Patents Examined by Amare F Tabor
  • Patent number: 10673867
    Abstract: A system featuring a cloud-based malware detection system for analyzing an object to determine whether the object is associated with a cyber-attack. Herein, subscription review service comprises a data store storing subscription information. The subscription information includes identifier for the customer and one or more identifiers each associated with a corresponding customer submitter operable to submit an object to the cloud-based malware detection system for analysis. The first customer submitter receives credentials provided by the subscription review service to establish communications with the cloud-based malware detection system.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: June 2, 2020
    Assignee: FireEye, Inc.
    Inventors: Mumtaz Siddiqui, Manju Radhakrishnan
  • Patent number: 10666670
    Abstract: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: May 26, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jeffrey R. Hoy, Agueda M. H. Magro
  • Patent number: 10659830
    Abstract: A method, system, mobile device, apparatus and computer program product are provided for accurately determining whether one or more rights objects associated with a mobile device are valid. In particular, a secure time source (e.g., DRM clock or time) may be maintained by the mobile device and used to check the validity of the one or more rights objects. In order to ensure that the secure time source or clock remains accurate, the mobile device may update the secure time source by regularly requesting and receiving the DVB-H network time from a DVB-H network entity. Because the DVB-H network time is secure, accurate and readily accessible, it provides an ideal tool for correcting possible drift in the mobile device's secure time source.
    Type: Grant
    Filed: April 10, 2019
    Date of Patent: May 19, 2020
    Assignee: Conversant Wireless Licensing S.a.r.l.
    Inventors: Tero Reinikainen, Henri Hämäläinen, Arto Kiiskinen
  • Patent number: 10659437
    Abstract: A circuit arrangement includes an encryption circuit and a decryption circuit. A cryptographic shell circuit has a transmit channel and a receive channel in parallel with the transmit channel. The transmit channel includes an encryption interface circuit coupled to the encryption circuit. The encryption interface circuit determines first cryptographic parameters based on data in a plaintext input packet and inputs the first cryptographic parameters and plaintext input packet to the encryption circuit. The receive channel includes a decryption interface circuit coupled to the decryption circuit. The decryption interface circuit determines second cryptographic parameters based on data in a ciphertext input packet and inputs the second cryptographic parameters and ciphertext input packet to the decryption circuit.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: May 19, 2020
    Assignee: Xilinx, Inc.
    Inventors: Ravi Sunkavalli, Anujan Varma, Chuan Cheng Pan, Patrick C. McCarthy, Hanh Hoang
  • Patent number: 10659487
    Abstract: The present disclosure describes a system that notifies users regarding specific user decisions with respect to solution phishing emails. The system notifies users when users perform specific actions with respect to the untrusted phishing emails. The system pauses execution of these actions and prompts the user to confirm whether to take the actions or to revert back to review the actions. In contrast from anti-ransomware technologies which are entirely in control, the system gives the user autonomy in deciding actions relating to untrusted phishing emails. The system interrupts execution of actions related to untrusted phishing emails in order to give users a choice on whether to proceed with actions.
    Type: Grant
    Filed: July 19, 2019
    Date of Patent: May 19, 2020
    Assignee: KnowBe4, Inc.
    Inventors: Bret Lowry, Gauvin Repuspolo, Greg Kras
  • Patent number: 10623437
    Abstract: A method for protecting a mobile terminal device from cyber security threats, including the steps of: detecting that the mobile terminal device is successfully connected only through one or both of a selected physical serial interface connected to a device for facilitating the testing or a wired network interface, which is connected to an electrical utility device. Prior to executing a test routine by the mobile terminal device, switching the mobile terminal device to a test state by: disabling an internal firewall, disabling one or more remaining network interfaces and serial interfaces, such that existing communications or connections are terminated and new communications and connections are prevented. Enabling communication to one or both of the selected physical serial interface and the wired network interface, performing the testing on the at least one electrical utility device according to the executed test routines under control of the mobile terminal device until completion.
    Type: Grant
    Filed: March 29, 2017
    Date of Patent: April 14, 2020
    Assignee: DOBLE ENGINEERING COMPANY
    Inventor: Jason Alexander Allison
  • Patent number: 10615960
    Abstract: Implementations of the present disclosure include receiving, by a consensus node from a first account, a digitally signed copy of a commitment value of a transaction amount, a second random number encrypted using a public key of the first account, a third random number encrypted using a public key of the second account, one or more range proofs, and a set of values generated based on one or more selected random numbers. The consensus node then verifies a digital signature corresponding to the digitally signed copy using a public key of the first account corresponding to a private key used to generate the digital signature. It also updates the balance of the first account and a balance of the second account based on the amount of the balance transfer if the first random number, the second random number, and the third random number are the same.
