Patents Examined by Aravind Moorthy
  • Patent number: 9215211
    Abstract: A system and method of guaranteeing the presence of secure and tamper-proof remote files over a distributed communication medium, such as the Internet, is provided. The system and method automatically detects, and then self-repairs corrupt, modified or non-existent remote files. The method first performs an integrity check on a remote file and then determines whether the integrity check passed. If the integrity check passed, then the user goes through the authentication process as normal. If the integrity check fails, then the present invention redirects to an install module in order to prepare to reinstall the remote file. Via the install module, the present invention then reinstalls the remote file and the user is then taken through the authentication process as normal.
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: December 15, 2015
    Assignee: Citibank, N.A.
    Inventors: Steve Vlcan, Bikram Singh Bakshi
  • Patent number: 9213862
    Abstract: Systems, methods and articles of manufacture for delivering website content to an internet user which is personalized to the user based on a persona associated with the user. A persona database system accesses personal and financial data for the user from any suitable source, such as from a tax return of the user or personal finance management application or even a questionnaire. The persona database system matches the user's data to a persona for the user from a predetermined, discrete set of personas, wherein each persona identifies a generalized profile of personal and financial characteristics of the user. Then, when a user access a website hosted by a website server, the website server accesses the persona for the user from the persona database system and the website server personalizes the website content delivered to the user based on the persona for the user.
    Type: Grant
    Filed: March 5, 2014
    Date of Patent: December 15, 2015
    Assignee: INTUIT INC.
    Inventors: Carolyn Spencer, Avanish Pathak, Vijoy Caro, Aliza D. Carpio, Alan Tifford, Ashley K. McMahon, Lisa B. Greene-Lewis
  • Patent number: 9214184
    Abstract: The present invention relates to digital rights management (DRM) for content that may be downloaded and bound to a storage device. The storage device may be an intelligent storage device, such as a disk drive, or network attached storage. In addition, the storage device is capable of performing cryptographic operations and providing a root of trust. In one embodiment, the DRM employs a binding key, a content key, and an access key. The binding key binds the content to a specific storage and is based on a key that is concealed on the storage. However, the binding key is not stored on the storage with the content. The content key is a key that has been assigned to the content, for example, by a trusted third party. The access key is determined based on a cryptographic combination of the content key and the binding key. In one embodiment, the content is encrypted based on the access key and stored in encrypted form in the storage device.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: December 15, 2015
    Assignee: Western Digital Technologies, Inc.
    Inventors: David L. Blankenbeckler, Danny Ybarra, Lambertus Hesselink
  • Patent number: 9203607
    Abstract: A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared between the sender and the receiver. Rather than sending a challenge and then waiting for a response, the challenge and response are both sent by the sender of the information. The information sent comprises an index with a challenge and a response from the Challenge-Response Table. Upon receiving the coded information, the receiver uses the Challenge-Response Table to decode the information by using the index to locate the challenge and its valid response. Upon determining that the challenge and the response are correct, a first decoded answer is determined. Upon determining that either the challenge or the response, or both, are incorrect, a second decoded answer is determined.
    Type: Grant
    Filed: March 9, 2012
    Date of Patent: December 1, 2015
    Assignee: International Business Machines Corporation
    Inventors: Subramaniyam Chandrasekaran, Shunmugam Murugan, Arun C. Ramachandran, Lakshmanan Velusamy
  • Patent number: 9203789
    Abstract: Publishing content associated with an electronic file attached to an electronic message by executing instructions contained in the electronic attachment and accessing the content at a remote computer server identified by the attached file. The attached file includes computer-executable instructions, such as a computer program or script, which include an identifier for a remote server connected to a distributed computer network. This identified remote server typically hosts a web site containing content for viewing by the recipient of the electronic message. In response to launching the attached file of the electronic message with a viewer program, a browser program can be opened to enable the recipient to view the content of the identified remote server, typically a web site on an intranet or the global Internet.
    Type: Grant
    Filed: September 20, 2013
    Date of Patent: December 1, 2015
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: Gary J. Dennis
  • Patent number: 9195813
    Abstract: Aspects of the disclosure provide a system that includes a protected module, an input module and a gesture engine. The protected module is configured to be accessible based on a specific gesture of a user predetermined to have a right to access the protected module. The input module is configured to receive an input gesture from a requester to access the protected module. The gesture engine is configured to be trained to process the input gesture in order to grant/deny an access to the protected module by the requester.
    Type: Grant
    Filed: October 1, 2013
    Date of Patent: November 24, 2015
    Assignee: LOCKHEED MARTIN CORPORATION
    Inventors: Alex Hrybyk, John S. Morrison
  • Patent number: 9191291
    Abstract: A computer-implemented method is presented herein. The method obtains a first content item from an online source, and then generates a characterizing signature of the first content item. The method continues by finding a previously-saved instance of the characterizing signature and retrieving data associated with a second content item (the second content item is characterized by the characterizing signature). The method continues by analyzing the data associated with the second content item, corresponding data associated with the first content item, and decision criteria. Thereafter, either the first content item or the second content item is identified as an original content item, based on the analyzing. The other content item can be flagged as an aggregated content item.
