Management Patents (Class 726/6)
-
Patent number: 10841259Abstract: The invention relates to method and apparatus for generating and applying a homepage ID number used as user identification of a user in a homepage system. The method includes obtaining a homepage ID number generation class; when the homepage ID number generation class is a user-type-based generation manner, obtaining a user type of a user, and searching for a matching first number segment according to the user type; receiving a second number segment input by the user, or displaying multiple second number segments for the user to select from and receiving a second number segment determined by the user; generating, according to the first number segment and the second number segment input or selected by the user, a homepage ID number for identifying user identity of the user.Type: GrantFiled: September 21, 2018Date of Patent: November 17, 2020Inventor: Shiwei Li
-
Patent number: 10831816Abstract: A method for controlling an electronic picture frame and corresponding devices. An electronic picture frame cloud platform is configured to verify account information of a mobile terminal after receiving a request for operating the electronic picture frame sent by the mobile terminal through the Internet protocol address of the electronic picture frame. It is configured to allow the mobile terminal to operate the electronic picture frame through the Internet protocol address of the electronic picture frame if the account information is verified to be the pre-stored account information bound to the Internet protocol address of the electronic picture frame; otherwise, it prohibits the mobile terminal to operate the electronic picture frame through the Internet protocol address of the electronic picture frame.Type: GrantFiled: May 10, 2018Date of Patent: November 10, 2020Assignees: K-TRONICS (SUZHOU) TECHNOLOGY CO., LTD., BOE TECHNOLOGY GROUP CO., LTD.Inventors: Huixiang Wu, Haitang Xu
-
Patent number: 10834199Abstract: A vehicle includes a controller, programmed to responsive to receiving a command from a non-customer party, send an authorization request based on the command and a predefined vehicle parameter to a server; and responsive to receiving a signed command from the server, execute the signed command.Type: GrantFiled: September 18, 2018Date of Patent: November 10, 2020Assignee: Ford Global Technologies, LLCInventors: Karl Nathan Clark, Jason Michael Miller, Xin Ye, James Michael Weinfurther, Vijayababu Jayaraman
-
Patent number: 10824696Abstract: Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.Type: GrantFiled: September 6, 2019Date of Patent: November 3, 2020Assignee: RightQuestion, LLCInventor: Bjorn Markus Jakobsson
-
Patent number: 10824891Abstract: A method of recognizing a biological feature is provided. In an example, the method includes: first biological feature data is obtained; a first recognition operation is performed according to the first biological feature data and biological feature template data to obtain a first recognition result; when the first recognition result indicates a match failure, second biological feature data is obtained; and a re-recognition operation is performed according to the second biological feature data and the biological feature template data to obtain a second recognition result. The second biological feature data and the first biological feature data are collected by a same biological feature collector at different moments in a same biological feature recognition process.Type: GrantFiled: May 25, 2018Date of Patent: November 3, 2020Assignee: Beijing Xiaomi Mobile Software Co., Ltd.Inventors: Xuebin Huang, Chuanshun Ji
-
Patent number: 10819824Abstract: Various embodiments include a lamp control unit coupled to or part of one or more light emitting diode (LED) based lamps. The lamp control unit can receive, from a lamp commissioning application of a mobile device via a wireless protocol, one or more commissionable lighting parameters to configure light output of the LED based lamps. The lamp control unit can lock access to change the commissionable lighting parameters with a password. One or more operational lighting parameters of the lamp control unit can be adjusted via a control interface (e.g., an adjustable voltage dimmer) other than the wireless protocol. The lamp control unit can drive the LED-based lamps based on the operational lighting parameters and the commissionable lighting parameters.Type: GrantFiled: May 11, 2016Date of Patent: October 27, 2020Assignee: Lumenetix, LLCInventors: Eric Lebel, Daniel Gochnauer, David Bowers, Thomas Poliquin
-
Patent number: 10819601Abstract: Systems and methods for recording and communicating engine data are provided. One example embodiment is directed to a system for testing communications. The system includes an electronic engine controller. The system includes a wireless communication unit in communication with the electronic engine controller. The wireless communication unit includes one or more memory devices. The wireless communication unit includes one or more processors. The one or more processors are configured to provide a resource to a remote computing device. The one or more processors are configured to receive input from the remote computing device via the resource. The one or more processors are configured to cause a connectivity test to be performed in response to the received input. The one or more processors are configured to transmit a result of the connectivity test to the remote computing device.Type: GrantFiled: June 26, 2017Date of Patent: October 27, 2020Assignee: GE Aviation Systems LLCInventors: Michael Clay Scholten, Vivian Fannesse Tseng, Edward John Rivera, Robert Alan Meneghini, Jr.