    Type: Grant
    Filed: April 22, 2019
    Date of Patent: April 7, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Wenbin Zhang, Baoli Ma
  • Patent number: 10609031
    Abstract: Mechanisms are provided for providing a private consolidated cloud service architecture. The mechanisms operate to implement a private consolidated cloud service (PCCS) engine. The PCCS engine generates a private consolidated cloud (PCC) for a consumer based on one or more PCC characteristics specified by a request from the consumer. The PCCS engine also generates, in the PCC, for each of a plurality of public cloud services, a private instance of the public cloud service in the PCC. The PCC receives, from a consumer device, a request for processing of consumer private data by a specified private instance of a public cloud service in the PCC. The private instance of the public cloud service in the PCC performs the requested processing of consumer private data within the PCC without exposing the consumer private data outside the PCC. The PCC provides results of the requested processing to one of the consumer device or the public cloud service.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: March 31, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Joanna W. Ng
  • Patent number: 10609025
    Abstract: Present disclosure relates to a system for providing a simulated environment and a method thereof. The system comprises a wearable device and a computing unit. The wearable device is configured to output a scenario of the simulated environment and to obtain a biometric characteristic. The computing unit is configured to determine a permission level according to the biometric characteristic, and to determine whether to conceal at least one portion of a virtual object which is being displayed in the scenario according to the permission level.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: March 31, 2020
    Assignee: HTC Corporation
    Inventors: Hsin-Hao Lee, Ching-Hao Lee
  • Patent number: 10602557
    Abstract: Methods and apparatus are disclosed for device discovery, pairing, and transmission of audio and video media, using two or more communication paths between a media sender/source node and a media receiver/sink node. In one example of the disclosed technology, a method performed with a sink node adapted to receive data via a peer-to-peer communication and a different, second communication path, includes selecting at least a portion of a second communication path to the sink node, determining whether the second communication path is secure, and, if the second communication path is determined to be secure, then accepting connections via the second communication path.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: March 24, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Drew Baron, Vishal Mhatre, Gianluigi Nusca, Christian Huitema
  • Patent number: 10594687
    Abstract: A system including: at least one processor; and at least one memory, having stored thereon computer program code that, when executed by the at least one processor, controls the at least one processor to: receive a first sequence of values; segment the first sequence of values into a first subsequence having a first length and a second subsequence having a second length; modify the first subsequence by inserting one or more values into the first subsequence to create a modified first subsequence of a third length; modify the second subsequence by one or more inserting values into the second subsequence to create a modified second subsequence of the third length; combine the modified first subsequence and the modified second subsequence to create a second sequence of values; and output the second sequence of values.
    Type: Grant
    Filed: May 8, 2019
    Date of Patent: March 17, 2020
    Assignee: KARA PARTNERS LLC
    Inventors: Brian Penny, Desmond Penny
  • Patent number: 10579820
    Abstract: A system and method for a privacy mode are disclosed. A trusted execution environment and general operating system that has restricted access to the trusted execution environment are maintained on a processor. A privacy mode command indicating either one of a first value and a second value is received. A peripheral control interface, which is communicatively coupled to the trusted execution environment and otherwise communicatively isolated from the general operating system, is disabled when the privacy mode enable indicator has the first value and is enabled when the privacy mode enable indicator has the second value. An associated peripheral is disabled from providing signals to processing circuits when the peripheral control interface is in the disabled state and enabled to provide signals to processing circuits when the peripheral control interface is in the enabled state.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: March 3, 2020
    Assignee: BlackBerry Limited
    Inventors: Neil Patrick Adams, Steven Wellington, Roger Paul Bowman
  • Patent number: 10579932
    Abstract: A computing system may operate in a first mode during which it calculates a set of training metrics on a running basis as a stream of multivariate data points originating from a data source is being received. While operating in the first mode, the computing system may determine that the set of training metrics has reached a threshold level of stability. In response, the computing system may transition to a second mode during which its extracts a model object and calculates a set of model parameters for an anomaly detection model. While operating in the second mode, the computing system may determine that the set of model parameters has reached a threshold level of stability. In response, the computing system may transition to a third mode during which it uses the anomaly detection model to monitor for anomalies in the stream of multivariate data points originating from the data source.
    Type: Grant
    Filed: July 10, 2018
    Date of Patent: March 3, 2020
    Assignee: Uptake Technologies, Inc.
