Patents Examined by Beemnet W Dada
  • Patent number: 10789268
    Abstract: The present technology pertains to a organization directory hosted by a synchronized content management system. The corporate directory can provide access to user accounts for all members of the organization to all content items in the organization directory on the respective file systems of the members' client devices. Members can reach any content item at the same path as other members relative to the organization directory root on their respective client device. In some embodiments novel access permissions are granted to maintain path consistency.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: September 29, 2020
    Assignee: Dropbox, Inc.
    Inventors: Howard Lee, Aaron Staley, Nils Bunger, Rohan Vora, Yosrie Mansour, Zach Johnston
  • Patent number: 10778419
    Abstract: Various embodiments are directed to systems and methods for encryption key management within a group-based communication platform.
    Type: Grant
    Filed: June 6, 2019
    Date of Patent: September 15, 2020
    Assignee: Slack Technologies, Inc.
    Inventors: Richard Crowley, Audrei Drummond, Jessica Fain, Leah Jones, Ilan Frank, Nikolas Kinkel
  • Patent number: 10771447
    Abstract: Flexible authentication technologies customized to particular tenants of a data center network can be implemented. For example, an administrator can specify a primary authentication server and specify at which data centers different applications are to be hosted for a given tenant. End users can be shielded from the complexities of implementing such configuration details. For example, single sign-on authentication can be implemented, even when applications are configured to be hosted in different data centers. Enterprise tenants can thus control where applications are hosted and enforce data containment scenarios without encumbering users with additional tasks. Collaboration and application-to-application authentication can be achieved.
    Type: Grant
    Filed: June 5, 2017
    Date of Patent: September 8, 2020
    Assignee: Illumina, Inc.
    Inventors: Milan Karangutkar, Prabhu Palanisamy, Satnam Alag
  • Patent number: 10762213
    Abstract: A method and system for improving memory storage and threat detection is provided. The method includes requesting and authorizing permission for executing analysis code for determining if a service device is in compliance with general data protection regulations. In response, executable code is uploaded to the database hardware controller and a first database and a second database is analyzed with respect to patterns associated with the general data protection regulations. Associated results code is generated and transmitted the service device. The results code is executed with respect to the first database and the second database resulting in a storage space increase in the first database and the second database thereby improving operational functions of the first database and the second database.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: Krzysztof Rudek, Grzegorz P. Szczepanik, Lukasz Jakub Palus, Tomasz Hanusiak
  • Patent number: 10749876
    Abstract: Disclosed embodiments relate to adaptively and dynamically monitoring and managing a proximity status between securely communicating devices. Techniques include identifying a secure connection session established between an endpoint computing resource and an auxiliary computing device associated with a user; receiving real-time proximity data associated with at least one of the user or the auxiliary computing device; receiving proximity data associated with the endpoint computing resource; determining, based on the real-time proximity data associated with at least one of the user or the auxiliary computing device and the proximity data associated with the endpoint computing resource, whether at least one of the auxiliary computing device or the user has left the proximity to the endpoint computing resource; and implementing, based on the determining, an automatic session control action for the secure connection session.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: August 18, 2020
    Assignee: CyberArk Software Ltd.
    Inventors: Arthur Bendersky, Dima Barboi
  • Patent number: 10735379
    Abstract: Embodiments relate to detecting and mitigating network intrusions. Packets are inspected at their source/destination hosts to identify packet trends local to the hosts. The local packet trends are combined to identify network-wide packet trends. The network-wide packet trends are used to detect anomalies or attacks, which in turn informs mitigation actions. The local inspection may be performed by reconfigurable/reprogrammable “smart” network interfaces (NICs) at each of the hosts. Local inspection involves identifying potentially suspect packet features based on statistical prevalence of recurring commonalities among the packets; pre-defined threat patterns are not required. For network-wide coherence, each host/NIC uses the same packet-identifying and occurrence-measuring algorithms. An overlay or control server collects and combines the local occurrence-measures to derive the network-wide occurrence-measures.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: August 4, 2020
    Inventors: Navendu Jain, Ang Chen
  • Patent number: 10733309
    Abstract: A computing device (100, 245, 300, 340) arranged for generating an authentication token (AT) being a data structure to be used for authenticating a first computing device (100, 340) to a second computing device (100, 340), wherein the computing device (100, 245, 300, 340) is configured to: generate at least one index; retrieve a portion of a data set (MTS), the portion being a portion of the data set starting at a position in the data set given by the index; and include the portion in the authentication token (AT).
