Patents Examined by Amir Mehrmanesh
  • Patent number: 10691830
    Abstract: Systems and methods for preserving privacy in distribution of content using private tokens in accordance with embodiments of the invention are disclosed. In one embodiment, a method of anonymously tracking a digital content and remediating unauthorized distribution includes generating a private token including an identifier distinguishable from tokens generated by other playback devices and the association with the playback device is not shared, receiving a portion of content, embedding a digital watermark in the content, where the digital watermark includes the private token, detecting an unauthorized copy of the content, extracting the digital watermark from the unauthorized copy of the content, broadcasting an enforcement message containing the private token to the playback devices, receiving the enforcement message, and performing an enforcement action on the playback device in response, where only a playback device that generated the private token responds.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: June 23, 2020
    Assignee: Verimatrix, Inc.
    Inventors: Thomas A. Munro, Niels J. Thorwirth
  • Patent number: 10687203
    Abstract: A control circuit to achieve irretrievable erasure of data in a mobile phone comprises a control unit, a SIM unit and a memory unit. The SIM unit is coupled with the control unit and the memory unit. The control unit can provides a delete signal to totally delete data of the memory by the SIM unit.
    Type: Grant
    Filed: April 3, 2018
    Date of Patent: June 16, 2020
    Assignees: Fu Tai Hua Industry (Shenzhen) Co., Ltd., HON HAI PRECISION INDUSTRY CO., LTD.
    Inventor: Xiao-Bin Liu
  • Patent number: 10685104
    Abstract: A communication apparatus includes a first execution unit, a second execution unit, and a selecting unit. The first execution unit performs a first process for setting a wireless parameter, based on information obtained from a captured image. The setting of a wireless parameter is performed between the communication apparatus and another communication apparatus that operates as an access point and that is different from the communication apparatus. The second execution unit performs, based on information obtained from a captured image, a second process for setting a wireless parameter to another communication apparatus that operates as a station and that is different from the communication apparatus. The wireless parameter is one for performing wireless communication with an access point. The selecting unit selects whether the first process or the second process is to be performed, in a case where information is obtained from a first captured image.
    Type: Grant
    Filed: January 15, 2016
    Date of Patent: June 16, 2020
    Assignee: Canon Kabushiki Kaisha
    Inventor: Tatsuhiko Sakai
  • Patent number: 10686784
    Abstract: Computerized apparatus useful within vehicles for causing provision of location-based services to users via a portable wireless computerized device. In one embodiment, the vehicle comprises a global positioning system (GPS) based receiver capable of providing location data to the computerized apparatus.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: June 16, 2020
    Assignee: WEST VIEW RESEARCH, LLC
    Inventors: Mark J. Gazdzinski, Robert F. Gazdzinski
  • Patent number: 10680825
    Abstract: A method for preventing counterfeiting of an object (e.g. paper) is described. The method comprises capturing an image of at least a portion of the object, wherein the portion of the object whose image is captured is at least partially transparent, and wherein the captured image includes features of the internal structure of the object (e.g. the texture of the paper resulting from the arrangement of fibres from which the paper is made). The method further comprises generating, based on the image, a code that encodes features of the internal structure of the object, and recording the code. Generating the code may comprise applying a filter to the image to obtain a filtered image, and processing the filtered image to obtain a binary code. The filter may be a Gabor filter, and processing the filtered image may comprise applying a Gray code to the filtered image. The method may further comprise encrypting the binary code, and recording the code may comprise recording the encrypted binary code.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: June 9, 2020
    Assignee: UNIVERSITY OF NEWCASTLE UPON TYNE
    Inventors: Feng Hao, Ehsan Toreini, Siamak F. Shahandashti
  • Patent number: 10681065
    Abstract: The Kentik Data Engine (KDE) is an integrated real-time, big data software system able to analyze what exactly is happening on a network at the present moment, and what happened on the network over the a prior period of time. KDE collects live operational data from computer network infrastructure devices (routers and switches) and computer hosts, consisting of multiple data types, categories, and protocols, and correlates them to analyze network activity and health. KDE does this in a lossless manner, meaning that it retains all raw data rather than summarizing or aggregating prior to storage. In this way, KDE provides a combination of precise, actionable information in real-time as well as a complete forensic data store for detailed exploratory analysis.
    Type: Grant
    Filed: February 13, 2018
    Date of Patent: June 9, 2020
    Assignee: Kentik Technologies, Inc.
    Inventors: Avraham Tzur Freedman, Ian Gerald Pye, Daniel P. Ellis, Ian Applegate
  • Patent number: 10652283
    Abstract: Techniques for deriving system architecture from security group relationships are described. One or more security group rules can be obtained for an application, the one or more security group rules controlling communication of one or more security groups. The one or more security group rules can be analyzed to determine placement data for the one or more security groups. The placement data can be provided to a placement service, and the placement service can be caused to deploy at least one virtual machine using the placement data.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: May 12, 2020
    Assignee: Amazon Technologies, Inc.
