Patents Examined by Wasika Nipa
  • Patent number: 11363064
    Abstract: Embodiments described herein provide systems, methods, and computer storage media for detecting spam using by comparing hash values of content. In embodiments, hash values are generated based on the type of content and compared to other hash values in storage buckets. The similarity of content is determined by calculating the distance between two hash values and determining whether the distance exceeds a distance index. Counter values associated with hash values in storage are incremented when the distances between hash values exceed the distance index. Spam indications are communicated when the counter values for associated with hash values exceed a count threshold.
    Type: Grant
    Filed: July 12, 2019
    Date of Patent: June 14, 2022
    Assignee: Adobe Inc.
    Inventor: Spandan Thakur
  • Patent number: 11356272
    Abstract: A method (30) of handling a hash-tree based data signature is described. The method (30) is performed in a client device (12) and comprises receiving (32), from a gateway device (13), a hash-tree based data signature, and determining (33), based on the received hash-tree based data signature, a first partial signature, P I. A method (60) in a gateway device (13) is also described. A corresponding client device (12) and gateway device (13) are also disclosed, as are related computer programs and computer program products.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: June 7, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventor: Robert Byrne
  • Patent number: 11341282
    Abstract: A method for executing a binary code includes for each item of data to be recorded: executing an algorithm for constructing a data line containing a cryptogram of this item of data constructed using an initialization vector ivj associated with an address @j of the main memory using a relationship ivj=Fiv(@j), where the function Fiv, is a pre-programmed function that associates a different initialization vector ivj with each different address @j of a main memory, and then recording this constructed data line in the main memory at the address @j, where each instruction line of a basic block is constructed by executing the same construction algorithm as the one executed to construct the data line and using the same function Fiv, the item of data for this purpose being taken to be equal to the instruction masked using a mask associated with this basic block.
    Type: Grant
    Filed: May 5, 2020
    Date of Patent: May 24, 2022
    Assignee: Commissariat a l'Energie Atomique et aux Energies Alternatives
    Inventor: Olivier Savry
  • Patent number: 11336633
    Abstract: Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
    Type: Grant
    Filed: June 1, 2020
    Date of Patent: May 17, 2022
    Assignee: DrFirst.com, Inc.
    Inventor: Zilong Tang
  • Patent number: 11329973
    Abstract: In various embodiments, a computer-implemented method for generating and verifying officially verifiable electronic representations may be disclosed.
    Type: Grant
    Filed: June 4, 2020
    Date of Patent: May 10, 2022
    Assignee: CORTEX MCP INC.
    Inventor: Shaunt M. Sarkissian
  • Patent number: 11316892
    Abstract: Systems and methods are disclosed that minimize ongoing risk to an organization from user behaviors which magnify the severity of a spoofed domain. Systems and method are provided which enable an entity and users of an entity to identify potential harmful domains, combining search, discovery, reporting, the generation of risk indicators, end-user risk assessments, and training into a security awareness system.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: April 26, 2022
    Assignee: KnowBe4, Inc.
    Inventors: Stu Sjouwerman, Alin Irimie, Greg Kras
  • Patent number: 11316846
    Abstract: A device is configured for dynamically obtaining updated hash values for certificate processing of endpoints from a dedicated and single server. The server's certificate is signed by a certificate authority that is the sole and root authority for the certificate processing on the device. When endpoints are connected to the device, the hash values are compared against computed hash values for the endpoints' certificates. Connections are deemed secure for the device when the computed hash values match the hash values provided by the server.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: April 26, 2022
    Assignee: NCR Corporation
    Inventors: Isamu Leonard Yamamoto, Joel Smith, Eric K. J. Wang
  • Patent number: 11277410
    Abstract: Described herein is a computer implemented method for configuring a receiving system to receive data from a sending system. The method comprises receiving an integration creation request from a client application. In response, a specific integration user account is created with credentials which provide access to the receiving system. The credentials are communicated to the client application. In addition, an integration record comprising details in respect of the integration is created, stored, and associated with the specific integration user account.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: March 15, 2022
    Assignees: ATLASSIAN PTY LTD., ATLASSIAN INC.
