Patents Examined by Ashokkumar B. Patel
-
Patent number: 10382410Abstract: A processing system includes a processing module having a first interface coupleable to an interconnect. The first interface includes a first cryptologic engine to encrypt a representation of store data of a store operation and a memory address using a first key and a first feedback-based cryptologic process to generate first encrypted data and an encrypted memory address. A memory module includes a second interface coupled to the interconnect. The second interface includes a second cryptologic engine to decrypt the first encrypted data and the encrypted memory address using a second key and a second feedback-based cryptologic process to generate a copy of the representation of the store data and a copy of the memory address. The second interface further is to store the copy of the representation of the store data to a memory location of the memory core based on the copy of the memory address.Type: GrantFiled: January 12, 2016Date of Patent: August 13, 2019Assignee: Advanced Micro Devices, Inc.Inventors: Nuwan Jayasena, Dong Ping Zhang
-
Patent number: 10372890Abstract: The present disclosure discloses an apparatus, method, and electronic device. The apparatus includes a processor and a biometric sensor coupled to the processor. The biometric sensor is configured to detect a plurality of biometric features of a user. Each biometric feature may be associated with a value. The processor may determine a sequence of values from the biometric features. The processor may determine the sequence for comparison with a predetermined sequence of values to verify an identity of the user based, at least in part, on the comparison.Type: GrantFiled: March 31, 2016Date of Patent: August 6, 2019Assignee: Lenovo (Beijing) LimitedInventors: Xinyi Shi, Jianhua Song
-
Patent number: 10362033Abstract: An application executed on a first device presents a user interface on a device display. The application is associated with a validation system used by the device. Based on receiving a first user input, the application controls the first device to scan, using a first communication protocol, for other devices that are located within a first communication range of the first device. Based on the scan, the application discovers a second device that is located within the first communication range of the first device. The application receives, from the second device, an identification information that uniquely identifies a user associated with the second device on the validation system. The application validates the identification information by communicating with a validation server. Based on validating the identification information, the application displays an indication that the second device associated with the user is located within the first communication range of the first device.Type: GrantFiled: January 27, 2015Date of Patent: July 23, 2019Assignee: MicroStrategy IncorporatedInventors: Michael J. Saylor, Peng Xiao, Siamak Ziraknejad, Diego Valenzuela, Feng Xia
-
Patent number: 10360400Abstract: A risk analysis system of associated with an enterprise system for determining delegation risks associated with assigning candidate individuals to perform various tasks. In some cases, the delegation risk analysis system may generate individual delegation risk scores to each candidate individual to assist in the delegation of tasks throughout an organization. In some examples, the delegation risk analysis system may determine the delegation risk scores based on context risk factors associated with the task and the individual and intrinsic delegation risk factors associated with the enterprise system.Type: GrantFiled: February 5, 2016Date of Patent: July 23, 2019Assignee: QUEST SOFTWARE INC.Inventors: Olivier Le Rudulier, Michel Albert Brisebois
-
Patent number: 10360391Abstract: Systems and methods for encrypting and decrypting data in a dispersed storage network are disclosed. One encryption approach involves generating a random encryption key (REK), producing encrypted data using the REK, determining a computed value (CV) using the encrypted data, and combining the REK, CV and a supplied encryption key (SEK) into an Encrypted Difference (ED). The encrypted data and ED are then combined to produce a secure package. The secure package is then processed by an error coding function and stored as slices. One decryption approach includes accessing the slices and the SEK, decoding the slices to recover the secure package, re-computing the CV from the encrypted data within the secure package, and using the SEK and CV to de-combine the ED and recover the REK. The REK is then used to decrypt the encrypted data. Integrity verification of the secure package may also be used.Type: GrantFiled: April 3, 2017Date of Patent: July 23, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason K. Resch, Mark D. Seaborn
-
Patent number: 10362086Abstract: A method for automating the submission of issue reports includes automatically capturing information and images related to a software user, receiving a request from the user involving an issue experienced by the user, evaluating the request and the user information and images, generating a unique identifier that matches a response received by the user when making the request to associated server log information, generating an issue report based on the user information and images, server log information, and the generated unique identifier, and generating a ticket associated with the issue report that may be communicated to an external system. The user request information and images, server log information, and unique identifier may be stored in a database or data repository. The user information and images and server log information may be automatically encrypted. A system for automating the submission of issue reports is also described.Type: GrantFiled: December 12, 2014Date of Patent: July 23, 2019Assignee: Medidata Solutions, Inc.Inventor: Charles Abbott
