Patents Examined by Vladimir I Gavrilenko
  • Patent number: 10880274
    Abstract: A method for authorizing online sharing of content including a digital photograph or video, includes receiving, at an electronic device, the content, identifying an image of a person in the content, identifying authorization conditions associated with the person, identifying an image of an object or audio in the content, based on both the image of the person identified and the image of the object or audio identified, determining if the authorization conditions associated with the person are met, and in response to determining that the authorization conditions are met, providing online access to the digital photograph or video.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: December 29, 2020
    Assignee: BlackBerry Limited
    Inventor: Neil Patrick Adams
  • Patent number: 10871952
    Abstract: Embodiments of the present disclosure are directed to methods and systems for providing secure over-the-air firmware updates to one or more vehicles. More specifically, the present disclosure describes applying to firmware images distributed to one or more vehicles encryption that is unique to each update version. The encryption is also unique to each vehicle receiving the update. Embodiments of the present disclosure can also include determining and verifying the integrity of an available OTA firmware update prior to authorizing installation of the firmware update in a vehicle.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: December 22, 2020
    Assignee: NIO USA, Inc.
    Inventors: Qiyan Wang, Abraham T. Chen, Veysel Özer
  • Patent number: 10868821
    Abstract: Electronic communications passing through a communication gateway or similar device for an enterprise can be monitored for indicators of malicious activity. When potentially malicious activity is identified, a user-based inquiry can be employed to identify potential sources of the malicious activity within the enterprise network. More specifically, by identifying a user that sourced the communication, instead of or in addition to a network address, devices within the enterprise network associated with the user can be located, analyzed, and remediated as appropriate.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: December 15, 2020
    Assignee: Sophos Limited
    Inventors: Andrew J. Thomas, David James Mitchell, Paul Stuart Murray
  • Patent number: 10831914
    Abstract: Systems and methods for establishing a protected, multi-hop, extensible channel of wireless communication using IoT devices are disclosed. A plurality of IoT devices may relay, via hardware and/or software embedded in each device, wireless messages from one device to another. The IoT devices may form a chain, each IoT device within wireless communication range of at least one other IoT device. The chain may be extended by adding IoT devices to the chain. A message may hop from one IoT device in the chain to the next, and may ultimately be transmitted across the full span of the chain. Hardware and/or software in each IoT device may emit an electromagnetic masking signal at each hop. The masking signal may introduce electromagnetic noise into the environment and protect the message from interception.
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: November 10, 2020
    Assignee: Bank of America Corporation
    Inventor: Jesse Strickland Newsom, III
  • Patent number: 10819688
    Abstract: In view of the foregoing, an embodiment herein provides a method of generating and managing a key package using a key manufacturing server. The key manufacturing server performs the steps of: (i) obtaining a key package from a development signing server; (ii) generating at least one production key that is specific to a device in the key package; (iii) communicating the key package with the at least one production key to a key manager associated with the device using a communication link; and (iv) obtaining the key package with at least one device key that is generated by the key manager.
    Type: Grant
    Filed: March 24, 2018
    Date of Patent: October 27, 2020
    Inventors: Rajesh Kanungo, Rampura Venkatachar Raman, Benjamin R. Loomis
  • Patent number: 10810305
    Abstract: Systems, apparatuses and methods may provide technology for securing untrusted code using memory protection keys and control flow integrity, by applying a memory protection key to one or more memory regions, enforcing control flow integrity with respect to the one or more memory regions, and executing untrusted code in an isolated region of the one or more memory regions.
    Type: Grant
    Filed: February 19, 2018
    Date of Patent: October 20, 2020
    Assignee: Intel Corporation
    Inventors: Mingwei Zhang, Ravi Sahita
  • Patent number: 10805092
    Abstract: A processing module for a first lock device of a range determination system, the range determination system comprising a lock group comprising a plurality of lock devices of which the first lock device forms part, the plurality of lock devices physically spaced over a lockable element and configured to communicate with a key group comprising a plurality of key devices, a shortest distance between any one of the key devices of the key group and any one of the lock devices of the lock group providing for access to the lockable element relative to a threshold distance.
    Type: Grant
    Filed: February 19, 2018
    Date of Patent: October 13, 2020
    Assignee: NXP B.V.
    Inventors: Jan Dutz, Wolfgang Küchler, Frank Leong, Thomas Baier, Arie Geert Cornelis Koppelaar
  • Patent number: 10764324
    Abstract: A routing system for use in an IoT apparatus is proposed to include a router device. A control module of the router device determines whether to execute a routing process relating to an input message based on environment information, status information and a conflict management mechanism that relate to the router device. In the routing process, the control module executes channel operations when the input message includes a channel management instruction, and executes, when the input message relates to authentication or an application program, a relevant verification procedure or the application program.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: September 1, 2020
    Inventors: Kung-Wei Chang, Yi-Fen Chou
  • Patent number: 10764048
    Abstract: A method for performing a secure evaluation of a decision tree, including: receiving, by a processor of a server, an encrypted feature vector x=(x1, . . . , xn) from a client; choosing a random mask ?0; calculating m0 and sending m0 to the client, wherein m0=xi0(0)?t0(0)+?0 and t0(0) is a threshold value in the first node in the first level of a decision tree ?; performing a comparison protocol on m0 and ?0, wherein the server produces a comparison bit b0 and the client produces a comparison bit b?0; choosing a random bit s0?{0,1} and when s0=1 switching a left and right subtrees of ?; sending b0?s0 to the client; and for each level =1, 2, . . . , d?1 of the decision tree ?, where d is the number of levels in the decision tree ?, perform the following steps: receiving from the client yk where k=0, 1, . . .
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: September 1, 2020
    Assignee: NXP B.V.
    Inventors: Marc Joye, Fariborz Salehi