Patents Examined by Beemnet Dada
-
Patent number: 9928383Abstract: Systems and method for alerting a user device based on a proposed anonymization of a contribution to a conversation thread via one or several location-based anonymization rules are disclosed herein. The system can include a user device that can have location-determining features that can determine a physical location of the user device; a network interface that can exchange data with a server via a communication network; and an I/O subsystem that can convert electrical signals to user-interpretable outputs in a user interface. The system can include a server that can: receive a contribution from the user device; determine an anonymization level for applying to the contribution; identify a potential identifier in the content of the contribution; anonymize the potential identifier according to the determined anonymization level; and generate and provide an alert to the user device.Type: GrantFiled: October 30, 2015Date of Patent: March 27, 2018Assignee: PEARSON EDUCATION, INC.Inventors: Sean A. York, Scott A. Hellman, James Wyatt, Marko Rodriguez, Steven H. Hill
-
Patent number: 9923713Abstract: A peripheral and central device in a wireless network, such as a Bluetooth Low Energy network, may maintain privacy while connecting. During connecting energy in the peripheral device may be saved by linking an advertised address of the peripheral device to a resolvable private address of the central device, thereby providing an early indication if the central device is, according to the peripheral device, allowed to connect to the peripheral device. Hence a peripheral device performing such linking may have an improved resistance to a denial-of-service attack.Type: GrantFiled: November 27, 2015Date of Patent: March 20, 2018Assignee: NXP USA, Inc.Inventors: Georgel Bogdan Alexandru, Razvan-Tudor Stanescu
-
Patent number: 9917832Abstract: An app of a mobile device registers the mobile device for a remote credential server (RCS) and receives a device token. When a credential for a remote asset is supplied on the mobile device it is routed to the RCS and stored external to the mobile device but referenced on the mobile device via an asset token. When the credential is needed, the device token and the asset token permit the RCS to authenticate and return the credential to or on behalf of the mobile device so that the mobile device can authenticate to and access the remote asset.Type: GrantFiled: October 28, 2014Date of Patent: March 13, 2018Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Michael F. Angelo, Baha Masoud
-
Patent number: 9916454Abstract: Embodiments of systems, apparatuses, and methods to protect data stored in a storage system of a device from malware alternation are described. In some embodiments, a system receives an indication that the data is to be protected. In addition, the system further triggers an interrupt of the device and secures the data from the malware alternation.Type: GrantFiled: June 20, 2016Date of Patent: March 13, 2018Assignee: Intel CorporationInventors: Paul J. Thadikaran, Nicholas D. Triantafillou, Thomas R. Bowen, Paritosh Saxena
-
Patent number: 9900388Abstract: A method for transmitting data between controllers in a vehicle network includes transmitting a first data code including an identification number. A second data code is transmitted including a length value of data codes to be transmitted. Data codes are transmitted by using the length value of the data codes to be transmitted. A random number and a position information value of the data codes to be transmitted are included in last and previously transmitted data codes.Type: GrantFiled: December 2, 2014Date of Patent: February 20, 2018Assignee: HYUNDAI MOTOR COMPANYInventor: Sung Joon Park
-
Patent number: 9900315Abstract: A system includes a vehicle communications platform (VCP) operatively disposed in a vehicle and a control device. The control device selects a privacy ON mode or a privacy OFF mode. The privacy ON mode enables the VCP to synchronize a privacy setting of a mobile communications device to a vehicle notification setting, and is triggered when the privacy setting of the device is on, and either at least one passenger is present in the vehicle or a user indicates that the VCP should synchronize the privacy setting to the vehicle notification setting. The privacy OFF mode inhibits the VCP from synchronizing the privacy setting to the vehicle notification setting, and is triggered when the privacy setting of the device is off, or no passengers are present in the vehicle, or the user indicates that the VCP should not synchronize the privacy setting to the vehicle notification setting.Type: GrantFiled: October 30, 2015Date of Patent: February 20, 2018Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Munib Ahmed Yusuf, Shaun S. Marshall
-
Patent number: 9900292Abstract: A method and apparatus for providing a security service for a vehicle-dedicated data channel in linking between a vehicle head unit and an external device is disclosed. The method of providing the security service for the vehicle-dedicated data channel may include: transmitting, to the terminal, a predetermined integrity verification request message for requesting integrity verification of application software and an operating system included in the terminal; receiving an integrity verification result message from the terminal, exchanging a plaintext symmetric key with the terminal when integrity of the operating system and the application software is successfully verified according to the integrity verification result message; and establishing a vehicle-dedicated data channel to the terminal and transmitting and receiving a packet encrypted using the plaintext symmetric key through the established vehicle-dedicated data channel when the plaintext symmetric key is successfully exchanged.Type: GrantFiled: February 26, 2016Date of Patent: February 20, 2018Assignee: HYUNDAI MOTOR COMPANYInventor: Seung Cheol Lee
-