    Inventors: Carl Christian Rolf, Oliver Burn, James Navin, Rafal Krzysztof Myslek
  • Patent number: 11277398
    Abstract: A system includes a first computer system (FCS) configured to receive an authentication request of a user with respect to the first authentication system (FAS), and communicate an unsuccessful authentication attempt. In response, a bridge computer system (BCS), is configured to request a user ID and receive at least the user ID; identify an address of a second computer system (SCS) based on the user ID; and initiate the second authentication system (SAS) using the address. The SCS, if the user has been successfully authenticated with respect to the SAS, is configured to communicate successful authentication to the BCS; and in response, the BCS is configured to send the FAS a confirmation message, and the FCS is configured to treat the user as authenticated.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: March 15, 2022
    Assignee: BUNDESDRUCKEREI GMBH
    Inventors: Frank Byszio, Kim Nguyen
  • Patent number: 11277394
    Abstract: Systems, methods, and computer-readable media for managing credentials of multiple users on an electronic device are provided.
    Type: Grant
    Filed: February 17, 2020
    Date of Patent: March 15, 2022
    Assignee: Apple Inc.
    Inventors: Karthik Narayanan, Navin Bindiganavile Suparna, Scott Lopatin
  • Patent number: 11265334
    Abstract: An Active Intelligence method and system are provided for detecting malicious servers using an automated machine-learning active intelligence manager. The Active Intelligence method and system automatically and covertly extract forensic data and intelligence related to a selected server in real time to determine whether the server is part of a cybercrime infrastructure. An automated machine-learning active intelligence manager is provided that collects or gathers one or more types of forensic intelligence related to the operation of the server under investigation. The active intelligence manager combines the collected one or more types of forensic intelligence, extracts features from the combined forensic intelligence, and classifies the server as malicious or benign based on the extracted features.
    Type: Grant
    Filed: May 18, 2020
    Date of Patent: March 1, 2022
    Assignee: SLASHNEXT, INC.
    Inventor: Atif Mushtaq
  • Patent number: 11240229
    Abstract: Described herein is a computer implemented method for configuring a receiving system to receive data from a sending system. The method comprises receiving an integration creation request from a client application. In response, a specific integration user account is created with credentials which provide access to the receiving system. The credentials are communicated to the client application. In addition, an integration record comprising details in respect of the integration is created, stored, and associated with the specific integration user account.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: February 1, 2022
    Assignees: ATLASSIAN PTY LTD., ATLASSIAN INC.
    Inventors: Carl Christian Rolf, Oliver Burn, James Navin, Rafal Krzysztof Myslek
  • Patent number: 11196770
    Abstract: A method and system for password mediation including receiving, within an operating system network stack of a client device, a hypertext transfer protocol (HTTP) request message issued by a client application executing on the client device, the HTTP request message indicating an operation to be performed for a user of the client application at a destination system; requesting, by the client device, security information for the user with respect to the destination system; modifying, by the client device, the received HTTP request message to include the security information; and sending, by the client device, the modified HTTP request message to the destination system.
    Type: Grant
    Filed: May 29, 2018
    Date of Patent: December 7, 2021
    Assignee: Red Hat, Inc.