-
Patent number: 10360363Abstract: A system and method for verifying entry credentials and activating/deactivating an access control system via use of the native capabilities of a mobile device is disclosed herein. Particularly, the system and method include an embedded local control device attached or communicative with an electronic gate or lock. The control device is communicative with a remote access control management system, which is structured to receive, track and manage access tokens that can be used to control access to a gated community or other secured location. Notifications that an access token has been generated can be communicated to the guest(s) by way of text message, short message service (SMS), or email, for example. Each notification may contain a unique link to a webpage employing the access token. While in the geographic vicinity of the secured location, the guest may actuate the access token and open the gate.Type: GrantFiled: April 2, 2015Date of Patent: July 23, 2019Inventor: Mark Y. Grosberg
-
Patent number: 10360371Abstract: The disclosed computer-implemented method for protecting automated execution environments against enumeration attacks may include (1) monitoring a file that is undergoing a malware analysis in an automated execution environment, (2) while monitoring the file, detecting one or more behaviors exhibited by the file during the malware analysis in the automated execution environment, (3) determining, based at least in part on the behaviors exhibited by the file, that the file is attempting to discover one or more resources used in connection with the malware analysis, and then in response to determining that the file is attempting to discover the resources used in connection with the malware analysis, (4) terminating the malware analysis in an effort to undermine the file's attempt to discover the resources used in connection with the malware analysis. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 12, 2014Date of Patent: July 23, 2019Assignee: Symantec CorporationInventor: Andrew Watson
-
Patent number: 10355867Abstract: A method for generating, from initial content data, output content data for provision to one or more receivers, wherein the initial content data is encoded according to a coding scheme, wherein for a quantity of data encoded according to the coding scheme, the coding scheme provides a mechanism for including in the quantity of encoded data additional data such that a decoder for the coding scheme, upon decoding the quantity of encoded data, does not use the additional data to generate decoded data, the method comprising: selecting one or more portions of the initial content data; for each selected portion, generating a data construct that comprises a plurality of data structures, each data structure comprising data, including a version of the selected portion, that is encrypted using a corresponding encryption process different from each encryption process used to encrypt data in the other data structures, wherein the data construct is arranged such that using a decryption process that corresponds to the encrType: GrantFiled: February 15, 2012Date of Patent: July 16, 2019Assignee: IRDETO B.V.Inventors: Anthony Pickering, Rahul Mehra, Erik Hietbrink
-
Patent number: 10356105Abstract: Granting a validation period. A method includes receiving user input providing one or more authentication factors. The method further includes receiving information about one or more authentication scales. Based on the strength of the authentication factors received from the user and the information about the one or more authentication scales, the method further includes determining a validation period. The method further includes granting or revoking the validation period to the user.Type: GrantFiled: June 14, 2016Date of Patent: July 16, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Xuan Wang, Ananda Sarkar
-
Patent number: 10355860Abstract: The present disclosure provides a method and system for generating a QR code by receiving an inputted document; pre-processing the inputted document so as to obtain desired content; encrypting the desired content; and generating one or more QR codes based on the encrypted desired content.Type: GrantFiled: September 23, 2015Date of Patent: July 16, 2019Assignee: EMC IP Holding Company LLCInventors: Chao Chen, Laiqiang Ding, Jingjing Liu, Tony Jiang Ma, Roby Qiyan Chen
-
Patent number: 10346595Abstract: A method of updating a common provisioning system (CPS) service is provided that includes: selecting a DRM service level from a DRM provider and a corresponding CPS service for said DRM service level; determining if the CPS service is associated with one or more CPS packages; for each associated CPS package, determining if the association is in a corrupt state, wherein the association is in a corrupt state if at least one package content collection (PCC) for the CPS package does not correctly include or exclude the DRM service level that corresponds to said CPS service; and for each associated CPS package in a non-corrupt state, updating a package content collection (PCC) in the DRM provider.Type: GrantFiled: May 27, 2015Date of Patent: July 9, 2019Assignee: ARRIS Enterprises, Inc.Inventors: Thomas J. Bahnck, Preeti Tailor, Francis A. Hinchey, Jr., Ellen Osis
-
