Patents Examined by Ashokkumar B. Patel
  • Patent number: 10382410
    Abstract: A processing system includes a processing module having a first interface coupleable to an interconnect. The first interface includes a first cryptologic engine to encrypt a representation of store data of a store operation and a memory address using a first key and a first feedback-based cryptologic process to generate first encrypted data and an encrypted memory address. A memory module includes a second interface coupled to the interconnect. The second interface includes a second cryptologic engine to decrypt the first encrypted data and the encrypted memory address using a second key and a second feedback-based cryptologic process to generate a copy of the representation of the store data and a copy of the memory address. The second interface further is to store the copy of the representation of the store data to a memory location of the memory core based on the copy of the memory address.
    Type: Grant
    Filed: January 12, 2016
    Date of Patent: August 13, 2019
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Nuwan Jayasena, Dong Ping Zhang
  • Patent number: 10372890
    Abstract: The present disclosure discloses an apparatus, method, and electronic device. The apparatus includes a processor and a biometric sensor coupled to the processor. The biometric sensor is configured to detect a plurality of biometric features of a user. Each biometric feature may be associated with a value. The processor may determine a sequence of values from the biometric features. The processor may determine the sequence for comparison with a predetermined sequence of values to verify an identity of the user based, at least in part, on the comparison.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: August 6, 2019
    Assignee: Lenovo (Beijing) Limited
    Inventors: Xinyi Shi, Jianhua Song
  • Patent number: 10362033
    Abstract: An application executed on a first device presents a user interface on a device display. The application is associated with a validation system used by the device. Based on receiving a first user input, the application controls the first device to scan, using a first communication protocol, for other devices that are located within a first communication range of the first device. Based on the scan, the application discovers a second device that is located within the first communication range of the first device. The application receives, from the second device, an identification information that uniquely identifies a user associated with the second device on the validation system. The application validates the identification information by communicating with a validation server. Based on validating the identification information, the application displays an indication that the second device associated with the user is located within the first communication range of the first device.
    Type: Grant
    Filed: January 27, 2015
    Date of Patent: July 23, 2019
    Assignee: MicroStrategy Incorporated
    Inventors: Michael J. Saylor, Peng Xiao, Siamak Ziraknejad, Diego Valenzuela, Feng Xia
  • Patent number: 10360400
    Abstract: A risk analysis system of associated with an enterprise system for determining delegation risks associated with assigning candidate individuals to perform various tasks. In some cases, the delegation risk analysis system may generate individual delegation risk scores to each candidate individual to assist in the delegation of tasks throughout an organization. In some examples, the delegation risk analysis system may determine the delegation risk scores based on context risk factors associated with the task and the individual and intrinsic delegation risk factors associated with the enterprise system.
    Type: Grant
    Filed: February 5, 2016
    Date of Patent: July 23, 2019
    Assignee: QUEST SOFTWARE INC.
    Inventors: Olivier Le Rudulier, Michel Albert Brisebois
  • Patent number: 10360391
    Abstract: Systems and methods for encrypting and decrypting data in a dispersed storage network are disclosed. One encryption approach involves generating a random encryption key (REK), producing encrypted data using the REK, determining a computed value (CV) using the encrypted data, and combining the REK, CV and a supplied encryption key (SEK) into an Encrypted Difference (ED). The encrypted data and ED are then combined to produce a secure package. The secure package is then processed by an error coding function and stored as slices. One decryption approach includes accessing the slices and the SEK, decoding the slices to recover the secure package, re-computing the CV from the encrypted data within the secure package, and using the SEK and CV to de-combine the ED and recover the REK. The REK is then used to decrypt the encrypted data. Integrity verification of the secure package may also be used.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: July 23, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jason K. Resch, Mark D. Seaborn
  • Patent number: 10362086
    Abstract: A method for automating the submission of issue reports includes automatically capturing information and images related to a software user, receiving a request from the user involving an issue experienced by the user, evaluating the request and the user information and images, generating a unique identifier that matches a response received by the user when making the request to associated server log information, generating an issue report based on the user information and images, server log information, and the generated unique identifier, and generating a ticket associated with the issue report that may be communicated to an external system. The user request information and images, server log information, and unique identifier may be stored in a database or data repository. The user information and images and server log information may be automatically encrypted. A system for automating the submission of issue reports is also described.
    Type: Grant
    Filed: December 12, 2014
    Date of Patent: July 23, 2019
    Assignee: Medidata Solutions, Inc.
