Patents Examined by Anthony Fabbri
  • Patent number: 9632969
    Abstract: Systems and methods for managing a wireless connection between a computing device and a peripheral module are provided. In some aspects, a computer-implemented method includes detecting a mechanical coupling between the peripheral module and the computing device. The method also includes identifying a first function of the mechanically coupled peripheral module, and comparing the first function to a preapproved function. The method also includes managing the wireless connection between the peripheral module and the computing device based on the comparison of the first function to the preapproved function.
    Type: Grant
    Filed: August 7, 2012
    Date of Patent: April 25, 2017
    Assignee: Google Inc.
    Inventors: Neil Hendin, Ajay Chandra Venkata Gummalla, Trond Thomas Wuellner
  • Patent number: 9630104
    Abstract: Virtual world content is transmitted from at least one server to at least one client computer by defining a camera position on the client computer and projecting a geometrical shape from the camera position in the direction of a viewing vector. This geometrical shape defines a subsection of the virtual world content, which is then transmitted to the particular client, where it is maintained within a content cache.
    Type: Grant
    Filed: October 21, 2007
    Date of Patent: April 25, 2017
    Inventor: Konrad V. Sherinian
  • Patent number: 9628576
    Abstract: A system and method for suggesting to a first user about a second user who is available to have social interactions with the first user at a specific time based at least in part on user context for activities associated with habits of users. A habit engine determines habits of the first user and the second user to identify when each user is available for the social interactions. A context engine determines user context for a group of activities performed by the first user and the second user. A suggestion module identifies a time when the first user and the second user are available for the social interactions associated with a first activity having a matching context. The suggestion module provides a first suggestion that the first user join the second user in the first activity in a social network.
    Type: Grant
    Filed: February 5, 2014
    Date of Patent: April 18, 2017
    Assignee: Google Inc.
    Inventors: Ayush Agarwal, Francis Ma, Seth Sternberg
  • Patent number: 9614678
    Abstract: An information handling system includes a device, a controller, and a license manager subsystem. The controller is configured to determine whether the device has a license assigned and to extract a unique identification for the device in response to a request for information about the device. The license manager subsystem is configured to send the request for information about the device to the controller, to send the unique identification for the device to a license server as a request for the license for the device, to receive the license from the license server, and to assign the license to the device when the license is received.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: April 4, 2017
    Assignee: DELL PRODUCTS, LP
    Inventors: Michael Brundridge, Sruthi Mothukupally, Darrell Rosser, Gang Liu, Jason C. Dale, Marshal F. Savage
  • Patent number: 9553983
    Abstract: A system and method for determining an order in which to communicate with a list of numbers and/or addresses for a particular contact is disclosed. Each caller that communicates with the contact may specify a different order for the contact's various phone numbers and other addresses. A communication management system may then automatically dial the numbers or use messaging addresses to initiate data communications in the specified order when the initiating party attempts to communicate with the contact. The order may specify simultaneous and/or sequential use of numbers or addresses. Alternatively or additionally, the communication management system may dynamically and/or automatically determine the communication order or a portion thereof. The automatic determination of the order may be based on a communication history or communication receiving of the initiating party. In some arrangements, the order may be partially manually defined and partially automatically defined.
    Type: Grant
    Filed: October 5, 2010
    Date of Patent: January 24, 2017
    Assignee: Comcast Cable Communications, LLC
    Inventors: Franklyn Athias, Samuel H. Schwartz
  • Patent number: 9544332
    Abstract: A non-transitory computer readable medium includes instructions which, when executed by one or more network devices, causes performance of operations. The operations include sending, to shared devices, one or more status queries regarding one or more device conditions for each of the shared devices, obtaining responses to the one or more status queries from each of the plurality of shared devices, the responses including the one or more device conditions for each of the shared devices, filtering the shared devices based on the one or more device conditions to obtain a subset of the shared devices, identifying the subset of the shared devices as a set of available shared devices, and transmitting information identifying the set of available shared devices to a client device.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: January 10, 2017
    Assignee: Aruba Networks, Inc.
    Inventors: Sandip Kumar Devnath, Santashil PalChaudhuri, Sudeepto Kumar Roy
  • Patent number: 9531695
    Abstract: Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the caller and/or initiate other modes of communication. A caller can authenticate the caller identity in different ways to a communication server. Based on that, the server can assign an appropriate server-verified trust level to the caller. Further, an unsecured phone controller can indicate a lower client-side defined trust level. The server verified and client-side trust levels are then sent to the callee, where the callee determines whether to allow caller access to one or more secured features based on the feature values and the trust level imposed by the callee to access those features.
