Patents Examined by Walter Malinowski
-
Patent number: 9891902Abstract: In some examples, a client device receives, from a network-attached storage (NAS) system, installer code. Executing the installer code at the client device causes display of a user interface at the client device. Questions are presented in the user interface at the client device. Responsive to answers to the questions received in the user interface, the installer code executing at the client device installs a subset of software components relating to the NAS system the client device.Type: GrantFiled: May 4, 2016Date of Patent: February 13, 2018Assignee: Hewlett-Packard Development Company, L.P.Inventors: Charles Martin McJilton, Paul Michael Cesario, Matthew D. Haines, Eric Peterson
-
Patent number: 9894151Abstract: A method begins by a module to generate a secure signature on an item by selecting a first key representation index of a set of key representation indexes, wherein a first mathematical encoding of a private key generates a first plurality of key shares as a first key representation. The method continues with the module determining whether a first plurality of signature contributions have been received in response to a signature request for the item based on the first key representation index, wherein one of a first set of dispersed storage (DS) units executes a first mathematical signature function using one of the first plurality of key shares on the item to produce a signature contribution of the first plurality of signature contributions and when the first plurality of signature contributions have been received, generating the secure signature on the item from the first plurality of signature contributions.Type: GrantFiled: January 6, 2014Date of Patent: February 13, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Greg Dhuse, Jason K. Resch, Wesley Leggette
-
Patent number: 9870462Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for prevention of cable swap security attacks on storage devices. A host system may include a provisioning module configured to generate a challenge-response verification key-pair and further to provide the key-pair to the storage device to enable the challenge-response verification. The system may also include a link error detection module to detect a link error between the host system and the storage device. The system may further include a challenge-response protocol module configured to initiate, in response to the link-error detection, a verification challenge from the storage system and to provide a response to the verification challenge based on the key-pair.Type: GrantFiled: September 22, 2014Date of Patent: January 16, 2018Assignee: INTEL CORPORATIONInventors: Sanjeev N. Trika, Jason Cox, Anand S. Ramalingam
-
Patent number: 9838381Abstract: A certificate management apparatus retains an important certificate, while deleting the oldest referenced certificate. An update determination information output unit outputs update determination information being information for determining whether or not to update a certificate. A certificate cache stores the certificate on a volatile memory. An operation unit stores the update determination information output by the update determination information output unit in the certificate cache by relating to the certificate, and based on the update determination information stored in the certificate cache, updates the certificate related to the update determination information.Type: GrantFiled: February 26, 2014Date of Patent: December 5, 2017Assignee: Mitsubishi Electric CorporationInventors: Teruyoshi Yamaguchi, Nobuhiro Kobayashi
-
Patent number: 9838369Abstract: Traffic broadcast to a VLAN is restricted. To do so, a plurality of stations are associated with a BSSID (basic service set identifier). A first VLAN is configured by sending a first group key to each station from the plurality of stations that is a member of the first VLAN, wherein each VLAN is associated with a unique group key. One or more frames addressed to the first VLAN are received. The one or more frames are encrypted with the first group key to prevent stations without the first group key from being able to decrypt the one or more frames. The one or more encrypted VLAN frames are broadcast to the plurality of stations associated with the BSSID.Type: GrantFiled: February 13, 2016Date of Patent: December 5, 2017Assignee: Fortinet, Inc.Inventors: Mohan Ram, Sung-Wook Han
-
Patent number: 9836637Abstract: A system includes a fingerprint sensor, an application processor, and an auxiliary processor. The application processor is operable to arm the fingerprint sensor prior to the application processor entering a low power or sleep mode. The auxiliary processor is to receive a state output from the fingerprint sensor. The state output is to cause activation of one or more functions of the auxiliary processor upon fingerprint authentication while leaving the application processor in the low power or sleep mode.Type: GrantFiled: June 20, 2014Date of Patent: December 5, 2017Assignee: Google LLCInventors: Thomas Y Merrell, Jeffrey A Sierawski
-
Patent number: 9825936Abstract: Provided is a system and method for providing a certificate, and more specifically a certificate for network access upon a second system.Type: GrantFiled: March 3, 2015Date of Patent: November 21, 2017Inventors: Kevin Lee Koster, Roger Lynn Haney
-