    Inventor: Elaine Harvey
  • Patent number: 10652013
    Abstract: A system, and methods, for transmitting quantum states between a first node and a second node, or among more than two nodes. Each node is characterized by an instantaneous spatial position, and the instantaneous spatial position of the second node is repositionable within a frame of reference associated with the first node. A hovering drone is adapted either for running a quantum key transmission protocol in secure communication with the first node, and/or for running a quantum key reception protocol in secure communication with the second node. Either drone may serve as a relay of optical data between a base station and another drone. Secure communication among more than two nodes may be reconfigured.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: May 12, 2020
    Assignees: The Board of Trustees of the University of Illinois, Duke University
    Inventors: Paul G. Kwiat, Daniel J. Gauthier
  • Patent number: 10650135
    Abstract: The present application provides an authorization method for a joint account, applied to client software. The joint account is jointly managed by N joint managers, N is a natural number greater than 1. In one example, a user-side authentication parameter of a joint account is obtained. The user-side authentication parameter is the same as or corresponds to a network-side authentication parameter of the joint account, wherein the user-side authentication parameter is used to perform authentication on operation permissions for the joint account. The obtained user-side authentication parameter is divided into N parts. N joint management authentication parameters are generated based on each of the N parts. Each of the N joint management authentication parameters are transmitted to a different client device associated with each joint manager.
    Type: Grant
    Filed: August 31, 2018
    Date of Patent: May 12, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Kaiyao Luo
  • Patent number: 10643001
    Abstract: Embodiments of the invention are directed to methods, systems and devices for providing sensitive user data to a mobile device using an encryption key. For example, a mobile application on a mobile device may receive encrypted sensitive user data from a mobile application server, where the user sensitive data is encrypted with a key from a token server computer. The mobile application may then request that the encrypted payment information be sent to the token server. The mobile device may then receive a payment token associated with the payment information from the token server.
    Type: Grant
    Filed: February 25, 2019
    Date of Patent: May 5, 2020
    Assignee: Visa International Service Association
    Inventors: Abhishek Guglani, Sanjeev Sharma, Jalpesh Chitalia, Gerald Destremps, Upendra Mardikar, Minghua Xu, Jose Luis Rios Trevino, Brijendra Singh
  • Patent number: 10638311
    Abstract: Embodiments of the present disclosure disclose a secure communication method for a mobile terminal and a mobile terminal. The secure communication method may include: when a wireless communication connection is established between the mobile terminal and another mobile terminal, and the wireless communication connection meets a preset security processing trigger condition, prohibiting, by means of setting, a program in a common virtual kernel from accessing a shared memory between a secure virtual kernel and the common virtual kernel and accessing a peripheral that needs to be called for the wireless communication connection; performing, by using the secure virtual kernel, preset policy-based processing on communication content corresponding to the wireless communication connection; and outputting, by using the secure virtual kernel, communication content obtained by performing the preset policy-based processing.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: April 28, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Wenhao Li, Yubin Xia, Haibo Chen
  • Patent number: 10630651
    Abstract: A vehicle system is provided that performs authentication with a plurality of terminals. The system includes a server that generates a first token and transmits the first token to a first terminal. The first terminal stores the first token and a vehicle verifies the first token using a first encryption key and a first authentication key stored in advance for the first token. A second terminal receives the first token and a second token from the first terminal to be delegated with an authority. The second terminal stores the first token and the second token, and the vehicle verifies the first token stored in the second terminal using the first encryption key and the first authentication key, and verifies the second token stored in the second terminal using a second encryption key and a second authentication key stored in advance for the second token.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: April 21, 2020
    Assignees: Hyundai Motor Company, Kia Motors Corporation, Postech Academy-Industry Foundation
    Inventors: Kyuhwan Chin, Minkyoung Kim, Youngsup Oh, Chanik Park, Jaebok Shin
  • Patent number: 10623425
    Abstract: A method and system for detecting domain name system (DNS) recursive cyber-attacks are presented. The system includes learning a plurality of baselines of at least rates and rate invariants of DNS features; monitoring DNS traffic directed to and from a DNS resolver, wherein the DNS resolver is communicatively connected between at least one client and at least one name server; analyzing the monitored DNS traffic using at least one detection function to detect an anomaly based in part on at least one baseline of the plurality of learnt baselines; and upon detection of at least one anomaly, performing at least one mitigation action to filter out incoming DNS queries to a domain name under attack.
    Type: Grant
    Filed: June 1, 2017
    Date of Patent: April 14, 2020
    Assignee: RADWARE, LTD.
