Patents Examined by Taghi Arani
  • Patent number: 9716697
    Abstract: Systems and methods of matching identifiers between multiple datasets are described herein. A system can transmit a first identifier vector to a third party server. The first identifier vector can include a first identifier, first parameters, and second parameters. The system can receive, from the third party server, the first identifier vector encrypted based on a third-party encryption. The system can receive, from the third party server, a second identifier vector encrypted based on the third-party encryption associated with the third party server. The second identifier vector can include a second identifier, third parameters, and fourth parameters. The system can determine a correlation count between the first identifier vector and the second identifier vector. The system can determine that the first identifier corresponds to the second identifier based on the correlation count. The system can generate one identifier key for both the first identifier and the second identifier.
    Type: Grant
    Filed: July 24, 2015
    Date of Patent: July 25, 2017
    Assignee: Google Inc.
    Inventors: Mahyar Salek, Philip McDonnell, Vinod Kumar Ramachandran, Shobhit Saxena, David Owen Shanahan
  • Patent number: 9715646
    Abstract: A computer system and method are provided to intercept a task from a primary user account 121 prior to execution of the task by the computer device 200, where the task relates to an untrusted content. A task isolation environment 350 is provisioned for executing the task, including programmatically creating a secondary user account 121b on the computer device. The task is executed in the task isolation environment 350 in relation to the untrusted content. A second folder 126b in the secondary user account 121b is mapped to a first folder 126a in the primary user account 121 and file access requests for the second folder 126b are intercepted by an agent 300 and redirected to the first folder 126a.
    Type: Grant
    Filed: October 21, 2014
    Date of Patent: July 25, 2017
    Assignee: Avecto Limited
    Inventors: Mark Austin, John Goodridge
  • Patent number: 9712548
    Abstract: A computer-implemented method for determining whether a computer network is compromised by unauthorized activity on the computer network. The computer-implemented method comprises identifying a behavioral anomaly of an entity on the computer network, classifying the anomaly as a system event based on an assigned score for the anomaly being at least at a predetermined score threshold, updating an incident based on at least one common parameter between the system event and other system events which comprise the incident, each system event of the incident including an assigned score from when the event was an anomaly, updating a system status based on at least the incident, and assigning a system status score to the system status, and, determining whether the system status score is at least at a predetermined threshold system status score indicating that the computer network may be compromised.
    Type: Grant
    Filed: October 27, 2014
    Date of Patent: July 18, 2017
    Assignee: Cyber-Ark Software Ltd.
    Inventors: Aviram Shmueli, Andrey Dulkin, Yair Sade, Assaf Weiss
  • Patent number: 9705896
    Abstract: Systems, methods, and non-transitory computer-readable media can determine a plurality of model scores for a set of accounts. Each model score in the plurality of model scores can be associated with at least one account in the set of accounts. The plurality of model scores can be ranked in descending order. One or more metrics can be determined for each model score in the plurality of model scores based on information about the at least one account associated with each model score. Specified criteria for selecting a model threshold utilized in identifying illegitimate accounts can be acquired. The specified criteria can be based on at least some of the one or more metrics. The model threshold can be selected as corresponding to a lowest ranked model score that satisfies the specified criteria. It is contemplated that there can be many variations and/or other possibilities.
    Type: Grant
    Filed: October 28, 2014
    Date of Patent: July 11, 2017
    Assignee: Facebook, Inc.
    Inventor: Michael Francis Zolli
  • Patent number: 9705681
    Abstract: A method and system for generating a signature for a user are described. The system comprises a signature server, an initial transaction device for a user and a validation device for a user. The initial transaction device is configured to display a first message M and send a request to the signature server to create a signature for said first message M. The signature server is configured to generate a validation challenge using a second message M? which is based on said first message M? and a first secret shared between said user and said signature server and send said validation challenge to the validation device. The validation device is configured to regenerate said second message M? using said first shared secret, display said second message M?, receive user confirmation that the displayed second message M? corresponds to said first message M, generate a validation code confirming the request to create a signature; and send said validation code to said signature server.
    Type: Grant
    Filed: June 6, 2014
    Date of Patent: July 11, 2017
    Assignee: Cryptomathic Ltd.
    Inventors: Guillaume Forget, Torben Pryds Pedersen, Peter Landrock
  • Patent number: 9705855
    Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. If the keys used to encrypt the data have not been exposed during serialization operation, they may be deleted or destroyed enabling the destruction of data encrypted with the keys.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: July 11, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Todd Lawrence Cignetti, Andrew J. Doane, Eric Jason Brandwine, Robert Eric Fitzgerald
  • Patent number: 9697365
    Abstract: Functionality is described herein for receiving events which characterize features in an environment, and for identifying at least one policy based on the events. The functionality consults a certificate, associated with the policy, to determine whether the policy is valid. If valid, the functionality uses the policy to govern the behavior of at least one application, such as by controlling the application's consumption of events. A trusted passport authority may be employed to generate the certificates. Each certificate may: (1) identify that it originated from the trusted passport authority; (2) contain context information which describes a context in which the policy is intended to be applied within an environment; and/or (3) contain machine-readable content that, when executed, carries out at least one aspect of the policy.