-
Patent number: 10819701Abstract: Various methods and systems are provided for autonomous management for a managed service identity. A first token request, for a secret, is generated at a managed service. The secret supports authenticating the managed service for performing operations in a distributed computing environment. The first token request includes an identity identifier of the managed service. The first token request is communicated to a credentials manager which is associated with a secrets management service (“SMS”) that can be utilized to store, renew and distribute secrets in the distributed computing environment. Based on communicating the first token request to credentials manager, the token is received, via the credentials manager, from the secret token service. The token is received based in part on the credentials manager generating a second token request for the token and communicating the second token request and a secret associated with the managed service to the secret token service.Type: GrantFiled: March 14, 2018Date of Patent: October 27, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Abhinav Bose, Kahren Tevosyan, Chandan R. Reddy, Ashok Chandrasekaran
-
Patent number: 10798070Abstract: Systems and methods for providing services are disclosed. One aspect comprises authenticating a user associated with a first service, receiving a selection of a second service, generating an opaque identifier associated with the user and the first service, wherein the opaque identifier facilitates the anonymous collection of data relating to the second service. Another aspect can comprise transmitting the opaque identifier to the second service, and receiving data relating to the second service.Type: GrantFiled: June 11, 2019Date of Patent: October 6, 2020Assignee: Comcast Cable Communications, LLCInventors: David Mays, Jason Press
-
Patent number: 10795991Abstract: A method performed by an enterprise search system to conduct an automated, computerized search for select operational attributes of a plurality of network devices is shown. The method comprises initiating the search via a user interface based on receipt of input information, which is used to form a query. The method then determines based on the query, one or more audits each specifying one or more tasks to be performed by at least a first network device to search for the select operational attributes. Subsequently, the method makes the one or more audits available to the first network device via a network, and receives, from the first network device, one or more responses to the query. The method may include generating one or more filter conditions to apply to results of executing the one or more tasks to yield the select operational attributes when included in the results.Type: GrantFiled: November 3, 2017Date of Patent: October 6, 2020Assignee: FireEye, Inc.Inventors: Steven Antonio Ross, Ai Quoc Duong, Larry Alan King, John Patrick Young
-
Patent number: 10795942Abstract: Provided are a method and device for residing a short message verification code. This method includes: conducting keyword matching on a short message content using a regular expression; when the short message content contains a keyword, matching a verification code for the short message content using the regular expression, to acquire a matched verification code; and displaying the verification code on a current interface and displaying a pre-set time. This method can automatically extract a verification code in a short message and display a pre-set time on a current interface. Within this pre-set time, a user can fill in a verification code on a verification code interface according to the displayed verification code without the need for the user to remember the verification code and to frequently switch between a short message application and a current application as well.Type: GrantFiled: April 20, 2015Date of Patent: October 6, 2020Assignee: BEIJING BYTEDANCE NETWORK TECHNOLOGY CO LTD.Inventors: Dawei Geng, Xinji Shen
-
Patent number: 10798101Abstract: Access level and security group information can be updated for a data instance without having to take down or recycle the instance. A data instance created in a data environment will have at least one default security group. Permissions can be applied to the default security group to limit access via the data environment. A control security group can be created in a control environment and associated with the default security group. Permissions can be applied and updated with respect to the control security group without modifying the default security group, such that the data instance does not need to be recycled or otherwise made unavailable. Requests to perform actions with respect to the control security groups are made via the control environment, while allowing native access to the data via the data environment.Type: GrantFiled: March 1, 2019Date of Patent: October 6, 2020Assignee: Amazon Technologies, Inc.Inventor: Grant Alexander MacDonald McAlister
-