    Inventors: Sharon Shitrit-Efergan, Eyal Rundstein
  • Patent number: 10616209
    Abstract: Various approaches discussed herein enable validation of an application on a computing device, such as a mobile computing device, prior to that application being invoked by activation of a link in another application. Upon activation of the link in a calling application, the computing device determines a target application to be invoked in response to the activation. Sensitive or confidential data, such as login credentials, may be included in the link to be passed to the target application. By validating either the calling or the target application, the data may be safeguarded by confirming an identity of an application associated with the link.
    Type: Grant
    Filed: November 14, 2018
    Date of Patent: April 7, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Muhammad Wasiq, Aleksandrs J. Rudzitis, Nima Sharifi Mehr
  • Patent number: 10609069
    Abstract: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.
    Type: Grant
    Filed: February 23, 2018
    Date of Patent: March 31, 2020
    Assignee: Bank of America Corporation
    Inventors: Michael Ogrinz, David Hsiang, John C. Checco
  • Patent number: 10599859
    Abstract: Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a computer includes a main motherboard card coupled to all input/output devices connected to the computer, and a trusted operating system operates on the main motherboard which includes an access control module for controlling access to the protected data in accordance with rules. The trusted operating system stores the protected data in an unprotected form only on the memory devices on the main motherboard. The computer may also have a computer card coupled to the main motherboard via a PCI bus, on which is operating a guest operating system session for handling requests for data from software applications on the computer.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: March 24, 2020
    Assignee: INTELLECTUAL VENTURES II LLC
    Inventors: Daniel Joseph Sturtevant, Christopher Lalancette, Michael Nathan Lack, Paul B. Schneck
  • Patent number: 10594671
    Abstract: Methods and systems for account authentication in a distributed computing node group may involve sending a message to a member, the message having a first timestamp, increasing an authentication failure count, receiving a first key-exchange message from the member, the first key-exchange message having a second timestamp, evaluating the second timestamp, and determining whether to ignore the first key-exchange message based on an evaluation of the second timestamp. The first timestamp may be associated with a message received from the member prior to sending the message with the first timestamp to the member. The first key-exchange message may include a value computed by the member based on a group passcode shared with the member. The evaluation of the second timestamp may be based on at least one of a default value, the authentication failure count, or a timestamp associated with the group passcode.
    Type: Grant
    Filed: February 8, 2018
    Date of Patent: March 17, 2020
    Assignee: Dell Products L.P.
    Inventors: Yee Ja, Marshal F. Savage, Cyril Jose
  • Patent number: 10587644
    Abstract: A method of monitoring tasks for reducing security risks in a computer system comprising a plurality of computers executing a plurality of applications is provided. The method based on a set of login information, displays a set of risks for a set of applications that execute on the plurality of computers and an identification of a person in a hierarchy supervised by the logged-in person assigned to mitigate each risk. The method also displays the current status of each assigned mitigation.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: March 10, 2020
    Assignee: CA, Inc.
    Inventors: Ryan G. Stolte, Firas S. Rifai, Humphrey Christian, Joseph Anthony DeRobertis, Shmuel Yehonatan Green
  • Patent number: 10585519
    Abstract: During a touch operation for setting authentication information, authentication information is generated based on data input in accordance with a touch position of a touch operation performed on a touch panel and touch pressure applied to the touch panel by the touch operation. At the time of accepting a touch operation for unlocking an information processing apparatus, a combination of data input in accordance with a touch position of a touch operation performed on a touch panel and touch pressure applied to the touch panel by the touch operation are compared with authentication information. When a result of the comparison is a match, the information processing apparatus is unlocked and execution of various functions is allowed.
    Type: Grant
    Filed: April 11, 2017
    Date of Patent: March 10, 2020
    Assignee: Canon Kabushiki Kaisha
    Inventor: Hidenobu Akiyoshi
  • Patent number: 10581883
    Abstract: In an embodiment, a computer system comprises one or more computer processors configured with a message transfer application; a message transfer/vision processing (MT/VP) interface coupled to the one or more computer processors and interposed between the message transfer application and a vision processing computer, wherein the MT/VP interface performs operations comprising: extracting risk indicator data from a message that is in transit to a recipient computer on a computer network; in response to the risk indicator data matching a message risk criterion, transmitting an image address for an image of interest coupled to the message or the image of interest to the vision processing computer; receiving, from the vision processing computer, a label that semantically describes visual content of the image of interest; using the label, querying a set of correlation data to determine a reference address that is associated with the label; in response to the image address matching the reference address, transmitting
    Type: Grant
    Filed: May 1, 2018
    Date of Patent: March 3, 2020
    Assignee: AREA 1 SECURITY, INC.
    Inventors: Philip Syme, Michael Flester, Umalatha Batchu, Rajiv Jain