Patent number: 9813904Abstract: A system includes a sensor to determine a user is proximate to the system and a logon module to receive information from the sensor that a user is proximate to the system, receive logon information from the user and identification information associated with the user, authenticate the user to use the system based on the logon information, store the identification information, receive second information from the sensor that the user is not proximate to the system, suspend an operating system session, receive information from the sensor that the user is again proximate to the system, receive second identification information associated with the user, determine that the first and second identification information matches, and resume the OS session in response to determining that the first and second identification information matches.Type: GrantFiled: August 30, 2013Date of Patent: November 7, 2017Assignee: Dell Products, LPInventors: Richard J. Cardone, Muhammad Yousaf
-
Patent number: 9781204Abstract: A cloud-based computer system changes the modern paradigm from being device-centric to being person-centric. The system makes all user data, software settings, device settings, and licensed content for a user available in the cloud. The system includes a conversion mechanism that can convert information intended for one device type to a different device type. Thus, a user changing smart phone platforms can convert their current smart phone settings to equivalent settings on the new phone platform, and their new phone can then be configured using the user's converted settings stored in the cloud. By storing all the user's relevant information in the cloud, this information may be accessed anywhere and may be used to configure a large number of different devices according to the user's settings.Type: GrantFiled: July 18, 2015Date of Patent: October 3, 2017Assignee: U-Me Holdings LLCInventor: Derek P. Martin
-
Patent number: 9755441Abstract: Improved handling of battery recognition tasks in an electronic device such as a cell phone, smart phone, computer system, recording device or others is facilitated. Recognition of a battery so as to enable exchange of power between the device and the battery is determined by a match between one of a plurality of number strings stored in the device and the decrypted response to an encrypted challenge derived from the one of stored number string.Type: GrantFiled: November 24, 2014Date of Patent: September 5, 2017Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Kenneth Scott Seethaler, Randall Scott Springfield
-
Patent number: 9735967Abstract: A method begins by a first device generating a self-validating message by creating a master key, using the master key to create a message encryption key, encrypting a message using the message encryption key to produce an encrypted message, encrypting the master key using a public key of a second device to produce an encrypted master key, and including a message authentication code of the first device in the self-validating message. The method continues by the second device receiving and decoding the self-validating message by verifying the message authentication code of the first device, and when the message authentication code of the first device is verified, decrypting the encrypted master key using a private key of the second device to recover the master key, using the master key to create the message encryption key, and decrypting the encrypted message using the message encryption key to recover the message.Type: GrantFiled: March 3, 2015Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Wesley Leggette, Jason K. Resch
-
Patent number: 9727748Abstract: An apparatus, method, and a computer program are provided to secure one or more sections of a document. For example, one or more sections of the document may be converted into secured content. The secured content may then be removed from the document, and replaced with replacement content in the document. This may prevent a viewer with no privileges from viewing secured content.Type: GrantFiled: May 2, 2012Date of Patent: August 8, 2017Assignee: Open Invention Network LLCInventor: Marc Todd Yaeger
-
Patent number: 9716586Abstract: Methods, media, and systems for, in one embodiment, protecting one or more keys in an encryption and/or decryption process can use precomputed values in the process such that at least a portion of the one or more keys is not used or exposed in the process. In one example of a method, internal states of an AES encryption process are saved for use in a counter mode stream cipher operation in which the key used in the AES encryption process is not exposed or used.Type: GrantFiled: January 19, 2016Date of Patent: July 25, 2017Assignee: Apple Inc.Inventors: Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Bruno Kindarji, Augustin J. Farrugia
-
Patent number: 9716724Abstract: A cloud based data loss prevention (DLP) system (“cloud DLP system”) implements offline scanning of content stored in a cloud-based service belonging to an enterprise in accordance with the enterprise's policy and control. The cloud DLP system provides alerts or remediation in response to detection of non-compliance cloud content. In some embodiments, the cloud DLP system is provided with the access credential of the enterprise to access the cloud-based service. In other embodiments, the enterprise's login credential remains within the enterprise data network and an on-premises client obtains an access token for the cloud DLP system.Type: GrantFiled: February 18, 2015Date of Patent: July 25, 2017Assignee: Skyhigh Networks, Inc.Inventors: Snehal Chennuru, Sekhar Sarukkai
-