Patent number: 10791464Abstract: A method for creating a secure communication session between a user and an application server is provided. The method includes: providing a database associating a plurality of authorized user identifiers with a plurality of security credentials approved by the application server; assigning an IP address to the user; providing the serving gateway with the IP address and the user identifier of the user connected to the core network; checking whether the user identifier of the connected user to the core network is present in the database among the authorized user identifiers; forming a secure connection between the application server and the serving gateway using the security credential associated to the authorized user identifier of the user connected to the core network; and forwarding all packets from the application network addressed to the user via the secure connection to the user and vice versa.Type: GrantFiled: September 10, 2019Date of Patent: September 29, 2020Assignee: ATHONET S.R.L.Inventors: Hesham Soliman, Carlo Carraro, Gianluca Verin
-
Patent number: 10789345Abstract: Methods and systems for creating a verifiable digital identity are provided. The method includes obtaining a first user-generated item comprising an identifiable feature. The method also includes digitally signing the first user-generated item to generate a secure digital artifact. The method also includes uploading the secure digital artifact and the first user-generated item to an auditable chain of a public ledger. The method also includes verifying a digital identity of the user by auditing the auditable chain. The method also includes obtaining a second user-generated item generated comprising the identifiable feature. The method also includes comparing the first and second user-generated items. The method also includes uploading the second user-generated item to the public ledger when the comparing is within a threshold.Type: GrantFiled: April 19, 2019Date of Patent: September 29, 2020Assignee: block.oneInventors: Daniel J. Larimer, Richard B. Whitner, Thomas C. Hallgren, Todd B. Fleming
-
Patent number: 10783260Abstract: According to the present invention, a method for delegating a login via PKI-based authentication for a login request of a user by using a smart contract and a blockchain database is provided.Type: GrantFiled: August 20, 2019Date of Patent: September 22, 2020Assignee: Coinplug, Inc.Inventors: Joon Sun Uhr, Jay Wu Hong, Sang Hoon Hyun, Ju Min Lee
-
Patent number: 10785204Abstract: An authorization code response is transmitted to a client, and the client uses a parameter included in the authorization code response and a parameter included in the authorization code response transmitted by a transmitting unit to verify that the authorization code response corresponds to an authorization code request.Type: GrantFiled: August 27, 2018Date of Patent: September 22, 2020Assignee: CANON KABUSHIKI KAISHAInventors: Kazunari Yamanakajima, Hayato Matsugashita
-
Patent number: 10776481Abstract: A method is used in managing passwords. A proposed new password is received. The proposed new password is associated with contextual information indicating a context in which the proposed password is to be used. A machine learning model is dynamically selected from a set of machine learning models based on the contextual information. A quality metric is derived from the proposed new password based on the selected machine learning model.Type: GrantFiled: October 31, 2018Date of Patent: September 15, 2020Assignee: EMC IP Holding Company LLCInventor: Naveen Sunkavally
-
Patent number: 10769599Abstract: A method for conducting monetary and financial transactions in an economy by treating amounts as collections of distinct individual, minimal, and indivisible units of account, each of which has a persistent identity and history throughout its lifecycle. A method is disclosed for conducting monetary transactions on the basis of appending the record of relationship between each individual unit of account and its respective owners throughout the lifecycle of the unit. Further, a method is disclosed for identifying the units in binary computer notation and assigning specific informational content to each unit by designating various sub-sections within the binary identifier of each unit to hold specific information and values relevant to the unit.Type: GrantFiled: May 9, 2016Date of Patent: September 8, 2020Inventor: Vadim Sobolevski
-
Patent number: 10771449Abstract: A method for generating digital certificates for anonymous users in blockchain transactions includes: storing a blockchain comprised of a plurality of blocks, each block including a block header and transaction values, where each transaction value includes data related to a blockchain transaction including a sending address, recipient address, and transaction amount; receiving a certificate request from a computing device, the request including a user public key of a cryptographic key pair; identifying a subset of transaction values in the blockchain where the sending address or recipient address was generated using the user public key; determining a confidence level based on the data included in each transaction value included in the subset; generating a digital certificate based on the determined confidence level; and transmitting the generated digital certificate to the computing device.Type: GrantFiled: December 4, 2017Date of Patent: September 8, 2020Assignee: MASTERCARD INTERNATIONAL INCORPORATEDInventors: Ankur Arora, Manish Kumar, Shuvam Sengupta