Patent number: 9891969Abstract: An apparatus and a method for encrypting and decrypting data in a device are provided. The apparatus includes a processor and a memory. The processor is configured to transmit a data command from an application to an encryption driver that executes in a kernel space, determine if the application is authenticated to perform the data command based on an access policy, transmit, when the application is authenticated, a first key to a cryptographic library that executes in an application space, and perform the data command based on the first key after receiving a response via the cryptographic library. The first key is stored in an encryption driver in the kernel space and is not available to applications in the application space.Type: GrantFiled: February 26, 2016Date of Patent: February 13, 2018Assignee: Samsung Electronics Co., Ltd.Inventors: Kwanghwan Moon, Peng Ning, Geng Chen, Sangwoo Ryu, S J Oh, Sami Orava, KyungBae Park
-
Patent number: 9886581Abstract: Techniques for providing information security threat assessment and amelioration are disclosed. The techniques may include obtaining fundamental data, obtaining document data, preparing fundamental instance nodes from the fundamental data, preparing document nodes from the document data, preparing edges between at least some of the nodes, storing the nodes and the edges in a manner that reflects a graph structure, and causing to be displayed at least a portion of a graph defined by at least one node and at least one edge.Type: GrantFiled: February 25, 2014Date of Patent: February 6, 2018Assignee: Accenture Global Solutions LimitedInventors: Ryan Olson, Trevor Tonn
-
Patent number: 9886563Abstract: Systems for managing personalized access to shared online objects. A user accesses a server in a cloud-based environment, wherein the server is interfaced with storage devices that store one or more content objects. The server receives communications packets comprising at least one session attribute, wherein receiving the one or more communications packets is responsive, either directly or indirectly, to an act of the user to invoke a new content access session. The session attribute is used to generate personalized workspace properties that are based on explicitly-provided information or based on inferences that pertain to the invoked content access session. Access to content objects is personalized using explicit or inferred workspace session properties. Personalization includes any aspects of branding preferences, working group colleagues, roles, privileges, friends, etc. Personalization can be based on personalized workspace properties that are inferred based on rules or combinations of data.Type: GrantFiled: November 25, 2015Date of Patent: February 6, 2018Assignee: Box, Inc.Inventors: Vikram Sardesai, Ketki Warudkar, Ravi Teja Tiruvury, Matthew Self, Rand Wacker
-
Patent number: 9886571Abstract: A component subsystem and a method for authenticating the component subsystem. The component subsystem may be installed in a host device. The method can include an authentication protocol, wherein the host device sends a test voltage value to the component subsystem which, in turn, generates a test voltage based on the test voltage value. The test voltage is applied to a test cell that includes a wordline, a bitline, and a memory film. A response voltage is read from the bitline and compared to an expected value. If the response voltage matches the expected value, host device and/or component subsystem functionality is enabled. If the response voltage does not match the expected value, the host device and/or component subsystem functionality is disabled.Type: GrantFiled: February 16, 2016Date of Patent: February 6, 2018Assignee: XEROX CORPORATIONInventors: Christopher P. Caporale, Alberto Rodriguez, Scott Jonathan Bell, John M. Scharr
-
Patent number: 9888010Abstract: An integrated firewall provides security in a multi-tenant environment having a connection-based switched fabric directly connecting database servers which provide a plurality of database services with application servers hosting database service consumers each having a different database service consumer identity. The firewall functionality integrated into each database server provides access control by discarding communication packets which do not include a database service consumer identity and using the database service consumer identity in combination with an access control list to control access from the database service consumers to the database services. The access control includes address resolution access control, connection establishment access control, and data exchange access control based on said access control list.Type: GrantFiled: June 28, 2017Date of Patent: February 6, 2018Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Vadim Makhervaks, Richard Mousseau, Bjørn Dag Johnsen, Sumanta Chatterjee, Avneesh Pant, Jean De Lavarene, Kant C. Patel, Bhaskar Mathur, Feroz Alam Khan, Sudeep Vatsanath Reguna
-
Patent number: 9881172Abstract: In one embodiment, a method is performed by a computer system. The method includes monitoring events in relation to files stored at multiple network nodes and, responsive to the monitoring, detecting that a new file has been created from an existing file. The method further includes accessing a stored file-family model of the existing file, the stored file-family model comprising interconnected nodes, wherein the interconnected nodes represent a plurality of overlapping file variants such that one of the interconnected nodes represents the existing file. In addition, the method includes logically connecting the existing file and the new file in the stored file-family model. The method also includes determining a primary file variant in the stored file-family model and, responsive to a determination that the existing file is not the primary file variant, notifying one or more users.Type: GrantFiled: February 26, 2016Date of Patent: January 30, 2018Assignee: Quest Software Inc.Inventors: Jake Seigel, Sohail Ali, Bashar Alhassani
-