    Inventor: Charles Abbott
  • Patent number: 10360363
    Abstract: A system and method for verifying entry credentials and activating/deactivating an access control system via use of the native capabilities of a mobile device is disclosed herein. Particularly, the system and method include an embedded local control device attached or communicative with an electronic gate or lock. The control device is communicative with a remote access control management system, which is structured to receive, track and manage access tokens that can be used to control access to a gated community or other secured location. Notifications that an access token has been generated can be communicated to the guest(s) by way of text message, short message service (SMS), or email, for example. Each notification may contain a unique link to a webpage employing the access token. While in the geographic vicinity of the secured location, the guest may actuate the access token and open the gate.
    Type: Grant
    Filed: April 2, 2015
    Date of Patent: July 23, 2019
    Inventor: Mark Y. Grosberg
  • Patent number: 10360371
    Abstract: The disclosed computer-implemented method for protecting automated execution environments against enumeration attacks may include (1) monitoring a file that is undergoing a malware analysis in an automated execution environment, (2) while monitoring the file, detecting one or more behaviors exhibited by the file during the malware analysis in the automated execution environment, (3) determining, based at least in part on the behaviors exhibited by the file, that the file is attempting to discover one or more resources used in connection with the malware analysis, and then in response to determining that the file is attempting to discover the resources used in connection with the malware analysis, (4) terminating the malware analysis in an effort to undermine the file's attempt to discover the resources used in connection with the malware analysis. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 12, 2014
    Date of Patent: July 23, 2019
    Assignee: Symantec Corporation
    Inventor: Andrew Watson
  • Patent number: 10355867
    Abstract: A method for generating, from initial content data, output content data for provision to one or more receivers, wherein the initial content data is encoded according to a coding scheme, wherein for a quantity of data encoded according to the coding scheme, the coding scheme provides a mechanism for including in the quantity of encoded data additional data such that a decoder for the coding scheme, upon decoding the quantity of encoded data, does not use the additional data to generate decoded data, the method comprising: selecting one or more portions of the initial content data; for each selected portion, generating a data construct that comprises a plurality of data structures, each data structure comprising data, including a version of the selected portion, that is encrypted using a corresponding encryption process different from each encryption process used to encrypt data in the other data structures, wherein the data construct is arranged such that using a decryption process that corresponds to the encr
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: July 16, 2019
    Assignee: IRDETO B.V.
    Inventors: Anthony Pickering, Rahul Mehra, Erik Hietbrink
  • Patent number: 10356105
    Abstract: Granting a validation period. A method includes receiving user input providing one or more authentication factors. The method further includes receiving information about one or more authentication scales. Based on the strength of the authentication factors received from the user and the information about the one or more authentication scales, the method further includes determining a validation period. The method further includes granting or revoking the validation period to the user.
    Type: Grant
    Filed: June 14, 2016
    Date of Patent: July 16, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Xuan Wang, Ananda Sarkar
  • Patent number: 10355860
    Abstract: The present disclosure provides a method and system for generating a QR code by receiving an inputted document; pre-processing the inputted document so as to obtain desired content; encrypting the desired content; and generating one or more QR codes based on the encrypted desired content.
    Type: Grant
    Filed: September 23, 2015
    Date of Patent: July 16, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Chao Chen, Laiqiang Ding, Jingjing Liu, Tony Jiang Ma, Roby Qiyan Chen
  • Patent number: 10346595
    Abstract: A method of updating a common provisioning system (CPS) service is provided that includes: selecting a DRM service level from a DRM provider and a corresponding CPS service for said DRM service level; determining if the CPS service is associated with one or more CPS packages; for each associated CPS package, determining if the association is in a corrupt state, wherein the association is in a corrupt state if at least one package content collection (PCC) for the CPS package does not correctly include or exclude the DRM service level that corresponds to said CPS service; and for each associated CPS package in a non-corrupt state, updating a package content collection (PCC) in the DRM provider.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: July 9, 2019
    Assignee: ARRIS Enterprises, Inc.
    Inventors: Thomas J. Bahnck, Preeti Tailor, Francis A. Hinchey, Jr., Ellen Osis
  • Patent number: 10348746
    Abstract: A system that detects any unauthorized communication without imposing a processing load on a control device is provided. In the incident detection system configured to detect any security incident, a gateway device includes: an ID generation unit that generates its own gateway device identification information; a detection packet generation unit that generates a detection packet including control information transmitted from a control device and path information obtained by adding its own gateway device identification information to a communication packet; a log generation unit that generates log information including the detection packet; and a device communication unit that transmits the log information to a management server connected to the gateway device over a network or transmits the detection packet to a control device controlled based on the control information.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: July 9, 2019
    Assignee: Hitachi, Ltd.