-
Patent number: 10761895Abstract: Techniques for resource allocation are described. Some embodiments provide a computing system and method for resource allocation in a virtualized computing environment comprising at least one physical computing system hosting multiple virtual machines, that performs at least some of the described techniques. In one embodiment, a user connection server is configured to receive a request for allocation of a virtual machine, for a user. The user connection server determines an attribute value of the user. Based on the attribute value of the user, allocation of physical computing resources for the virtual machine is determined. A management server is configured to boot the virtual machine for access by the user, the virtual machine booted with the determined allocation of physical computing resources for the virtual machine.Type: GrantFiled: September 26, 2013Date of Patent: September 1, 2020Assignee: VMware, Inc.Inventors: Sudhish Panamthanath Thankappan, Sivaprasad K. Govindankutty, Jubish Kulathumkal Jose
-
Patent number: 10764755Abstract: Security is provided for enterprise local area networks (LANs) by pre-vetting and identifying the security characteristic and actions of any new wireless networks that tries to connect to a secure LAN network. The disclosure herein provides for identification and classification of IEEE 802.11 wireless networks by using monitoring sensor system within and managed by a centralized cloud. The monitoring sensors interrogate the network mimicking the behavior of known platforms, such as an end-user's workstation or mobile device followed by random actions simulating a human person. The response characteristics of the wireless network including the behavior patterns relating to the LAN system and human behavior are collected.Type: GrantFiled: January 22, 2018Date of Patent: September 1, 2020Assignee: 802 Secure, Inc.Inventors: Konrad Grutzmacher, Clifford Fernandez, Michael Raggo, Garry Drummond
-
Patent number: 10757114Abstract: There is provided a method for identifying malicious activity that changes the integrity of data sent out from a vehicle, comprising: intercepting, by an output data monitoring agent that monitors data sent out from the vehicle to an external receiving computing unit using a communication interface in communication with a network; intercepting, by at least one sensor data monitoring agent that monitors sensor data outputted by at least one sensor associated with the vehicle; monitoring the integrity of the data sent out by the vehicle by analyzing the data collected by the output data monitoring agent with the sensor data collected by the at least one sensor data monitoring agent to identify a mismatch; and identifying an indication of malicious activity that changed the data sent out from the vehicle relative to the data sensed by the at least one sensor.Type: GrantFiled: September 18, 2016Date of Patent: August 25, 2020Assignee: HARMAN INTERNATIONAL INDUSTRIES, INCORPORATEDInventors: Guy Ruvio, Saar Yaacov Dickman, Yuval Weisglass, Anuja Sonalker
-
Patent number: 10754975Abstract: A computing system includes: a storage unit configured to store protected personal information of a life profile; and a control unit, coupled to the storage unit, configured to: determine an event indicator for the protected personal information; monitor an event source associated with the protected personal information for the event indicator; determine the occurrence of a life event based on detecting the event indicator from the event source; and generate a life guidance to address the life event for displaying on a device.Type: GrantFiled: October 10, 2016Date of Patent: August 25, 2020Assignee: LifeSite, Inc.Inventors: Christopher Lloyd Wong, Yoon-Jin Chang, Crystal Augustine Lee, Amy Elaine Wong, Barney G. Lee, Joseph Michael Kolba, Daniel Youberg, Eric R. Kisner
-
Patent number: 10749858Abstract: An example device includes a processor coupled to a network and a memory coupled to the processor. The memory includes computer code for causing the processor to establish a secure connection between a manageability application and an interconnect device, the interconnect device being in communication with a newly connected networked device; and securely communicate, from the manageability application to the interconnect device, temporary login information for the networked device.Type: GrantFiled: September 4, 2015Date of Patent: August 18, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Alan Goodrum, Suhas Shivanna, David Koenen, Patrick Schoeller
-