    Inventors: Filip Elias, Filip Nguyen
  • Patent number: 11178144
    Abstract: An apparatus and method by which a user device in a home network system transmits home-device-related information is provided. The method includes acquiring, from at least one home device, a unique user identifier (UUID) for a related home device, a peer ID (peer ID) which is managed by a connectivity server for managing a connection between the user device and the related home device and that identifies the related home device, a peer group ID for identifying a group of home devices that have registered with a service server for managing device information on the related home device, and a device token containing key information for authenticating the connection to the related home device, selecting a specific user device which will share the UUID, peerID, peer group ID and device token from among neighboring devices, and transferring the UUID, peerID, peer group ID, and device token to the specific user device on the basis of a predetermined sharing method.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: November 16, 2021
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jun-Hyung Kim, Se-Hoon Kim, Jai-Ick Chun, Dong-Keon Kong, Eun-Hui Bae
  • Patent number: 11159547
    Abstract: A computer system extracts features of documents that mention malware programs to determine textual features that correspond to individual ones of the malware programs. The computer system performs analysis of samples of malware programs to determine features corresponding to the samples. The computer system performs clustering using the textual features and using the features that correspond to the samples of the malware programs. The clustering creates clusters of data points, each data point corresponding to an individual one of the malware programs. The clusters contain data points considered by the clustering to be similar. The computer system outputs indications of the clusters to allow determination of whether data points in the clusters correspond to individual ones of specific malwares. Apparatus, methods, and computer program products are disclosed.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: October 26, 2021
    Assignee: International Business Machines Corporation
    Inventors: Suresh Chari, Heqing Huang, Taesung Lee, Youngja Park
  • Patent number: 11159515
    Abstract: Described herein is a computer implemented method for configuring a receiving system to receive data from a sending system. The method comprises receiving an integration creation request from a client application. In response, a specific integration user account is created with credentials which provide access to the receiving system. The credentials are communicated to the client application. In addition, an integration record comprising details in respect of the integration is created, stored, and associated with the specific integration user account.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: October 26, 2021
    Assignees: ATLASSIAN PTY LTD., ATLASSIAN INC.
    Inventors: Carl Christian Rolf, Oliver Burn, James Navin, Rafal Krzysztof Myslek
  • Patent number: 11132466
    Abstract: A method for determining a first integrity sum including the following steps: determining a first masked item of data by application of an “exclusive OR” operation between a first item of data and a first data mask; —determining a second item of data by application to the first masked item of data of a first cryptographic function, the second item of data being masked by a second data mask; —determining a second integrity sum associated with the second item of data by application to the second item of data of a checksum function; and determining the first integrity sum by application of an “exclusive OR” operation between the second integrity sum and a third integrity sum associated with the second data mask. A computer program and an electronic entity are also described.
    Type: Grant
    Filed: November 16, 2018
    Date of Patent: September 28, 2021
    Assignee: IDEMIA FRANCE
    Inventors: Luk Bettale, Nicolas Debande, Aurélien Greuet
  • Patent number: 11099964
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for restricting user access to actuators and generating user interface presentations that include data received from the actuators when the user has access. One of the methods includes receiving, by an applications manager component of an application platform in a cloud computing environment, a request by a user to access application information of an application deployed by an application framework installed on the application platform in the cloud computing environment. The application framework determines, using a token obtained for the user, that the user has permission to access one or more actuators of the application. The application framework generates a data element for the particular actuator and provides the data element for the particular actuator to the applications manager component. The applications manager component generates a user interface presentation that includes the data element.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: August 24, 2021
    Assignee: Pivotal Software, Inc.
    Inventors: Michael Gresham, Joseph Benjamin Hale
  • Patent number: 11100237
    Abstract: A computing device includes a processor to generate graphics data that includes text, a display to display the graphics data, and a memory to record the displayed graphics data. A sensitive text handling engine is coupled to the processor, the display and the memory. The sensitive text handling engine is configured to perform certain steps before sensitive text within the graphics data is displayed and recorded. These steps include receive sensitive text identification settings, detect text in the graphics data and store the detected text as text images, translate the text images into text strings, and identify sensitive text within the text strings based on the sensitive text identification settings.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: August 24, 2021
    Assignee: CITRIX SYSTEMS, INC.
    Inventor: Youjun Gu
  • Patent number: 11100248
    Abstract: A system for awarding priority-certificates and for providing personal-priority-accounts is disclosed. The system may include an apparatus for receiving priority-certificate applications including priority-claims with respect to one or more abstract ideas, discoveries, or other subject matter not covered by any form of intellectual property. The system may include a first-computer-system, a first-storage-unit connected with the first-computer-system, and a second-storage-unit connected with the first-computer-system. The system may further include a personal-priority-account apparatus configured to enable a user to save priority-documents on an account administrated by an independent party keeping said documents in trust for the user. The system may further include an apparatus configured to associate priority-documents to the application. The application may be examined by an examiner to find whether the priority-claims are valid.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: August 24, 2021
    Inventor: Gelu Comanescu