a first message M and send a request to the signature server to create a signature for said first message M. The signature server is configured to generate a validation challenge using a second message M? which is based on said first message M? and a first secret shared between said user and said signature server and send said validation challenge to the validation device. The validation device is configured to regenerate said second message M? using said first shared secret, display said second message M?, receive user confirmation that the displayed second message M? corresponds to said first message M, generate a validation code confirming the request to create a signature; and send said validation code to said signature server.Type: GrantFiled: June 6, 2014Date of Patent: July 11, 2017Assignee: Cryptomathic Ltd.Inventors: Guillaume Forget, Torben Pryds Pedersen, Peter Landrock
-
Patent number: 9705855Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. If the keys used to encrypt the data have not been exposed during serialization operation, they may be deleted or destroyed enabling the destruction of data encrypted with the keys.Type: GrantFiled: December 28, 2015Date of Patent: July 11, 2017Assignee: Amazon Technologies, Inc.Inventors: Todd Lawrence Cignetti, Andrew J. Doane, Eric Jason Brandwine, Robert Eric Fitzgerald
-
Patent number: 9697365Abstract: Functionality is described herein for receiving events which characterize features in an environment, and for identifying at least one policy based on the events. The functionality consults a certificate, associated with the policy, to determine whether the policy is valid. If valid, the functionality uses the policy to govern the behavior of at least one application, such as by controlling the application's consumption of events. A trusted passport authority may be employed to generate the certificates. Each certificate may: (1) identify that it originated from the trusted passport authority; (2) contain context information which describes a context in which the policy is intended to be applied within an environment; and/or (3) contain machine-readable content that, when executed, carries out at least one aspect of the policy.Type: GrantFiled: January 28, 2014Date of Patent: July 4, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Tadayoshi Kohno, David A. Molnar, Alexander N. Moshchuk, Franziska Roesner, Jiahe Helen Wang
-
Patent number: 9697353Abstract: Disclosed are a method and a device for intercepting a call for a service by an application in an operating system of an electronic apparatus. The method comprises: loading an interception dynamic link library to a process where the service is located; replacing the address of an input/output control function in the process with a first address of the interception dynamic link library; when the application is calling the service, executing the interception dynamic link library based on the first address so as to obtain the name and information of the application as well as the information of the call, and replacing the address of the service to be called comprised in the information of the call with a second address of the interception dynamic link library; and executing processing based on the second address according to the name and/or information of the application. The invention increases the security of the operating system of the electronic apparatus.Type: GrantFiled: May 30, 2013Date of Patent: July 4, 2017Assignee: BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Yi Ding, Yuan Li
-
Patent number: 9690717Abstract: A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected region containing at least one of code and data, an initial integrity tree that protects an integrity of contents of the cryptographically protected region; and an unprotected region that includes a loader, an esm (enter secure mode) instruction, and one or more communication buffers.Type: GrantFiled: June 22, 2015Date of Patent: June 27, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Richard Harold Boivie, Peter T. Williams
-
Patent number: 9686082Abstract: A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media.Type: GrantFiled: February 19, 2016Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
-
Patent number: 9684898Abstract: Systems and methods can secure personal identification numbers associated with secure elements within mobile devices. A host application of the mobile device can receive a personal identification number (PIN) or user PIN from a user. The application can generate one or more random PIN components. The application can compute a PIN for the secure element based upon the user PIN and each of the one or more random components. The SE can be configured using the PIN computed for the secure element. Each of the one or more random components may be stored in one or more distinct, diverse locations. In addition to entering the correct user PIN, each of the one or more random components must be retrieved from the diverse locations in order to reconstruct the PIN for the secure element whenever performing a transaction using the secure element.Type: GrantFiled: September 25, 2013Date of Patent: June 20, 2017Assignee: GOOGLE INC.Inventors: Ismail Cem Paya, Robert Lieh-Yuan Tsai
-
Patent number: 9686218Abstract: A local gateway device receives email across the internet from a sender of the email and forwards it across the internet to an email filtering system. The email filtering system analyzes the email to determine whether it is spam, phishing or contains a virus and sends it back to the local gateway device along with the filtered determination. The local gateway device forwards the received email and the filtered determination to a local junk store which handles the email appropriately. For example, if the email has been determined to be spam, phishing or containing a virus, the junk store can quarantine the email and if the email has been determined to be non-spun and/or not phishing and/or not containing a virus, the junk store can forward the email to a local mail server for delivery.Type: GrantFiled: November 23, 2015Date of Patent: June 20, 2017Assignee: SONICWALL INC.Inventors: Scott Eikenberry, John Gmuender, Akbal Singh Karlcut, MichaelCarl Y. Uy, Boris Yanovsky
-