Patent number: 10749784Abstract: A test system for Internet-of-Things (IoT) end-to-end (e2e) testing is provided. The test system comprises a network simulator and a device under test. The device under test is adapted to initiate a communication with the network simulator and to send a Domain Name System (DNS) query and/or a Message Queue Telemetry Transport (MQTT) request to the network simulator. The network simulator is adapted to determine a platform according to which the device under test intends to communicate based on the Domain Name System query and/or the Message Queue Telemetry Transport request.Type: GrantFiled: June 29, 2018Date of Patent: August 18, 2020Assignee: Rohde & Schwarz GmbH & Co. KGInventor: Prabhakaran Ekambaram
-
Patent number: 10740458Abstract: This document discloses a heuristic data analytics method and system for analysing potential information security threats in information security events. In particular, the heuristic data analytics method and system analyses Binary Large Objects (BLOBs) of structured and unstructured information security events at high speed and in real-time to anticipate potential security breaches that will occur in the near future using algorithms and large scale computing systems.Type: GrantFiled: March 24, 2016Date of Patent: August 11, 2020Assignee: Certis Cisco Security Pte LtdInventor: Keng Leng Albert Lim
-
Patent number: 10735403Abstract: Static and dynamic embodiments are presented for generating chaff passwords for use in a password-hardening system. Chaff passwords are generated by modifying portions of base passwords based on a distribution with which particular strings of digits and symbols appear in user passwords. Location oblivious chaff passwords are generated from a chaff set of passwords obtained from a chaff generation method by applying a random permutation over the elements of the obtained chaff set of passwords.Type: GrantFiled: November 1, 2017Date of Patent: August 4, 2020Assignee: EMC IP Holding Company LLCInventors: Nikolaos Triandopoulos, Kevin Bowers, Ari Juels, Ronald Rivest, Guoying Luo
-
Patent number: 10721502Abstract: The present invention proposes a method for transmitting a broadcasting signal. The method for transmitting a broadcasting signal according to the present invention proposes a system capable of supporting a next generation broadcasting service in an environment which supports next generation hybrid broadcasting using a terrestrial broadcasting network and an Internet network. In addition, the present invention proposes an efficient signaling method which can cover both the terrestrial broadcasting network and the Internet network in the environment which supports the next generation hybrid broadcasting.Type: GrantFiled: July 6, 2016Date of Patent: July 21, 2020Assignee: LG ELECTRONICS INC.Inventors: Seungryul Yang, Minsung Kwak, Kyoungsoo Moon, Woosuk Ko, Sungryong Hong
-
Patent number: 10716003Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving, from a computer system, a request comprising a phone number, identifying a primary channel and one or more secondary channels based on, at least in part, respective performance data of the primary and secondary channels, sending a first message comprising a first text string via the primary channel to a destination device associated with the phone number, after sending the first message, determining that a conversion event for the message and the primary channel did not occur within a specified time period, and based on the determining, sending a second message comprising the first text string via a particular secondary channel to the destination device.Type: GrantFiled: June 10, 2019Date of Patent: July 14, 2020Assignee: NEXMO, Inc.Inventors: Thomas Gilles Michel Soulez, Boaz Zehavi, Guillermo Quintero, Aurelien Favre, Jean-Philippe Chernot
-
Patent number: 10713374Abstract: A method for execution by a storage unit of a dispersed storage network includes receiving an access request from a requestor. An access anomaly of the access request is detected, and the access request is queued for processing in response. An anomaly detection indicator is issued to a plurality of other storage units. A secondary authentication process is initiated with the requestor, and a secondary authentication response from the requestor. The access request is processed when the secondary authentication response is favorable.Type: GrantFiled: December 18, 2017Date of Patent: July 14, 2020Assignee: PURE STORAGE, INC.Inventors: Teague S. Algie, Jason K. Resch
-
Patent number: 10705806Abstract: A system is configured to receive a notification that variable information, associated with a variable, is stored in a logical workspace; obtain, in response to the notification, the logical workspace; and generate meta information associated with the variable, where the meta information includes information associated with a temporal attribute of the variable, information associated with an application that generated the variable information, information associated with a contextual attribute of the variable, or information associated with a spatial attribute of the variable. The system is also configured to associate, the meta information with the variable information, where associating the meta information with the variable information permits an operation to be performed on the meta information or on the variable information based on the meta information.Type: GrantFiled: January 9, 2017Date of Patent: July 7, 2020Assignee: The MathWorks, Inc.Inventor: Pieter J. Mosterman