    Type: Grant
    Filed: January 28, 2014
    Date of Patent: July 4, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Tadayoshi Kohno, David A. Molnar, Alexander N. Moshchuk, Franziska Roesner, Jiahe Helen Wang
  • Patent number: 9697353
    Abstract: Disclosed are a method and a device for intercepting a call for a service by an application in an operating system of an electronic apparatus. The method comprises: loading an interception dynamic link library to a process where the service is located; replacing the address of an input/output control function in the process with a first address of the interception dynamic link library; when the application is calling the service, executing the interception dynamic link library based on the first address so as to obtain the name and information of the application as well as the information of the call, and replacing the address of the service to be called comprised in the information of the call with a second address of the interception dynamic link library; and executing processing based on the second address according to the name and/or information of the application. The invention increases the security of the operating system of the electronic apparatus.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: July 4, 2017
    Assignee: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Yi Ding, Yuan Li
  • Patent number: 9690717
    Abstract: A method and structure for a secure object, as tangibly embodied in a computer-readable storage medium. The secure object includes a cryptographically protected region containing at least one of code and data, an initial integrity tree that protects an integrity of contents of the cryptographically protected region; and an unprotected region that includes a loader, an esm (enter secure mode) instruction, and one or more communication buffers.
    Type: Grant
    Filed: June 22, 2015
    Date of Patent: June 27, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard Harold Boivie, Peter T. Williams
  • Patent number: 9686082
    Abstract: A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media.
    Type: Grant
    Filed: February 19, 2016
    Date of Patent: June 20, 2017
    Assignee: International Business Machines Corporation
    Inventors: Frederic Bauchot, Gerard Marmigere, Christophe Mialon, Pierre Secondo
  • Patent number: 9684898
    Abstract: Systems and methods can secure personal identification numbers associated with secure elements within mobile devices. A host application of the mobile device can receive a personal identification number (PIN) or user PIN from a user. The application can generate one or more random PIN components. The application can compute a PIN for the secure element based upon the user PIN and each of the one or more random components. The SE can be configured using the PIN computed for the secure element. Each of the one or more random components may be stored in one or more distinct, diverse locations. In addition to entering the correct user PIN, each of the one or more random components must be retrieved from the diverse locations in order to reconstruct the PIN for the secure element whenever performing a transaction using the secure element.
    Type: Grant
    Filed: September 25, 2013
    Date of Patent: June 20, 2017
    Assignee: GOOGLE INC.
    Inventors: Ismail Cem Paya, Robert Lieh-Yuan Tsai
  • Patent number: 9686218
    Abstract: A local gateway device receives email across the internet from a sender of the email and forwards it across the internet to an email filtering system. The email filtering system analyzes the email to determine whether it is spam, phishing or contains a virus and sends it back to the local gateway device along with the filtered determination. The local gateway device forwards the received email and the filtered determination to a local junk store which handles the email appropriately. For example, if the email has been determined to be spam, phishing or containing a virus, the junk store can quarantine the email and if the email has been determined to be non-spun and/or not phishing and/or not containing a virus, the junk store can forward the email to a local mail server for delivery.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: June 20, 2017
    Assignee: SONICWALL INC.
    Inventors: Scott Eikenberry, John Gmuender, Akbal Singh Karlcut, MichaelCarl Y. Uy, Boris Yanovsky
  • Patent number: 9686252
    Abstract: A system and method implemented at a server system, for securely wiping a remote mobile device after the device registration has been removed from the server system. Prior to removal of the device registration from the server system, a “pre-packaged” command is created and stored at the server system. In the event that it is determined, after removal of the registration, that the device should be wiped or disabled, means are provided for an administrator to issue the previously stored command to the target mobile device.
    Type: Grant
    Filed: September 9, 2014
    Date of Patent: June 20, 2017
    Assignee: BlackBerry Limited
    Inventors: Michael Kenneth Brown, Scott William Totzke, Michael Grant Kirkup
  • Patent number: 9679126
    Abstract: A decryption device for decrypting a document encrypted using biometric information of an intended receiver of the document is provided. The decryption device comprises: an imaging device configured to capture an image of at least a portion of the document; a biometric detection device configured to detect biometric information of a user; a processor configured to decrypt at least the portion of the document using the captured image and the detected biometric information; and a display device configured to display at least the portion of the document decrypted by the processor.