    Type: Grant
    Filed: September 9, 2013
    Date of Patent: November 17, 2015
    Assignee: salesforce.com, inc.
    Inventor: Dai Duong Doan
  • Patent number: 9185089
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key management for Issuer Security Domain (ISD) using GlobalPlatform Specifications. A client receives from a server an authorization to update a first ISD keyset. The client encrypts, via a client-side secure element, a second ISD keyset with a server public key. The client sends the encrypted second ISD keyset to the server for updating the first ISD keyset with the encrypted second ISD keyset. Prior to updating, the client generates the first ISD keyset at a vendor and sends the first ISD keyset to the client-side secure element and sends the first ISD keyset encrypted with the server public key to the server. The disclosed method allows for updating of an ISD keyset of which only the client-side secure element and a server have knowledge.
    Type: Grant
    Filed: December 20, 2011
    Date of Patent: November 10, 2015
    Assignee: Apple Inc.
    Inventor: Ahmer A. Khan
  • Patent number: 9183411
    Abstract: A decentralized multi-authority functional encryption according to which the security of the whole system does not depend on a single party. Among a plurality of key generation devices, arbitrary one key generation device generates gparam, and each key generation device generates an authority public key and an authority secret key based on gparam. At least some key generation devices among the plurality of key generation devices generate a part of a decryption key of the user based on the authority secret key ask. The user forms one decryption by putting together the decryption keys generated by at least some of the key generation devices, and decrypts a ciphertext.
    Type: Grant
    Filed: December 16, 2011
    Date of Patent: November 10, 2015
    Assignees: Mitsubishi Electric Corporation, NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Katsuyuki Takashima, Tatsuaki Okamoto
  • Patent number: 9177126
    Abstract: Method for establishing and maintaining a person's identity starts at the time the person registers with the system using a mobile device to validate the identity of a person in an inherently anonymous computing environment such as the internet or any other distributed network where face to face communication is not possible. The person will provide information required to establish the person's identity with an authenticator. The authenticator then submits that information to the system administration service to be validated by external databases and services. The external service provides a set of challenge/response questions unique to that person to establish positive identification. Upon successful authentication of the person's identity, the person and their device will be associated with each other and recorded in the system. Each authentication service will define a criterion, labeled as a schema, by which authentication events will be governed.
    Type: Grant
    Filed: October 27, 2012
    Date of Patent: November 3, 2015
    Inventor: Edward Curren
  • Patent number: 9172705
    Abstract: A system for interactive network access approval includes a server, a first application running on a first device for requesting access to a website on the network, and a second application running on a second device for approving access to the website. The server receives a request via the first application for access to the website, immediately transmits the request to the second application, receives via the second application approval for access to the website, and immediately grants access to the website to the first application. A method for granting access to a website is also described.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: October 27, 2015
    Assignee: FORCEFIELD ONLINE, INC
    Inventors: Michael Kong, Mark Madsen
  • Patent number: 9172679
    Abstract: In an intermediation system, an intermediary is positioned along a communications path between a client and a server. The client sends a payment message over the communications path to consummate a payment. The intermediary receives the payment message and detects whether the message includes an account number, such as a credit card number. The intermediary replaces the account number with a limited-use payment number, such as a one-time-use credit card number. The intermediary may request the limited-use payment number from a credit card issuer. The intermediary may send a verification message to the client to verify that the client approves of the replacement of the account number with a limited-use payment number.
    Type: Grant
    Filed: April 14, 2004
    Date of Patent: October 27, 2015
    Assignee: Sprint Spectrum L.P.
    Inventor: Martin Geddes
  • Patent number: 9167422
    Abstract: A method for ensuring media stream security in an IP Multimedia Subsystem network is disclosed. The method includes: assigning an end-to-end media stream security key for a calling User Equipment (UE) or a called UE, by a network device with which the calling UE or the called UE is registered, respectively, and transmitting the media stream security key to a network device with which the opposite end is registered; encrypting the end-to-end media stream security key using a session key shared with the calling UE or the called UE respectively, and transmitting the encrypted end-to-end media stream security key to the calling UE or the called UE, respectively, via a session message; encrypting or decrypting a media stream, by the calling UE or the called UE, respectively, using the end-to-end media stream security key.
    Type: Grant
    Filed: October 10, 2013
    Date of Patent: October 20, 2015
    Assignee: Inventergy, Inc.
    Inventor: Jun Yan
  • Patent number: 9166977
    Abstract: A method for secure text-to-speech conversion of text using speech or voice synthesis that prevents the originator's voice from being used or distributed inappropriately or in an unauthorized manner is described. Security controls authenticate the sender of the message, and optionally the recipient, and ensure that the message is read in the originator's voice, not the voice of another person. Such controls permit an originator's voiceprint file to be publicly accessible, but limit its use for voice synthesis to text-based content created by the sender, or sent to a trusted recipient. In this way a person can be assured that their voice cannot be used for content they did not write.