    Type: Grant
    Filed: October 8, 2015
    Date of Patent: August 4, 2020
    Assignee: Kelisec AB
    Inventor: Elise Revell
  • Patent number: 10733307
    Abstract: A compute server receives a request from a client device, where the plurality of compute servers are part of a distributed cloud computing platform, and wherein the request is a request for a network resource. The compute server executes, by a single process at the first compute server, a response inspector, wherein the response inspector is run in a one of a plurality of isolated execution environments. The compute server receives at least one content item from an origin server in response to the request for the network resource. The compute server detects a protected content marker in the at least one content item that indicates a data breach, and logs information about the request in an inspection log.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: August 4, 2020
    Assignee: CLOUDFLARE, INC.
    Inventors: Benedikt Christoph Wolters, David Kitchen, Alex Cruz Farmer, Andrew Galloni
  • Patent number: 10728751
    Abstract: Disclosed is a wireless mesh network that includes a first node node and at least one second node. The first node is configured to provide a bi-directional mesh communication to the at least one second node. The first node is configured to broadcast a beacon periodically. The at least one second node is configured to sent a data frame to the first node. The data frame is encrypted by way of an Initialization Vector, which has been composed from at least a first node-specific Super Frame Counter included into the beacon, a Sender-Node-Specific-Frame Counter, and an identification of a sender.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: July 28, 2020
    Assignee: WIREPAS OY
    Inventors: Kari Lahteenmaki, Hannu Hirvi
  • Patent number: 10721255
    Abstract: One or more computing devices, systems, and/or methods for assessing riskiness of a domain are provided. For example, a content request is received from a content provider service that hosts a website associated with a domain. The content request is evaluated to identify request features. Feature scores are assigned to the request features using labeled feature data. The feature scores are aggregated to generate a content request risk score corresponding to a riskiness of the content request corresponding to fraud, such as domain spoofing. The content request risk score along with other content request risk scores of content requests associated with the content provider service are aggregated to create a content provider risk score corresponding to a riskiness of the content provider service, such as a risk of the domain being fraudulent. The content provider risk score is used to either block or process the content request.
    Type: Grant
    Filed: April 5, 2018
    Date of Patent: July 21, 2020
    Assignee: Oath Inc.
    Inventors: Liang Wang, Xianen Qiu, Liang Peng, Jianlong Zhang
  • Patent number: 10715536
    Abstract: Disclosed herein is a method and system to determine whether a payment terminal has been tampered with based on a comparison of attestation data received from the payment terminal, for example in an offline mode when an otherwise secure remote server cannot be reached. If the determination yields that the request has been approved, the terminal generates an attestation ticket having one or more validity conditions, wherein the validity conditions include expiration time that indicates the time after which the attestation ticket becomes invalid. The attestation ticket can be used as long as it is valid or until another trigger causes the ticket to be invalidated or regenerated.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: July 14, 2020
    Assignee: Square, Inc.
    Inventors: Janek Klawe, Richard Neal Harris
  • Patent number: 10708276
    Abstract: A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.
    Type: Grant
    Filed: November 21, 2015
    Date of Patent: July 7, 2020
    Assignee: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Nathaniel David Jamiel, Taylor David Fraley, John Grayson Fable
  • Patent number: 10701243
    Abstract: Embodiments of the present disclosure disclose an information access control method performed at a server, the method including: receiving an image sharing request from a first terminal, the image sharing request including a first image to be shared among a user group of a social networking application; encrypting the first image using an encryption key to obtain a second image; sending a preview version of the first image to a second terminal; receiving an image viewing request from the second terminal in response to a user selection of the preview version of the first image at the second terminal and a user-initiated resource transfer from the second user account to the first user account; and returning the second image and a decryption key to the second terminal, wherein the second terminal is configured to restore the first image from the second image using the decryption key.