Patent number: 9686252Abstract: A system and method implemented at a server system, for securely wiping a remote mobile device after the device registration has been removed from the server system. Prior to removal of the device registration from the server system, a “pre-packaged” command is created and stored at the server system. In the event that it is determined, after removal of the registration, that the device should be wiped or disabled, means are provided for an administrator to issue the previously stored command to the target mobile device.Type: GrantFiled: September 9, 2014Date of Patent: June 20, 2017Assignee: BlackBerry LimitedInventors: Michael Kenneth Brown, Scott William Totzke, Michael Grant Kirkup
-
Patent number: 9679126Abstract: A decryption device for decrypting a document encrypted using biometric information of an intended receiver of the document is provided. The decryption device comprises: an imaging device configured to capture an image of at least a portion of the document; a biometric detection device configured to detect biometric information of a user; a processor configured to decrypt at least the portion of the document using the captured image and the detected biometric information; and a display device configured to display at least the portion of the document decrypted by the processor.Type: GrantFiled: October 23, 2014Date of Patent: June 13, 2017Assignee: SAP SEInventor: Srinath Warrier
-
Patent number: 9680808Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. Signaling methods are used to notify virtual machine instances of serialization events in order to prevent keying material from being stored persistently.Type: GrantFiled: January 11, 2016Date of Patent: June 13, 2017Assignee: Amazon Technologies, Inc.Inventors: Todd Lawrence Cignetti, Eric Jason Brandwine, Robert Eric Fitzgerald, Andrew J. Doane
-
Patent number: 9674205Abstract: Methods and systems for verifying the identity and trustworthiness of a user of an online system are disclosed. In one embodiment, the method comprises receiving online and offline identity information for a user and comparing them to a user profile information provided by the user. Furthermore, the user's online activity in a third party online system and the user's offline activity are received. Based on the online activity and the offline activity a trustworthiness score may be calculated.Type: GrantFiled: February 15, 2016Date of Patent: June 6, 2017Assignee: Airbnb, Inc.Inventors: Stephen Kirkham, Michael Lewis
-
Patent number: 9674153Abstract: A secure data processing apparatus and method are disclosed. The secure data processing apparatus is operable to securely process user data provided by a user and includes a trusted domain having a trusted bus; a trusted domain controller coupling the trusted bus with an untrusted bus of an untrusted domain, the trusted domain controller being operable to ensure that encrypted incoming user data received over the untrusted bus is decrypted and provided over the trusted bus as the incoming user data and to ensure that outgoing user data is encrypted and provided over the untrusted bus as encrypted outgoing data. The trusted domain controller that only encrypted data is provided in the untrusted domain reducing the chance of the data being compromised. The trusted domain controller ensures that access to the unencrypted data within the trusted domain can be avoided. Confidentiality of the data can be assured without performance shortfalls.Type: GrantFiled: May 31, 2013Date of Patent: June 6, 2017Assignee: Alcatel LucentInventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
-
Patent number: 9660983Abstract: One time password (OTP) technology enables a plurality of OTP software token instances (or copies) to be used simultaneously on a plurality of computing devices of a user. OTP software instances may be counter based. An authentication server comprising authentication software assigns a set of counters for each OTP software instance. An OTP software instance may be provided along with the assigned set of counters to each computing device. A range of counters may be partitioned by the authentication server into mutually exclusive sets of counters. An OTP software instance executed by a computing device uses one of the counters in the assigned set of counters to provide an OTP. The authentication server attempts authentication by using each counter in the assigned set of counters to provide a calculated OTP that is compared to the received OTP. The authentication server verifies authenticity when a calculated OTP matches a received OTP.Type: GrantFiled: October 24, 2014Date of Patent: May 23, 2017Assignee: CA, INC.Inventor: Venkatababji Sama
-
Patent number: 9660995Abstract: The subject matter described herein includes methods, systems, and computer readable media for combating mobile device theft with user notarization. One method includes providing a supplicant video notarization system application executable on a supplicant device for initiating an interactive video call between a supplicant and a notary as a condition to the supplicant accessing a protected electronic resource. The method further includes providing a notary video notarization system application executable on a notary device through which the notary receives the interactive video call and interacts with the supplicant via the interactive video call to confirm the identity of the supplicant and that video of the supplicant provided in the call is live.Type: GrantFiled: February 20, 2014Date of Patent: May 23, 2017Assignees: The University of North Carolina at Chapel Hill, Indiana University Research & Technology CorporationInventors: Michael Kendrick Reiter, Apu Chandrasen Kapadia, Alana Libonati
-
Patent number: 9654457Abstract: A non-limiting example game system includes a game apparatus which is stored with various kinds of application programs. When an application program for a specific service such as a television program guide (program guide program) is started, prior to an acquisition of a content (webpage), an authentication of the game apparatus is performed, and a white list which records a domain name accessible by the game apparatus (the program guide program) is acquired from a managing server which is controlled by a provider of the television program guide. In the program guide program, it is determined whether or not a domain name described in URL of the webpage appears in the white list when a request to send the webpage is to be sent. If not appeared in the white list, the program guide program is suspended, and a web browser is activated to send the request to send the webpage.Type: GrantFiled: May 1, 2013Date of Patent: May 16, 2017Assignee: NINTENDO CO., LTD.Inventors: Yoji Kamikawa, Taiyo Hara, Makoto Takano, Kojiro Taguchi, Hirokazu Shimaoka, Yuya Ono