    Type: Grant
    Filed: December 22, 2011
    Date of Patent: October 20, 2015
    Assignee: BlackBerry Limited
    Inventors: Simon Peter Desai, Neil Patrick Adams
  • Patent number: 9160737
    Abstract: Web pages and applications commonly consume functionality provided by services to provide users with a rich experience. For example, a backend mapping service may provide access to these services. However, the users and application consuming the services may be anonymous and unverified. Accordingly, a two ticket validation technique is provided to validate service execution requests from anonymous applications. In particular, a user is provided with a client ticket comprising a reputation. The reputation may be adjusted over time based upon how the user consumes services. An application may request access to a service by providing the client ticket and an application ticket for validation. The reputation of the user may be used to determine an access level at which the application may access the service. Users with a high reputation may receive high quality access to the service, while users with a low reputation may receive lower quality access.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: October 13, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shai Herzog, Gil Shklarski
  • Patent number: 9160731
    Abstract: A mechanism is provided for establishing a trust relationship between two products. A resource device receives a registration request from an application device to access a resource on the resource device by an application and users of the application on the application device. The resource device sends a registration response using a redirection uniform resource identifier (URI) provided with the registration request, where the registration response includes an authorization code and a symmetric key in response to authenticating the registration request. The resource device receives an access token request that includes the symmetric key, verifiable authentication data, and the redirection URI. The resource device sends an access token to the application device in response to validating the access token request, where the access token allows for access to the resource on the resource device thereby establishing the trust relationship between the resource device and the application device.
    Type: Grant
    Filed: September 6, 2013
    Date of Patent: October 13, 2015
    Assignee: International Business Machines Corporation
    Inventors: John Y. Chang, Ching-Yun Chao, Lewis Lo, Ki H. Park, Barbara J. Vander Weele
  • Patent number: 9160722
    Abstract: A computer-implemented method for securing personal information of a user on social networks. The method involves: receiving personal information from a user in an unencrypted textual form by a client computer; transmitting the received personal information via a secure virtual private network (VPN) connection to a dedicated VPN server/proxy; receiving the personal information at the dedicated VPN server/proxy; encrypting the received personal information at the dedicated VPN server/proxy using an encryption key; and transmitting the encrypted personal information from the dedicated VPN server/proxy to the social network. Other users of the social network also use the dedicated VPN server/proxy in order to decrypt (access) the personal information of the user, which has been encrypted as specified above.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: October 13, 2015
    Assignee: Anchorfree, Inc.
    Inventor: Dimitry Gavrilov
  • Patent number: 9154306
    Abstract: Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access is unlinkable to any previous or future accesses of the user at the RP. Pseudonymous access allows the user to associate the access to a pseudonym previously registered at the RP. A pseudonym system is disclosed. The pseudonym system allows a large number of different and unlinkable pseudonyms to be generated using only a small number of secrets held by the user. The pseudonym system can generate tokens capable of including rich semantics in both a fixed format and a free format. The tokens can be used in obtaining from the IdP, confirmation of access privilege and/or of selective partial disclosure of user characteristics required for access at the RPs. The pseudonym system and associated protocols also support user-enabled linkability between pseudonyms.
    Type: Grant
    Filed: June 22, 2012
    Date of Patent: October 6, 2015
    Assignee: Google Inc.
    Inventors: Bennet Laurie, Marcel M. Moti Yung
  • Patent number: 9154295
    Abstract: A method is provided for generating a correspondence table suitable for use in a cryptographic processing method and comprising storing a plurality of input data and of output data in the table, each input datum being associated with at least one output datum in the table. For each input datum, at least one of the output data is obtained by applying a coding function to a first subsidiary datum and to an encrypted intermediate datum depending on the input datum. Also provided are a corresponding encryption method, a storage unit suitable for storing the correspondence table generated by the above generation method, a device for physically implementing such a correspondence table, a decryption device including such a storage unit, and a computer program product suitable for implementing the above generation method.
    Type: Grant
    Filed: December 28, 2010
    Date of Patent: October 6, 2015
    Assignee: KONINKLIJKE PHILPS N.V.
    Inventors: Olivier Billet, Gilles Macario-Rat
  • Patent number: 9154479
    Abstract: Methods and systems are provided herein to enable secure proxying of network traffic between trusted and untrusted environments. In particular, a secure proxy may be provided that includes a set of security layers and a secure endpoint resolver, either of which may be provided and/or updated by a service provider. The security layers may be associated with policies that may be applicable to various network protocol layers (e.g., application layer). The security layers may be used to inspect, restrict and/or modify traffic between the trusted and untrusted environment to ensure data and network security. The secure endpoint resolver may be used, for example, by an application in the trusted environment, to obtain current service-related information such as the list of IP addresses currently associated with a service or service endpoint. Such endpoint information may be used, in turn, to update security layer policies such as a white list.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: October 6, 2015
    Assignee: Amazon Technologies, Inc.
    Inventor: Tushaar Sethi