Patents Examined by Brandon S Hoffman
  • Patent number: 10387786
    Abstract: A situational awareness and communication system that receives a request for situational awareness information from a requesting device associated with a requester. The situational awareness request includes a geographic area of interest and one or more of a demographic profile of interest and a topical area of interest. The system also receives real-time geographic location data reported by mobile communication devices associated with potential respondents and one or more of demographic data and topical area of interest data reported by the communication devices or obtained from social media files associated with the potential respondents located within the geographic area of interest. The system provides the situational awareness information to the requesting device including demographic statistics for potential respondents located within the geographic area of interest.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: August 20, 2019
    Assignee: 1Q, LLC
    Inventors: Keith Rinzler, Ryan Cino, Brian Scully
  • Patent number: 10387675
    Abstract: A system and method for automatically applying display privacy filters. Content to be displayed on a device is received. An indirect indication of a condition of the device that is associated with applying a display privacy filter to a presentation of the device is received. Based on receiving the indirect indication, the display privacy filter to presentations of the content.
    Type: Grant
    Filed: March 8, 2017
    Date of Patent: August 20, 2019
    Assignee: BlackBerry Limited
    Inventors: Neil Patrick Adams, Jeremy Lawson Kominar, Clara Margarida Severino, Adam Richard Schieman
  • Patent number: 10387687
    Abstract: A method of trust provisioning a device, including: receiving, by a hardware security module (HSM), a list of instructions configured to produce trust provisioning information; performing, by the HSM, a constraint check on the list of instructions including performing a symbolic execution of the list of instructions; receiving confidential inputs; executing, by the HSM, the list of instructions on the confidential inputs when the list of instructions passes the constraint check; outputting, by the HSM, trust provisioning information.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: August 20, 2019
    Assignee: NXP B.V.
    Inventors: Florian Boehl, Clemens Orthacker, Klaus Martin Potzmader, Andreas Daniel Sinnhofer, Christian Steger
  • Patent number: 10387658
    Abstract: During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags may identify the requests as potentially malicious and carry a security risk. The RTA framework then may assign sanitization tags to the objects identifying security checks performed on the objects during runtime. The RTA framework identifies output responses to the user requests that include the objects and compares the input tags assigned to the objects with any sanitization tags assigned to the objects. The RTA framework may identify the software application as susceptible to a security vulnerability when the input tags for the objects do not include corresponding sanitization tags.
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: August 20, 2019
    Assignee: SALESFORCE.COM, INC.
    Inventors: Sergey Gorbaty, Travis Safford, Xiaoran Wang, Yoel Gluck
  • Patent number: 10382953
    Abstract: The disclosure discloses a security configuration method for Device to Device (D2D) communication, a Proximity-based Service (ProSe) key management function, User Equipment (UE) and a system. The method includes that: first information indicating security capability of a UE is acquired; and whether to feed back a security configuration response message or a content of the security configuration response message to the UE is determined according to the first information. The disclosure further discloses a computer storage medium.
    Type: Grant
    Filed: July 14, 2014
    Date of Patent: August 13, 2019
    Assignee: ZTE Corporation
    Inventors: Jin Peng, Shilin You, Zhaoji Lin, Zaifeng Zong, Li Zhu
  • Patent number: 10382741
    Abstract: The present invention is for more optimally performing recording and reproduction of stereoscopic video. In the present invention, parallax information is utilized to store, in a recording medium, stereoscopic video including left-eye images and right-eye images. Particularly, for video content that contains stereoscopic images, information is obtained regarding the amount of variation in parallactic angle having a given or larger value, a variation time that the variation in parallactic angle takes, and the number of times that the variation in parallactic angle occurs. An evaluation value is calculated that corresponds to the degree of eye fatigue on the basis of the amount of variation, the variation time, and the number of times of the variation. According to the present invention, the video content is encoded in such a manner that the evaluation value is within a given range, and then recorded in the recording medium.