Patent number: 9866550Abstract: A method includes receiving, from a first device at a second device, a message indicating that the first device is available to share a resource. The method includes transmitting, from the second device to the first device, a request to use the resource. The method includes, in response to acceptance of the request, transmitting data to the first device, wherein a multimedia capture setting of a multimedia capture device is adjusted based on the data. The method also includes receiving multimedia content at the second device, the multimedia content captured by the multimedia capture device based on the multimedia capture setting.Type: GrantFiled: January 11, 2017Date of Patent: January 9, 2018Assignees: AT&T MOBILITY II LC, AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Ginger Chien, Yehoshuva Arasavelli, II
-
Patent number: 9866580Abstract: A first collection including a first feature vector and a Q&A feature vector is constructed. A second collection is constructed from the first collection by inserting noise in at least one of the vectors. A third collection is constructed by crossing over at least one the vectors of the second collection with a corresponding vector of a fourth collection, migrating at least one of the vectors of the second collection with a corresponding vector of a fifth collection, or both. Using a forecasting configuration, a vector of the third collection is aged to generate a changed feature vector, the changed feature vector containing feature values expected at a future time. The changed feature vector is input into a trained neural network to predict a probability of the cyber-attack occurring at the future time.Type: GrantFiled: February 9, 2016Date of Patent: January 9, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, John F. Behnken, Mauro Marzorati
-
Patent number: 9858109Abstract: Methods, systems, and computer program products are included for performing module unloading in a protected kernel environment. A method includes loading a module into a kernel, the module including an exit function. The kernel provides, to a hypervisor, a memory location corresponding to the exit function of the module. A kernel protection feature is activated. After activating the kernel protection feature, the hypervisor detects an attempt to execute the exit function. The hypervisor determines that the attempt to execute the exit function corresponds to the memory location provided to the hypervisor. Based on the determining, the hypervisor allows execution of the exit function.Type: GrantFiled: February 26, 2016Date of Patent: January 2, 2018Assignee: RED HAT ISRAEL, LTD.Inventors: Michael Tsirkin, Paolo Bonzini
-
Patent number: 9860268Abstract: A set of collections of forecasted feature vectors is selected from a repository for a future time window after a present time, a cyber-attack being in progress in a data processing environment at the present time, a collection in the set having feature vectors that are indicative of an event related to the cyber-attack in a region of the environment at a discrete time. The events corresponding to the collections in the set are classified into a class of cyber-attack. From a mapping between a set of phases of the cyber-attack and a set of classes, a phase is determined that corresponds to the class. The determined phase is predicted as likely to occur during the future time window in the region.Type: GrantFiled: February 9, 2016Date of Patent: January 2, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mohamed N. Ahmed, Aaron K. Baughman, Nicholas A. McCrory, Andeep S. Toor, Michelle Welcks
-
Patent number: 9858427Abstract: A computer receives a set of objects from a client, whereby at least one of the objects of the set are respectively associated and encrypted with a unique file encryption key (FEK). The computer encrypts each of the FEKs with a common master encryption key, MEK, resulting in respective locked keys. In an initial backup, the encrypted objects together with their associated locked keys are transmitted to a backup server where a first module determines if locked key has changed via referencing an encryption state associated with the encrypted objects. If an MEK has changed, the existing FEKs are re-encrypted with the changed MEK to generate new locked keys, and, in a subsequent backup operation, sending the new locked keys to the backup server to replace the existing locked keys, while avoiding transmitting to the backup server the objects whose associated FEKs are affected by the changed MEK.Type: GrantFiled: February 26, 2016Date of Patent: January 2, 2018Assignee: International Business Machines CorporationInventors: Christian Mueller, Dominic Mueller-Wicke, Erik Rueger
-
Patent number: 9853926Abstract: A method and server are provided for sending a secure message from a first computing device to a second computing device. A first computing device sends an encrypted, secure message a message server. The message server processes the secure message to unencrypt and separate the secure message contents into two or more separately downloadable message parts. The server sends a complex link to the second computing device, or sends a complex link to the first computing device for sending to the second computing device. When the complex link is selected by a user of the second computing device the server transmits a first part of the message to the second computing device. After transmitting the first part, the server then separately transmits a second part of the message to the second computing device.Type: GrantFiled: June 19, 2015Date of Patent: December 26, 2017Inventor: Kevin Alan Tussy
-
Patent number: 9846780Abstract: Techniques for providing computer security vulnerability intelligence are disclosed. The techniques include obtaining distributable vulnerability data that includes, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter, where the distributable vulnerability data was derived from an intelligence graph including a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges.Type: GrantFiled: February 25, 2015Date of Patent: December 19, 2017Assignee: Accenture Global Solutions LimitedInventors: Trevor Tonn, Ray-yu Chang