-
Patent number: 10701094Abstract: In various implementations, a security management and control system for monitoring and management of security for cloud services can include automated techniques for identifying the privileged users of a given cloud service. In various examples, the security management and control system can obtain activity logs from the cloud service, where the activity logs record actions performed by users of an organization in using the cloud service. In various examples, the security management and control system can identify actions in the activity logs that are privileged with respect to the cloud service. In these and other examples, the security management and control system can use the actions in the activity log to identify privileged users. Once the privileged users are identified, the security management and control system can monitor the privileged users with a higher degree of scrutiny.Type: GrantFiled: June 18, 2018Date of Patent: June 30, 2020Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Ganesh Kirti, Kamalendu Biswas, Merenne Sumedha Nalin Perera
-
Patent number: 10693875Abstract: This invention provides an authentication center system which enables a user to manage the specific account information of the user's accounts at different service parties centrally in one authentication center.Type: GrantFiled: August 7, 2018Date of Patent: June 23, 2020Inventor: Shaohua Ren
-
Patent number: 10693916Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.Type: GrantFiled: October 30, 2018Date of Patent: June 23, 2020Assignee: SSH Communications Security OYJInventor: Tatu J. Ylonen
-
Patent number: 10691816Abstract: Embodiments for applying host access control rules for application containers by one or more processors. A first set of user identifiers and permissions is extracted from a temporary container and a second set of user identifiers and permissions is extracted from a host on which a working container will reside. The first set and the second set of user identifiers and permissions are combined into an aggregate set of user identifiers and permissions and injected into the working container.Type: GrantFiled: February 24, 2017Date of Patent: June 23, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lior Aronovich, Shibin I. Ma
-
Patent number: 10681755Abstract: A method for operating a communication device is disclosed. One embodiment includes the steps of: generating an intermediary key corresponding to peer to peer (P2P) communication between a client and a counterpart client; transmitting the intermediary key to the counterpart client; obtaining an intermediary path corresponding to the intermediary key; receiving the data through the intermediary path from the client that did not receive an acknowledgement for data transmitted to the counterpart client because of a change of a network address of the counterpart client; and transmitting the data to the counterpart client if the counterpart client accesses the changed network address by using the intermediary key.Type: GrantFiled: June 30, 2016Date of Patent: June 9, 2020Assignee: 2IP CO., LTD.Inventors: Tae Jung Kim, Kwang Hyun Cho
-
Patent number: 10673843Abstract: Provided is an authentication service system and authentication service method. According to embodiments of the present disclosure, when a plurality of authentication processes are performed using different authentication factors, an access token is issued based on an authentication factor used in a previous authentication process; and a subsequent authentication process is performed according to validity of the access token issued in the previous authentication process.Type: GrantFiled: May 29, 2018Date of Patent: June 2, 2020Assignee: SAMSUNG SDS CO., LTD.Inventors: Jae-Hyuk Cho, Hee-Sung Yang, Hyun-Bea Shin, Hyun-chul Park
-
Patent number: 10672010Abstract: A management system includes: an information terminal that reads an information code attached to a management target, the information code storing code identification information that specifies the management target; and a server communicable with the information terminal. The information terminal includes: a reading portion that optically reads display information including the information code; a position information acquisition portion that acquires position information of the information terminal; a terminal-side transmission portion that transmits the position information as reading position information to the server; and a notification portion that notifies predetermined information.Type: GrantFiled: August 4, 2017Date of Patent: June 2, 2020Assignee: DENSO WAVE INCORPORATEDInventors: Kunihiko Ito, Kenichi Yoshida
-