    Type: Grant
    Filed: June 12, 2009
    Date of Patent: December 27, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Lokesh Srinivas Koppolu, Amritansh Raghav, Anton W. Krantz
  • Patent number: 9515916
    Abstract: In one embodiment, a first network device may receive a request for an identifier of at least one target to service a client. The first network device may obtain an identifier of each of two or more targets. The first network device may then determine whether to redirect the request. The first network device may redirect the request to a second network device according to a result of the determining step, where the first network device is in a first autonomous system and the second network device is in a second autonomous system.
    Type: Grant
    Filed: October 21, 2010
    Date of Patent: December 6, 2016
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Zhunian Zhang, Steven V. Luong, Manish Bhardwaj, Stefano Previdi
  • Patent number: 9473441
    Abstract: An embodiment, by way of non-limiting example, comprises an e-mail method including creating an e-mail having discretionary functionality and sending the e-mail. Another embodiment, by way of non-limiting example, comprises an e-mail server including a computer configured to create an e-mail having discretionary functionality and to send the e-mail.
    Type: Grant
    Filed: June 19, 2008
    Date of Patent: October 18, 2016
    Assignee: GOOGLE INC.
    Inventors: Michael L. Gough, James J. Gough, Paul L. Hickman
  • Patent number: 9473598
    Abstract: A system, method and computer program product for implementing network connection failover during application service interruption. While the application is quiesced, a network socket that terminates a network connection to a network peer is maintained on behalf of the application. The socket's network connection state information is sustained by providing acknowledgements of incoming network traffic to the network peer that prevent the peer from terminating the connection. Upon restart, the application is brought up with a blocked socket. The state of the blocked socket is conformed to a current network connection state of the original socket and the blocked socket is unblocked.
    Type: Grant
    Filed: December 18, 2007
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventor: Vivek Kashyap
  • Patent number: 9467850
    Abstract: In some embodiments an accelerometer is mechanically coupled to a first device. The accelerometer obtains a vibration profile in response to a relative movement of the first device and a second device. A radio transmits an encrypted version of the vibration profile to the second device and receives an encrypted version of a vibration profile from the second device. A processor sets up a secure channel between the radio and the second device in which to exchange keys with the second device in order to decrypt the received encrypted vibration profile. The processor also decrypts the received encrypted vibration profile in response to at least one of the exchanged keys, compares the transmitted vibration profile with the received vibration profile and allows a sharing of resources with the second device if a match occurs between the transmitted vibration profile and the received vibration profile. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 31, 2007
    Date of Patent: October 11, 2016
    Assignee: Intel Corporation
    Inventor: Michael E. Deisher
  • Patent number: 9462070
    Abstract: Methods and systems for protecting the privacy of a user of a communication system that include enabling a first user to block a second user so that the first user generally appears to the second user to be unavailable. The method includes allowing a third user to establish a group that includes the first user and the second user. The group may be any sort of group that involves communication among three or more users. For example, the group may be an instant message group, voice chat, conference call, video conference, or any other suitable group communication. The method also enables a blocked user to be temporarily unblocked so as to prevent his blocking decision to be revealed to the blocked user.
    Type: Grant
    Filed: September 11, 2007
    Date of Patent: October 4, 2016
    Assignee: Synchronica plc
    Inventors: Claude Kawa, Gwenael Le Bodic, Jean Regnier
  • Patent number: 9455992
    Abstract: Techniques for utilizing trusted hardware components for mitigating the effects of equivocation amongst participant computing devices of a distributed system are described herein. For instance, a distributed system employing a byzantine-fault-resilient protocol—that is, a protocol intended to mitigate (e.g., tolerate, detect, isolate, etc.) the effects of byzantine faults—may employ the techniques. To do so, the techniques may utilize a trusted hardware component comprising a non-decreasing counter and a key. This hardware component may be “trusted” in that the respective participant computing device cannot modify or observe the contents of the component in any manner other than according to the prescribed procedures, as described herein. Furthermore, the trusted hardware component may couple to the participant computing device in any suitable manner, such as via a universal serial bus (USB) connection or the like.
    Type: Grant
    Filed: June 12, 2009
    Date of Patent: September 27, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: John R. Douceur, David M Levin, Jacob R. Lorch, Thomas Moscibroda
  • Patent number: 9450752
    Abstract: An approach is provided for service provider controlled communication security. A security platform receives a connection request from a client device. The security platform determines context information associated with the device, access network, a user of the device, or a combination thereof, and then processes and/or facilitates a processing of the context information to determine one or more encryption ciphers to offer for the session. Next, the security platform causes, at least in part, establishment of the connection request using, at least in part, the one of the offered encryption ciphers.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: September 20, 2016
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Markku Kalevi Vimpari, Jukka Sakari Alakontiola
  • Patent number: 9420520
    Abstract: The invention concerns methods, a device and computer program products for simplifying handover back to a restricted local access point from an unrestricted global access point as well as to a device implementing a restricted local access point for provision in a wireless network and a wireless network. In the network a restricted local access point hands over a mobile station to an unrestricted global access point and provides data enabling the restricted local access point to be identified as a candidate access point. A device for simplifying handover back determines that the restricted local access point is a candidate for further handover based on this data and informs the mobile station about the restricted local access point via the unrestricted glob access point. Thereby hand over may be considered also to the restricted local access point in addition to other surrounding access points.