Patent number: 9712491Abstract: The disclosure relates to using a control service to control external access to APIs of IoT devices on a private network. An external application can request access to an API, and in response, the control service can monitor broadcasts from the IoT devices indicating what APIs they have available. If a match exists, the control service can request user authorization to allow the requested access. The user can grant or deny the requested access, and place limitations on the authorized access. The control service uses this information to open a connection between the requesting application and the IoT device having the requested API, and via this connection, the requesting application can access and control the device running the requested API.Type: GrantFiled: March 3, 2015Date of Patent: July 18, 2017Assignee: QUALCOMM CONNECTED EXPERIENCES, INC.Inventors: Gregory Burns, Joshua Dickenson Hershberg, Phil Tien Nguyen, Fruma Adina Geffen
-
Patent number: 9697346Abstract: In one embodiment, a method includes identifying a request for access to a first system and obtaining a visual image including at least a first piece of information associated with the request. The visual image is associated with a first device and obtained using a second device. The method also includes determining if the at least first piece of information indicates that the access to the first system is to be granted, wherein determining if the at least first piece of information indicates that the access to the first system is to be granted includes implementing a visual recognition algorithm to process the at least first piece of information. Finally, the access to the first system is granted if it is determined that the at least first piece of information indicates that the access to the first system is to be granted.Type: GrantFiled: March 6, 2012Date of Patent: July 4, 2017Assignee: Cisco Technology, Inc.Inventors: Philip C. Jacobs, John A. Toebes
-
Patent number: 9690601Abstract: A method for dynamic switching of user profiles on a computing device. The computing device is coupled to at least one image-sensing device and can be configured using a plurality of stored user profiles. The method includes receiving at least one image from the at least one image-sensing device and generating a current user value based on the at least one received image. The method further includes determining if the current user value corresponds to at least one stored user value corresponding to a stored user profile. If the current user value corresponds to at least one stored user value, the method includes retrieving the stored user profile and configuring at least some programs operating on the computing device using the retrieved user profile. If the current user value does correspond to at least one stored user value, the method includes configuring the computing device using an alternative method.Type: GrantFiled: August 19, 2015Date of Patent: June 27, 2017Assignee: GOOGLE INC.Inventors: Michael Andrew Sipe, Hugo Barra, Henry Will Schneiderman
-
Patent number: 9674225Abstract: A managed container may be configured to manage enterprise applications, manage enterprise information stored on a device, manage a protected storage area used by the managed container to store and reference the enterprise applications during execution, and manage a database storing enterprise rules related to management of the enterprise applications and the enterprise information. The managed container may communicate with an application gateway server to control download and update of the enterprise applications, the enterprise information, and the enterprise rules. The application gateway server may be coupled to a backend enterprise application. At least one of the enterprise applications may be configured to execute in conjunction with the backend enterprise application according to at least one of the enterprise rules, and is configured to, according to another one of the enterprise rules, manage the enterprise information associated with the backend enterprise application.Type: GrantFiled: September 19, 2014Date of Patent: June 6, 2017Assignee: Open Text SA ULCInventors: Gregory Beckman, Robert Laird, Alain Gagne
-
Patent number: 9589123Abstract: A method of providing a user with an option to access a protected system by satisfying a reduced security measure is disclosed. An attempt by the user to access the protected system is detected. It is detected that a first security token system is within a first proximity to the protected system. Based on the detecting of the attempt by the user to access the protected system and the detecting that the first security token system is within the first proximity, the user is provided with the option to access the protected system by satisfying the reduced security measure.Type: GrantFiled: October 23, 2015Date of Patent: March 7, 2017Assignee: eBay Inc.Inventor: Eric J. Farraro
-
Patent number: 9585012Abstract: A method for establishing a secure connection between a station and an access point includes transmitting a communications system management message to the station, the communications system management message including an access point nonce. The method also includes receiving a station nonce from the station, and determining a first security key according to the access point nonce and the station nonce. The method further includes securing a connection between the station and the access point using the first security key.Type: GrantFiled: May 14, 2012Date of Patent: February 28, 2017Assignee: Futurewei Technologies, Inc.Inventor: Marcus Wong