    Inventor: Michael Cantrell
  • Patent number: 10567961
    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for electroencephalogram patterning recognition for user authentication into one or more physical or digital locations. In this way, the system may generate a spectral analysis baseline electroencephalogram reading for a user that can be segmented and analyzed based on a specific time span associated with a known stimulus or event, and diagnostic applications generally focus on either event-related potentials or the like. Upon initiating a request to enter a location requiring authentication, an electroencephalogram reading may be generated and patterned after the baseline electroencephalogram reading for the user. The system may perform patterned recognition of the readings and provide an authentication confidence of the user for authentication into the location.
    Type: Grant
    Filed: November 2, 2017
    Date of Patent: February 18, 2020
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Joseph Benjamin Castinado, Charles Russell Kendall
  • Patent number: 10558802
    Abstract: Systems and methods for actively securing data storage devices utilize the technique of storage virtualization. In embodiments, would-be cyberattackers are presented with many possible “ports” or “channels” by which to communicate over a network with a data storage device. Unknown to the attacker, at any given time, only one of these ports or channels is the “correct,” or “active,” port; all of the other ports are dummies that do not permit communication with the storage device. The active port is dynamically, randomly, and/or continually reconfigured, seriously impeding the ability of the attacker to access the data storage device through the active port.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: February 11, 2020
    Assignee: NexiTech, Inc.
    Inventor: Donald E. Matthews
  • Patent number: 10560260
    Abstract: Values and a sequence of operations associated with generating a key may be received. A determination may be made as to whether the sequence of operations associated with the key matches an authorized sequence of operations. The key may be outputted when the received sequence of operations matches the authorized sequence of operations and the key may not be outputted when the received sequence of operations does not match the authorized sequence of operations.
    Type: Grant
    Filed: February 22, 2019
    Date of Patent: February 11, 2020
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventors: Megan Anneke Wachs, Ambuj Kumar, Benjamin Che-Ming Jun
  • Patent number: 10558589
    Abstract: Techniques are disclosed concerning secure access to data in a computing device. In one embodiment, a computing device includes a communication interface, a memory, a memory controller, and a security processor. The communication interface may communicate with a different computing device. The security processor may generate a host key in response to a successful authentication of the different computing device, and then encrypt a memory key using the host key. The security processor may also send the encrypted memory key to the memory controller, and send the host key to the different computing device. The host key may be included by the different computing device in a subsequent memory request to access data in the memory. The memory controller may, in response to the subsequent memory request, use the included host key to decrypt the encrypted memory key and use the decrypted memory key to access the data.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: February 11, 2020
    Assignee: Apple Inc.
    Inventors: Josh P. de Cesare, Wade Benson, Fabrice L. Gautier, Kaiehu Kaahaaina
  • Patent number: 10554400
    Abstract: The present invention provides a method and a system for generating a multi-factor authentication code. The method comprises steps of generating a plurality of random numbers that are completely random; arranging the plurality of random numbers into a combination in a time-series or a random way; dividing the combination into a plurality of sub-combinations; transmitting each of the plurality of sub-combinations to one of corresponding plurality of interfaces respectively via one path according to a distributing rule; combining the plurality of sub-combinations received by the plurality of interfaces to form the multi-factor authentication code according to a combining rule. And the system comprises a processor being programmed to function as: a random number generator, an arranging unit, a dividing unit, a transmitting unit, and a combining unit.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: February 4, 2020
    Inventor: Cheng-Han Ko
  • Patent number: 10552607
    Abstract: Systems and methods for actively securing data storage devices utilize the technique of storage virtualization. In embodiments, would-be cyberattackers are presented with many possible “ports” or “channels” by which to communicate over a network with a data storage device. Unknown to the attacker, at any given time, only one of these ports or channels is the “correct,” or “active,” port; all of the other ports are dummies that do not permit communication with the storage device. The active port is dynamically, randomly, and/or continually reconfigured, seriously impeding the ability of the attacker to access the data storage device through the active port.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: February 4, 2020
    Assignee: NexiTech, Inc.
    Inventor: Donald E. Matthews
  • Patent number: 10554525
    Abstract: Systems and methods for tracking computing resources are provided. Aspects include receiving, by a workload manager, a workload, wherein the workload is executable on a customer machine, and wherein the customer machine comprises a plurality of computing resources. The workload is analyzed to determine a workload profile. A token associated with the workload is received and associated with the workload profile. The token is authenticated and the workload is executed based at least in part on authentication of the token.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: February 4, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert Abrams, Donald W. Schmidt, Andrew M. Sica, Horst Sinram