    Type: Grant
    Filed: October 23, 2014
    Date of Patent: June 13, 2017
    Assignee: SAP SE
    Inventor: Srinath Warrier
  • Patent number: 9680808
    Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. Signaling methods are used to notify virtual machine instances of serialization events in order to prevent keying material from being stored persistently.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: June 13, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Todd Lawrence Cignetti, Eric Jason Brandwine, Robert Eric Fitzgerald, Andrew J. Doane
  • Patent number: 9674205
    Abstract: Methods and systems for verifying the identity and trustworthiness of a user of an online system are disclosed. In one embodiment, the method comprises receiving online and offline identity information for a user and comparing them to a user profile information provided by the user. Furthermore, the user's online activity in a third party online system and the user's offline activity are received. Based on the online activity and the offline activity a trustworthiness score may be calculated.
    Type: Grant
    Filed: February 15, 2016
    Date of Patent: June 6, 2017
    Assignee: Airbnb, Inc.
    Inventors: Stephen Kirkham, Michael Lewis
  • Patent number: 9674153
    Abstract: A secure data processing apparatus and method are disclosed. The secure data processing apparatus is operable to securely process user data provided by a user and includes a trusted domain having a trusted bus; a trusted domain controller coupling the trusted bus with an untrusted bus of an untrusted domain, the trusted domain controller being operable to ensure that encrypted incoming user data received over the untrusted bus is decrypted and provided over the trusted bus as the incoming user data and to ensure that outgoing user data is encrypted and provided over the untrusted bus as encrypted outgoing data. The trusted domain controller that only encrypted data is provided in the untrusted domain reducing the chance of the data being compromised. The trusted domain controller ensures that access to the unencrypted data within the trusted domain can be avoided. Confidentiality of the data can be assured without performance shortfalls.
    Type: Grant
    Filed: May 31, 2013
    Date of Patent: June 6, 2017
    Assignee: Alcatel Lucent
    Inventors: Tommaso Cucinotta, Davide Cherubini, Eric B. Jul
  • Patent number: 9660983
    Abstract: One time password (OTP) technology enables a plurality of OTP software token instances (or copies) to be used simultaneously on a plurality of computing devices of a user. OTP software instances may be counter based. An authentication server comprising authentication software assigns a set of counters for each OTP software instance. An OTP software instance may be provided along with the assigned set of counters to each computing device. A range of counters may be partitioned by the authentication server into mutually exclusive sets of counters. An OTP software instance executed by a computing device uses one of the counters in the assigned set of counters to provide an OTP. The authentication server attempts authentication by using each counter in the assigned set of counters to provide a calculated OTP that is compared to the received OTP. The authentication server verifies authenticity when a calculated OTP matches a received OTP.
    Type: Grant
    Filed: October 24, 2014
    Date of Patent: May 23, 2017
    Assignee: CA, INC.
    Inventor: Venkatababji Sama
  • Patent number: 9660995
    Abstract: The subject matter described herein includes methods, systems, and computer readable media for combating mobile device theft with user notarization. One method includes providing a supplicant video notarization system application executable on a supplicant device for initiating an interactive video call between a supplicant and a notary as a condition to the supplicant accessing a protected electronic resource. The method further includes providing a notary video notarization system application executable on a notary device through which the notary receives the interactive video call and interacts with the supplicant via the interactive video call to confirm the identity of the supplicant and that video of the supplicant provided in the call is live.
    Type: Grant
    Filed: February 20, 2014
    Date of Patent: May 23, 2017
    Assignees: The University of North Carolina at Chapel Hill, Indiana University Research & Technology Corporation
    Inventors: Michael Kendrick Reiter, Apu Chandrasen Kapadia, Alana Libonati
  • Patent number: 9654457
    Abstract: A non-limiting example game system includes a game apparatus which is stored with various kinds of application programs. When an application program for a specific service such as a television program guide (program guide program) is started, prior to an acquisition of a content (webpage), an authentication of the game apparatus is performed, and a white list which records a domain name accessible by the game apparatus (the program guide program) is acquired from a managing server which is controlled by a provider of the television program guide. In the program guide program, it is determined whether or not a domain name described in URL of the webpage appears in the white list when a request to send the webpage is to be sent. If not appeared in the white list, the program guide program is suspended, and a web browser is activated to send the request to send the webpage.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: May 16, 2017
    Assignee: NINTENDO CO., LTD.
    Inventors: Yoji Kamikawa, Taiyo Hara, Makoto Takano, Kojiro Taguchi, Hirokazu Shimaoka, Yuya Ono