    Type: Grant
    Filed: June 29, 2017
    Date of Patent: August 13, 2019
    Assignee: Mitsubishi Electric Corporation
    Inventors: Masato Nagasawa, Keiji Hatanaka, Kazuhiro Kurisaki
  • Patent number: 10380095
    Abstract: Exemplary embodiments are directed to a method and apparatus for storing data for a batch of manufactured items. The method comprises defining in a processor, using a lower limit identifier and an upper limit identifier, a range of unique item identifiers for the batch, wherein each manufactured item in the batch is allocated a unique item identifier falling within the range. The item identifiers are stored in allocated storage space. If an upper limit identifier is specified for each time interval, an amount of storage specified for all manufactured items during a production time period is calculated as a sum of a first product and a second product, the first product being a product of a production time and a size allocated to each upper limit identifier, and the second product being a product of the production time, a total number of manufactured items, and a percentage of unused identifiers.
    Type: Grant
    Filed: March 22, 2018
    Date of Patent: August 13, 2019
    Assignee: Philip Morris USA Inc.
    Inventors: Erwan Fradet, Alain Sager, Patrick Mauroux, Patrick Chanez, Philippe Chatelain
  • Patent number: 10382198
    Abstract: The present disclosure in some embodiments provides an apparatus and method for supplying quantum keys to multiple apparatuses in a quantum key distribution system. According to some embodiments of the present disclosure, an apparatus and method for supplying quantum keys enable Alice or Bob to deliver the quantum keys to the multiple transmitting apparatuses or receiving apparatuses, in real time without a delay.
    Type: Grant
    Filed: April 27, 2017
    Date of Patent: August 13, 2019
    Assignee: ID QUANTIQUE
    Inventor: Jeongwoon Choi
  • Patent number: 10382488
    Abstract: A computer-implemented method for enforcing access-control policies may include (i) identifying streaming content that is being transmitted from a media server to a media playback system, (ii) determining that a supervised user is within exposure range of the media playback system and could be exposed to the streaming content, (iii) receiving a sample of the content from a sampling system that is remote from the media playback system, (iv) identifying an access-control policy that defines a content-access restriction for the supervised user, (v) determining, based on an analysis of the sample of the content, that the access-control policy applies to the content, and (vi) in response to determining that the access-control policy applies to the content, enforcing the access-control policy by applying the content-access restriction to the streaming content. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: August 13, 2019
    Assignee: Symantec Corporation
    Inventors: Lei Gu, Keith Newstadt
  • Patent number: 10382474
    Abstract: Some embodiments are directed to a simulation facility that includes an operational physical model facility of a real infrastructure facility that mimics at least in part operations of the real infrastructure facility and comprises equipment that corresponds to and mimics operations of equipment in the real infrastructure facility; attack toolware for use by people in mounting cyber attacks on the model facility; operations and management toolware for use by people in operating and defending the model facility against cyber attacks mounted using the attack toolware; and a controller having a memory and operable to acquire and store in the memory a forensic record of cyber attacks mounted on the model facility and defense strategies undertaken to defend the model facility against the cyber attacks.
    Type: Grant
    Filed: October 30, 2014
    Date of Patent: August 13, 2019
    Assignee: CYBERG CONTROL LTD.
    Inventor: Ofir Hason
  • Patent number: 10375113
    Abstract: A method which makes it possible to manage access control between a first entity and a second entity belonging to two security domains in a cloud network is disclosed. In one aspect the method comprises, if the entities belong to security domains implementing different access control policies, determining whether there exists a first access control rule between the first entity and a virtual entity within the security domain of the first entity, and a second access control second rule between the second entity and the virtual entity within the security domain of the second entity. If so, the method may comprise controlling access between the first and second entities as a function of the first and second rules.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: August 6, 2019
    Assignee: ORANGE
    Inventors: Ruan He, Yu Zhou
  • Patent number: 10372912
    Abstract: The disclosed embodiments include a method for disarming malicious code in a computer system having a processor. The method comprises accessing, by the computer system, input content, wherein the input content includes a plurality of data units having a value representing media content, and adjusting, by the processor, a data unit value of at least a portion of the data units, wherein the portion of the data units and an adjustment of the data unit value are determined so as to render any malicious code included in the plurality of data units inactive for its intended malicious purpose while not interfering with an intended use of the input content.
    Type: Grant
    Filed: July 2, 2018
    Date of Patent: August 6, 2019
    Assignee: VOTIRO CYBERSEC LTD.