Patent number: 10674335Abstract: The present invention utilizes an application which is loaded onto the mobile devices of attendees who will be attending festivals, concerts, etc, where the large crowds attending the event will create wireless and mobile network congestion. The application will be preloaded with a plurality of presentations which the presenter will utilize during the event to enhance the experience for the attendee. Each presentation will have a triggering mechanism encoded in the app which will initiate the presentation to begin and will synchronize the presentation on the phone with event. In addition to displaying preloaded presentations to the attendees at crowded events, the application can also track the activities of the attendees at the event to see what portions of the events they attended and when, and display real time text messages on the screen of the phone.Type: GrantFiled: October 3, 2019Date of Patent: June 2, 2020Inventor: Glen Wheeler
-
Patent number: 10664585Abstract: Techniques are disclosed relating to a computer system including a first mobile device that stores information that is inaccessible without a value stored on a second mobile device. In some embodiments, the first mobile device stores a plurality of one-time password generation routines executable to generate one-time passwords usable to authenticate user access to an electronic resource, and the second mobile device stores a plurality of supplemental authentication values that correspond to the one-time password generation routines. A particular one-time password generated by the first mobile device using a particular one-time password generation routine is inaccessible without the corresponding particular supplemental authentication value stored on the second mobile device.Type: GrantFiled: April 2, 2018Date of Patent: May 26, 2020Assignee: CA, Inc.Inventors: Piyush Jain, Deepak Verma
-
Patent number: 10659411Abstract: An online system determines a client device associated with a user that is to receive a new notification. The client device presents the notification and receives an input to forward the notification to a different client device and/or a different application. The client device sends a request to the online system to forward the notification. The online system determines a list of available client devices and/or available applications that are able to receive a forwarded version of the notification and provides the list to the client device for selection. Upon receiving a selection, the client device sends the selection to the online system which generates the forward notification that is appropriate for the selected client device and/or selected application. Thus, the online system avoids over-notifying a user, while also enabling the user to consume the content of the notification according to his/her preferences.Type: GrantFiled: April 24, 2019Date of Patent: May 19, 2020Assignee: GOOGLE LLCInventors: Justin Lewis, Gavin James
-
Patent number: 10652241Abstract: Disclosed embodiments relate to systems and methods for dynamically providing coupling between auxiliary computing devices and secure endpoint computing resources. Techniques include identifying a request for an identity to access an endpoint computing resource; obtaining a unique session identifier in response to the request; transmitting the unique session identifier via short-range communications from the endpoint computing resource to an auxiliary computing device associated with the identity; obtaining, in response to the auxiliary computing device transmitting the unique session identifier and the identification data, authentication data sufficient to comply with the authentication requirement of the endpoint computing resource; and dynamically coupling the identity to the endpoint computing resource based on the authentication data and consistent with the authentication requirement.Type: GrantFiled: May 29, 2019Date of Patent: May 12, 2020Assignee: CyberArk Software Ltd.Inventor: Arthur Bendersky
-
Patent number: 10650153Abstract: A document management computer system can validate a user with validation codes sent through a plurality of communication modes. The validated user may be provided with access to a stored electronic document.Type: GrantFiled: January 31, 2017Date of Patent: May 12, 2020Assignee: ENT. SERVICES DEVELOPMENT CORPORATION LPInventor: Mohammed Hussain
-
Patent number: 10645167Abstract: A system and method for improving the security and reliability of industrial control system (ICS) and supervisory control and data acquisition (SCADA) communication networks utilized within power systems is provided. For power system intelligent electronic devices (IEDs) that comprise these networks, a number of settings are created and stored inside the device settings files that define the IED's communication parameters. Inspection of a settings and configuration file (SCF) allows the identification and extraction of the device's configured and therefore permissible communication characteristics. Using this extracted information, rulesets are generated and subsequently pushed to one or more network security devices, e.g. firewalls, managed switches, and intrusion detection/prevention systems. In such a manner, the described innovation is able to derive a perspective of the allowable system communication and issue rulesets and settings to network security devices (NSDs).Type: GrantFiled: November 23, 2016Date of Patent: May 5, 2020Assignee: Cybirical, LLCInventor: Nathan S. Wallace
-