    Type: Grant
    Filed: May 30, 2006
    Date of Patent: August 16, 2016
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Martin Bäckström, Anders Larsson, Thomas Walldeen
  • Patent number: 9405939
    Abstract: A non-volatile mass storage device is provided comprising memory circuitry accessible to a host data processing device via a communication link. The non-volatile mass storage device comprises processing circuitry for locally accessing the memory circuitry of the file system and is capable of triggering generation of a file for storage on the memory circuitry by connection of the non-volatile mass storage device to the host data processing device. The generated file comprises information dependent upon a state of the non-volatile mass storage device. A corresponding method of operating a non-volatile mass storage device is provided and a computer program is provided for obtaining the information dependent upon the state of the non-volatile mass storage device, for locally accessing the memory circuitry and for generating the file for storage on the memory circuitry.
    Type: Grant
    Filed: October 7, 2008
    Date of Patent: August 2, 2016
    Assignee: ARM LIMITED
    Inventors: Simon Andrew Ford, Christopher James Styles
  • Patent number: 9400876
    Abstract: Embodiments of the present invention provide a simplified authentication transaction for reconnecting a storage device to a host apparatus that has completed authentication in the past. According to one embodiment, an authentication log is recorded in the host. Plural units of this log information are recorded in the storage device. At the time of transferring a content decryption key and usage rules between the host and the storage device, the decryption key and usage rules are recorded into the host as a log for the transfer. The used authentication log is recorded into the storage device as RAPDI. If RAPDI indicates the authentication log in the simplified authentication transaction, recovery transaction is permitted. The host device deletes/invalidates or holds the log for the transfer in accordance with non-permission/permission. In the case of permission, the key and usage rules are recovered by using a log for the transfer prior to the simplified authentication transaction.
    Type: Grant
    Filed: October 24, 2008
    Date of Patent: July 26, 2016
    Assignee: HGST Netherlands B.V.
    Inventors: Tatsuya Hirai, Yukihide Inagaki
  • Patent number: 9397837
    Abstract: Privacy of information is protected by a method of securing access to information associated with a value item, the method including comparing a security signature and a stored profile, and permitting access to the information associated with the value item if the security signature matches the stored profile. The value item may be a machine readable document or other item of high value. The associated information may be stored in an electronic storage medium attached to the value item, or may be stored in an external database, or both. Permitting access to the associated information may include generating an access code unique to the associated information and to the value item.
    Type: Grant
    Filed: January 5, 2007
    Date of Patent: July 19, 2016
    Assignee: SICPA HOLDING SA
    Inventors: Mehdi Talwerdi, Marcus Klische
  • Patent number: 9398032
    Abstract: One embodiment relates to a computer-implemented method for detecting malicious scripts in web pages. A local engine and an application are executed at a client computer. The local engine intercepts an access by the application to a web page at a universal resource locator (URL) under a domain. The local engine determines scripts at the URL and scripts at other URLs under the domain. Using that information, the local engine determines if the scripts at the URL include one or more unique script(s). The local engine sends the unique script(s), if any, via a network to a script analyzer. The script analyzer may then perform emulation of the unique script(s) to detect malicious code therein. Other embodiments, aspects and features are also disclosed.
    Type: Grant
    Filed: July 9, 2009
    Date of Patent: July 19, 2016
    Assignee: Trend Micro Incorporated
    Inventors: Xiaochuan Wan, Yongtao Cao, Xuewen Zhu, Hua Ye
  • Patent number: 9354904
    Abstract: Portable packages containing encodings of processes are applied to software stacks. The packages are portable and distinct from the software stacks. The packages may be in the form of declarative code for configuring the software stack and can be plugged into the software stack to allow the technology stack to play the packages, thereby configuring the stacks to be capable of automating the processes encoded by the packages. An application or software component can be provided to read a package and apply parts thereof to appropriate corresponding software stack components.
    Type: Grant
    Filed: April 24, 2006
    Date of Patent: May 31, 2016
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ashvinkumar J. Sanghvi, Giedrius Zizys, Vij Rajarajan