    Inventors: Hiroki Uchiyama, Toru Owada, Makoto Kayashima, Yusuke Fujihara, Satoshi Ohkubo, Jun Hamanaka
  • Patent number: 10339330
    Abstract: Examples described herein relate to a data aggregation system for enabling query operations on restricted data that originates from multiple independent sources.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: July 2, 2019
    Assignee: Neustar, Inc.
    Inventors: Xavier Riley, Alan Burye
  • Patent number: 10339342
    Abstract: In one aspect, a first device includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to identify a first data transfer command based on input from an input device, receive identifying information associated with the input device, and execute the first data transfer command responsive at least in part to authentication of the input device based at least in part on the identifying information. The first data transfer command pertains to the transfer of first data.
    Type: Grant
    Filed: May 9, 2014
    Date of Patent: July 2, 2019
    Assignee: LENOVO (SINGAPORE) PTE. LTD.
    Inventors: Axel Ramirez Flores, James Anthony Hunt, Robert James Kapinos, Rod David Waltermann, Suzanne Marion Beaumont
  • Patent number: 10339325
    Abstract: A system, method and program product for implementing a database security model. A database security model is disclosed that includes: a system for maintaining private data in an encrypted storage area; an ENCR system for implementing a plurality of ENCR routines, wherein each of the ENCR routines is callable from a database application to access and process private data and wherein the ENCR system operates in a functional space separate from the database application; and a crypto system having a private key and decryption system, wherein the crypto system decrypts private data in response to receiving a decrypt request and public key from an ENCR routine, and wherein the crypto system operates in a functional space separate from the ENCR system.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: July 2, 2019
    Assignee: JJD Software LLC
    Inventor: Justin Donohoe
  • Patent number: 10333979
    Abstract: A method of validating data in a multi-tenant network of a service provider may include storing a page in a network storage, where the page is associated with a tenant of the service provider. In response to a page request, the page may be served from the network storage to a computing device communicatively coupled to the multi-tenant network. The page in the network storage may be independently addressable using a uniform resource locator (URL). Data entered in at least one data field within the served page may be received. The received data may be validated by a validation service of the service provider, using a plurality of validation rules associated with the tenant. At least a portion of the plurality of validation rules may be based on the page stored in the network storage. Upon successful validation, the received data may be stored within the multi-tenant network.
    Type: Grant
    Filed: June 10, 2014
    Date of Patent: June 25, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Thomas Charles Stickle, Thomas Eugene Laszewski, Miles Julian Ward
  • Patent number: 10334083
    Abstract: There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious communication, comprising: detecting a connection establishment process for establishing a network connection, the connection establishment process initiated by code running on a client terminal; analyzing records in at least one stack trace of the initiating code managed at the client terminal, to detect a trial to establish a malicious communication wherein the network connection is used for malicious activity; and blocking establishment of the network connection when the analysis detects the trial to establish the malicious communication based on the network connection.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: June 25, 2019
    Assignee: enSilo Ltd.
    Inventors: Roy Katmor, Tomer Bitton, Udi Yavo, Ido Kelson
  • Patent number: 10333704
    Abstract: Various embodiments for encryption enablement in a computing storage environment, by a processor device, are provided. In one embodiment, a method comprises managing each step of an encryption key creation process for a computer storage system using an automated wizard by interactively sensing inserted access key hardware and providing a real-time progress and error report of the encryption key creation process.
    Type: Grant
    Filed: January 15, 2016
    Date of Patent: June 25, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Elizabeth Mitchell, Jason L. Peipelman, Chris Zukowski
  • Patent number: 10325107
    Abstract: Some embodiments of the present invention include an apparatus for securing data and include a processor, and one or more stored sequences of instructions which, when executed by the processor, cause the processor to set a data download threshold, encrypt data to be downloaded by a user based on detecting size of the data violating the download threshold such that the user receives encrypted downloaded data, and manage a decryption key used to decrypt the encrypted downloaded data. The decryption key may be deconstructed into “N” key fragments and may be reconstructed using “K” key fragments where “N” is equal to “2K?1”.
    Type: Grant
    Filed: September 23, 2015
    Date of Patent: June 18, 2019
    Assignee: salesforce.com, inc.
    Inventors: Prasad Peddada, Jeremy Horwitz