Patent number: 10645075Abstract: A system and method are disclosed in which a new or updated password is tested on other websites before being accepted as a password for a website of a bank. The tested websites may include those of competitor banks or other financial institutions, popular websites, and/or websites frequently used by the customer. If a login at one of the other websites using the new or updated password is successful, the password is not accepted at the bank and the user is asked to create a different password. The new or updated password is discarded after the test of other websites are made and is not saved by the bank.Type: GrantFiled: May 28, 2019Date of Patent: May 5, 2020Assignee: Capital One Services, LLCInventors: Galen Rafferty, Austin Grant Walters, Anh Truong, Reza Farivar, Jeremy Edward Goodsitt, Vincent Pham
-
Patent number: 10623501Abstract: Techniques are disclosed for providing users of an access management system the capability to manage the user's active sessions. The system may receive a first request by a user at a first device to modify one or more sessions established for the user. The system may access session information about the one or more sessions that are associated with the user, wherein a session of the one or more sessions provides the user with access to one or more resources. The system may send the session information to the first device, the session information causing the first device to display a graphical interface including the session information about the one or more sessions. The system may receive, from the first device, a second request indicating a modification to the session. The system may modify the session in accordance with the modification indicated in the second request.Type: GrantFiled: November 18, 2016Date of Patent: April 14, 2020Assignee: Oracle International CorporationInventors: Stephen Mathew, Ramya Kukehalli Subramanya, Aarathi Balakrishnan
-
Patent number: 10623442Abstract: A network surveillance method to detect attackers, including planting one or more honeytokens in one or more resources in a network of computers in which users access the resources in the network based on credentials, wherein a honeytoken is an object in memory or storage of a first resource that may be used by an attacker to access a second resource using decoy credentials, including planting a first honeytoken in a first resource, R1, used to access a second resource, R2, using first decoy credentials, and planting a second honeytoken in R1, used to access a third resource, R3, using second decoy credentials, and alerting that an attacker is intruding the network only in response to both (i) an attempt to access R2 using the first decoy credentials, and (ii) a subsequent attempt to access R3 using the second decoy credentials.Type: GrantFiled: April 2, 2018Date of Patent: April 14, 2020Assignee: ILLUSIVE NETWORKS LTD.Inventors: Shlomo Touboul, Hanan Levin, Stephane Roubach, Assaf Mischari, Itai Ben David, Itay Avraham, Adi Ozer, Chen Kazaz, Ofer Israeli, Olga Vingurt, Liad Gareh, Israel Grimberg, Cobby Cohen, Sharon Sultan, Matan Kubovsky
-
Patent number: 10623497Abstract: The application is directed to a computer-implemented method and apparatus for provisioning an Internet of Things (IoT) device on an IoT network. The application is also directed to a method for managing access to functionality of an IoT device in a networked group.Type: GrantFiled: October 11, 2016Date of Patent: April 14, 2020Assignee: Microsoft Technology Licensing, LLCInventors: David G. Thaler, Justin Allen Hutchings, Kevin M. Kane, Daniel Stelian Mihai, Arvind R. Padole, Pawel R. Winogrodzki, Greg M. Zaverucha
-
Patent number: 10616198Abstract: Embodiments of the invention generally relate to apparatus, systems and methods for authenticating an entity for computer and/or network security and for selectively granting access privileges and providing other services in response to such authentications.Type: GrantFiled: August 19, 2016Date of Patent: April 7, 2020Assignee: UNIVERSAL SECURE REGISTRY, LLCInventor: Kenneth P. Weiss
-
Patent number: 10614208Abstract: A device determines that a data breach of an application has been reported and determines that an individual has an account with the application based on identifying an association between an application identifier and a username the individual uses to access the application. The device receives, from a user device associated with the individual, password information used to access the application. The device uses the password information and usernames for a group of applications with which the individual has accounts to perform a login procedure for the group of applications to determine that login information for one or more of the applications includes the password information used to access the application affected by the data breach. The device provides, to the user device or another device, a recommendation to change the password information used to access the application and the one or more applications.Type: GrantFiled: February 21, 2019Date of Patent: April 7, 2020Assignee: Capital One Services, LLCInventors: Joshua Edwards, Michael Mossoba, Ljubica Chatman, Jason Ji, Carlos Rodriguez