Patents Examined by Alexander Lapian
  • Patent number: 9344417
    Abstract: An authenticating method including establishing trust between an authentication provider and service provider; establishing trust between the authentication provider and authentication application installed in a terminal. The authentication provider, for each session, receives an access code request and connection information from the terminal; generates and stores the access code; sends the access code to the terminal; receives the access code from the authentication application; indicates verification of the access code to the authentication application and terminal; receives from the authentication application a request to grant access to the terminal; instructs the service provider to grant access; and sends a confirmation of the granted access to the terminal. An authenticated session between the terminal and the service provider is setup for providing services to the terminal.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: May 17, 2016
    Assignee: MEONTRUST INC.
    Inventors: Markku Mehtälä, Teemu Mikkonen, Janne-Petteri Parkkila, Harri Salminen
  • Patent number: 9317680
    Abstract: A method and system for protecting against unknown malicious activities by determining a reputation of a link are disclosed. A reputation server queries a database including reputation information associated with a plurality of links to retrieve a reputation of a redirected link. The reputation information may indicate whether the links are associated with a malicious activity. The reputation of the redirected link may be associated with the original link to create a reputation of the original link.
    Type: Grant
    Filed: October 20, 2010
    Date of Patent: April 19, 2016
    Assignee: McAfee, Inc.
    Inventors: Russell Bertrand Carter, III, Pravat Kumar Lall, Geoff Oitment, Davoud Maha, Javed Hasan
  • Patent number: 9306956
    Abstract: Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user.
    Type: Grant
    Filed: May 21, 2015
    Date of Patent: April 5, 2016
    Assignee: GLOBALFOUNDRIES Inc.
    Inventors: Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar, Matthew B. Trevathan
  • Patent number: 9298912
    Abstract: Recording, analyzing and categorizing of user interface input via touchpad, touch screens or any device that can synthesize gestures from touch and pressure into input events. Such as, but not limited to, smart phones, touch pads and tablets. Humans may generate the input. The analysis of data may include statistical profiling of individual users as well as groups of users, the profiles can be stored in, but not limited to data containers such as files, secure storage, smart cards, databases, off device, in the cloud etc. A profile may be built from user/users behavior categorized into quantified types of behavior and/or gestures. The profile might be stored anonymized. The analysis may take place in real time or as post processing. Profiles can be compared against each other by all the types of quantified behaviors or by a select few.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: March 29, 2016
    Assignee: Behaviometrics AB
    Inventors: Neil Costigan, Ingo Deutschmann, Tony Libell, Johan Lindholm, Peder Nordström
  • Patent number: 9130934
    Abstract: A service controller includes a network interface for coupling to a local area network of a hospitality establishment, and one or more processors coupled to the network interface. The one or more processors are configured to detect a device identifier of a user device on a local area network of a hospitality establishment, determine whether a guest of the hospitality establishment is associated with the device identifier, and automatically activate a service for the user device at the hospitality establishment in response to detecting the device identifier on the local area network when a guest of the hospitality establishment is determined to be associated with the device identifier.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: September 8, 2015
    Assignee: Guest Tek Interactive Entertainment Ltd.
    Inventors: Peter S. Warrick, Joshua M. Wookey, David T. Ong, Ian S. McBeth, Darren T. Ziebart, Andrew T. MacMillan
  • Patent number: 9083535
    Abstract: A method for providing efficient management of certificate revocation may comprise storing a list of identifiers of digital certificates including a revocation list defining a list of revoked certificates in an accumulator, storing a witness value in association with at least some entries in the revocation list in which the witness value provides proof of the membership or non-membership of an identifier in the revocation list, enabling generation of a new accumulator and a new witness value responsive to each insertion or deletion of an entry in the revocation list, and enabling batch updates to the revocation list using a reduced bitlength value generated based on to a ratio of a value generated based on elements added to the revocation list to a value generated based on elements deleted from the revocation list. A corresponding apparatus is also provided.
    Type: Grant
    Filed: November 5, 2010
    Date of Patent: July 14, 2015
    Assignee: Nokia Corporation
    Inventors: Atefeh Mashatan, Imad Aad, Rafik Chaabouni, Pentti Valtteri Niemi, Serge Vaudenay
  • Patent number: 9069955
    Abstract: Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user.
    Type: Grant
    Filed: April 30, 2013
    Date of Patent: June 30, 2015
    Assignee: International Business Machines Corporation
    Inventors: Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar, Matthew B. Trevathan
  • Patent number: 9055436
    Abstract: A transmitting device, a receiving device, a wireless communication system and a method for controlling the wireless communication system are used for creating a secure wireless communication network of a limited area. The transmitting device comprises: one or more transmitters configured to transmit wireless signals, and create the limited area by a coverage scope of the wireless signals; a cryptography key generating unit configured to generate a cryptography key for the wireless signals; a cryptography key encoding unit configured to encode the cryptography key to a cryptography key frame; and a cryptography key scheduling unit configured to schedule the cryptography key frame so as to control the transmitter to transmit the wireless signals including the cryptography key frame.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: June 9, 2015
    Assignee: RICOH COMPANY, LTD.
    Inventors: Yan Sun, Wei Wang, Haihua Yu, Bin Da