Patent number: 10348746Abstract: A system that detects any unauthorized communication without imposing a processing load on a control device is provided. In the incident detection system configured to detect any security incident, a gateway device includes: an ID generation unit that generates its own gateway device identification information; a detection packet generation unit that generates a detection packet including control information transmitted from a control device and path information obtained by adding its own gateway device identification information to a communication packet; a log generation unit that generates log information including the detection packet; and a device communication unit that transmits the log information to a management server connected to the gateway device over a network or transmits the detection packet to a control device controlled based on the control information.Type: GrantFiled: December 24, 2015Date of Patent: July 9, 2019Assignee: Hitachi, Ltd.Inventors: Hiroki Uchiyama, Toru Owada, Makoto Kayashima, Yusuke Fujihara, Satoshi Ohkubo, Jun Hamanaka
-
Patent number: 10339330Abstract: Examples described herein relate to a data aggregation system for enabling query operations on restricted data that originates from multiple independent sources.Type: GrantFiled: December 31, 2015Date of Patent: July 2, 2019Assignee: Neustar, Inc.Inventors: Xavier Riley, Alan Burye
-
Patent number: 10339342Abstract: In one aspect, a first device includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to identify a first data transfer command based on input from an input device, receive identifying information associated with the input device, and execute the first data transfer command responsive at least in part to authentication of the input device based at least in part on the identifying information. The first data transfer command pertains to the transfer of first data.Type: GrantFiled: May 9, 2014Date of Patent: July 2, 2019Assignee: LENOVO (SINGAPORE) PTE. LTD.Inventors: Axel Ramirez Flores, James Anthony Hunt, Robert James Kapinos, Rod David Waltermann, Suzanne Marion Beaumont
-
Patent number: 10339325Abstract: A system, method and program product for implementing a database security model. A database security model is disclosed that includes: a system for maintaining private data in an encrypted storage area; an ENCR system for implementing a plurality of ENCR routines, wherein each of the ENCR routines is callable from a database application to access and process private data and wherein the ENCR system operates in a functional space separate from the database application; and a crypto system having a private key and decryption system, wherein the crypto system decrypts private data in response to receiving a decrypt request and public key from an ENCR routine, and wherein the crypto system operates in a functional space separate from the ENCR system.Type: GrantFiled: March 3, 2017Date of Patent: July 2, 2019Assignee: JJD Software LLCInventor: Justin Donohoe
-
Patent number: 10333979Abstract: A method of validating data in a multi-tenant network of a service provider may include storing a page in a network storage, where the page is associated with a tenant of the service provider. In response to a page request, the page may be served from the network storage to a computing device communicatively coupled to the multi-tenant network. The page in the network storage may be independently addressable using a uniform resource locator (URL). Data entered in at least one data field within the served page may be received. The received data may be validated by a validation service of the service provider, using a plurality of validation rules associated with the tenant. At least a portion of the plurality of validation rules may be based on the page stored in the network storage. Upon successful validation, the received data may be stored within the multi-tenant network.Type: GrantFiled: June 10, 2014Date of Patent: June 25, 2019Assignee: Amazon Technologies, Inc.Inventors: Thomas Charles Stickle, Thomas Eugene Laszewski, Miles Julian Ward
-
Patent number: 10334083Abstract: There is provided a computer implemented method for detection and prevention of an attempt at establishment of a network connection for malicious communication, comprising: detecting a connection establishment process for establishing a network connection, the connection establishment process initiated by code running on a client terminal; analyzing records in at least one stack trace of the initiating code managed at the client terminal, to detect a trial to establish a malicious communication wherein the network connection is used for malicious activity; and blocking establishment of the network connection when the analysis detects the trial to establish the malicious communication based on the network connection.Type: GrantFiled: November 24, 2015Date of Patent: June 25, 2019Assignee: enSilo Ltd.Inventors: Roy Katmor, Tomer Bitton, Udi Yavo, Ido Kelson
-
Patent number: 10333704Abstract: Various embodiments for encryption enablement in a computing storage environment, by a processor device, are provided. In one embodiment, a method comprises managing each step of an encryption key creation process for a computer storage system using an automated wizard by interactively sensing inserted access key hardware and providing a real-time progress and error report of the encryption key creation process.Type: GrantFiled: January 15, 2016Date of Patent: June 25, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Elizabeth Mitchell, Jason L. Peipelman, Chris Zukowski
-
Patent number: 10325107Abstract: Some embodiments of the present invention include an apparatus for securing data and include a processor, and one or more stored sequences of instructions which, when executed by the processor, cause the processor to set a data download threshold, encrypt data to be downloaded by a user based on detecting size of the data violating the download threshold such that the user receives encrypted downloaded data, and manage a decryption key used to decrypt the encrypted downloaded data. The decryption key may be deconstructed into “N” key fragments and may be reconstructed using “K” key fragments where “N” is equal to “2K?1”.Type: GrantFiled: September 23, 2015Date of Patent: June 18, 2019Assignee: salesforce.com, inc.Inventors: Prasad Peddada, Jeremy Horwitz