    Type: Grant
    Filed: April 12, 2018
    Date of Patent: June 30, 2020
    Inventor: Siyu Xiao
  • Patent number: 10691482
    Abstract: A data processing system with technology to secure a VMCS comprises random access memory (RAM) and a processor in communication with the RAM. The processor comprises virtualization technology that enables the processor to (a) execute host software in root mode and (b) execute guest software from the RAM in non-root mode in a virtual machine (VM) that is based at least in part on a virtual machine control data structure (VMCDS) for the VM. The processor also comprises a root security profile to specify access restrictions to be imposed when the host software attempts to read the VMCDS in root mode. Other embodiments are described and claimed.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: June 23, 2020
    Assignee: Intel Corporation
    Inventors: Kai Cong, Karanvir Grewal, David M. Durham
  • Patent number: 10692313
    Abstract: In at least one embodiment, a system for authorizing use of a vehicle communication and information system may include one or more data processors configured to receive information associating one or more devices with a vehicle computer. The data processor(s) may be also configured to receive information identifying a user requesting authorization to command the vehicle controls from the one or more devices associated with the vehicle computer. The user(s) may be authorized to command the vehicle controls from the one or more devices associated with the vehicle computer based on performing an authentication process for authenticating the user, determining that the user is an authenticated user based on the authentication process, and enabling command of one or more vehicle controls from the one or more remote devices via the associated vehicle computer based on the user being authenticated.
    Type: Grant
    Filed: May 14, 2015
    Date of Patent: June 23, 2020
    Assignee: Ford Global Technologies, LLC
    Inventors: Robert Bruce Kleve, Brian Petersen, Ritesh Pandya, Edward Andrew Pleet, John Robert Van Wiemeersch
  • Patent number: 10686840
    Abstract: An electronic permissions and security system are disclosed which may be used to determine permissions and policies for resources in a complex multi-dimensional data system. Analysis of resource data hierarchies and/or accessor data hierarchies using the permissions computing systems and methods discussed herein may provide efficient and flexible permissions analysis, determination, and management. The electronic permissions system may include for example, a permissions analysis module or component configured to access, traverse and/or analyze a resource hierarchy and/or an accessor hierarchy to determine permissions with respect to a resource. Permissions may be defined according to various policies which may include specific actions allowed or disallowed for the policy. Specific actions within a policy may also be organized hierarchically such that one particular grant of one permission may imply granting of another permission.
    Type: Grant
    Filed: February 20, 2018
    Date of Patent: June 16, 2020
    Assignee: Addepar, Inc.
    Inventors: Matthew Andreas Doermann, Alan Tracey Wootton, Louise Elizabeth Briguglio
  • Patent number: 10671735
    Abstract: A framework for measuring the security strength of bio-metric security systems against spoofing attacks considering the adversary's knowledge about the system is disclosed.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: June 2, 2020
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Sandeep K. S. Gupta, Ayan Banerjee, Seyed Koosha Sadeghi Oskooyee, Mohammad Javad Sohankar Esfahani
  • Patent number: 10666425
    Abstract: A digital education record management method based on the blockchain token technology, the method includes: generating a fixed number of tokens on the blockchain of the entire network through a hash algorithm; generating an educational institution hash address and a management key matching the educational institution hash address for an educational institution; assigning a sufficient number of tokens to the educational institution according to the scale and requirement of the educational institution; generating a student hash address and a management key corresponding to the student hash address for the student through the hash algorithm; establishing a unified issuing rule of the token by educational institutions, issuing the token to the student when the student meets the rule; reading data on the blockchain node by using a blockchain scanning tool; generating a digital education record for the student according to the data; checking the digital education record through an authorization key.
    Type: Grant
    Filed: June 4, 2018
    Date of Patent: May 26, 2020
    Inventor: Jianbiao Dai
  • Patent number: 10666644
    Abstract: A hardware, key-file and password assisted enterprise key and password management system. By leveraging hardware and key files, along with public-key cryptography, an extremely efficient and secure key, access and password management system is provided. After configuring an account, the user needs only one hardware key device and need only remember a single strong password.
    Type: Grant
    Filed: October 25, 2017
    Date of Patent: May 26, 2020
    Assignee: Revbits, LLC
    Inventor: Mucteba Celik
  • Patent number: 10666673
    Abstract: Systems and methods for behavioral baselining of network systems.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: May 26, 2020
    Assignee: Catbird Networks, Inc.
    Inventors: Malcolm Rieke, Holland Carrere Barry