    Inventors: Aviv Grafi, Itay Glick
  • Patent number: 10375118
    Abstract: Methods and apparatus for providing a mechanism that uses attribution information present in some network traffic to provide enhanced security for all network services protected by an attribution security system are disclosed.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: August 6, 2019
    Assignee: BlackRidge Technology Holdings, Inc.
    Inventor: John William Hayes
  • Patent number: 10375094
    Abstract: In some examples, a computing device may receive sensed data of a first sensor sent in a first transmission. The computing device may associate a first timestamp with the sensed data. Further, the computing device may receive, from other sensors, first signal strength information including first signal strength data and a first signal property related to the first transmission, and a second timestamp corresponding to detection of the first transmission. The computing device may receive, from other sensors, second signal strength information including second signal strength data and a second signal property related to a second transmission, and a third timestamp corresponding to detection of the second transmission. When the third timestamp is later than the first timestamp and the first signal property matches the second signal property, the computing device may indicate that a sensor that sent the second transmission is associated with an anomaly.
    Type: Grant
    Filed: October 4, 2016
    Date of Patent: August 6, 2019
    Assignee: Hitachi, Ltd.
    Inventors: Takeshi Shibata, Sudhanshu Gaur
  • Patent number: 10372903
    Abstract: Provided is a fraud detection rule updating method enabling the updating of rules that serve as the basis for detecting malicious frames as necessary in an on-board network system. In an on-board network system equipped with multiple electronic control units (ECUs) that communicate via buses and fraud detecting ECUs that determine, based on fraud detection rules, whether messages transmitted on the buses conform to the rules, a fraud detection rule updating method is used in which delivery data including updated fraud detection rules is received from a server external to the on-board network system, and if a certain update condition is satisfied, the fraud detection rules in a fraud detecting ECU are updated to the updated fraud detection rules.
    Type: Grant
    Filed: December 16, 2016
    Date of Patent: August 6, 2019
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Yoshihiro Ujiie, Hideki Matsushima, Tomoyuki Haga, Yuji Unagami, Takeshi Kishikawa
  • Patent number: 10360362
    Abstract: Various aspects directed towards automating an onboarding procedure are disclosed. In a first aspect, an administrative communication associated with onboarding an onboardable device is received by an access point (AP) device, such that the administrative communication originates from a device different than the onboardable device. The AP device then enables the onboardable device to access a secure network based on the administrative communication. In another aspect, an identifier is transmitted from an onboardable device while the onboardable device operates in an AP mode. The onboardable device then receives credentials associated with accessing a secure network via an AP device. Here, the credentials received from the AP device are in response to an authentication of the identifier by an administrator. The onboardable device then connects to the secure network by utilizing the credentials.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: July 23, 2019
    Assignee: QUALCOMM Incorporated
    Inventors: Zachary David Rattner, Christopher Rudolf Wingert, Robert Sean Daley, Patrik Nils Lundqvist
  • Patent number: 10360405
    Abstract: According to one embodiment, an anonymization apparatus according to an embodiment is configured to execute a determination process, a division process, and a process of recursively executing at least the determination process and the division process, and to thereafter execute anonymization. A number-of-kinds calculation circuit calculates a number of kinds of different attribute values for each of a plurality of attributes, before the determination process is executed. A determination circuit determines the attribute to be noticed, based on also the calculated number of kinds. A sort circuit sorts a plurality of personal data items, based on the calculated number of kinds, before the division process is executed.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: July 23, 2019
    Assignees: KABUSHIKI KAISHA TOSHIBA, TOSHIBA SOLUTIONS CORPORATION
    Inventors: Masanobu Koike, Pakin Osotkraphun
  • Patent number: 10362043
    Abstract: A method and an apparatus for detecting a man-in-the-middle attack, where the method includes receiving, by a macro evolved Node B (MeNB), a first check request message sent by a secondary evolved Node B (SeNB), where the first check request message includes first identifier information and a first data packet count value, generating a second check request message according to the first identifier information, sending the second check request message to a user terminal, receiving a first check response message generated by the user terminal according to the second check request message, where the first check response message includes second identifier information and a second data packet count value, determining, by the MeNB, that the man-in-the-middle attack exists between the SeNB and the user terminal when the first data packet count value is different from the second data packet count value.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: July 23, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Rong Wu, Chengdong He, Lu Gan
  • Patent number: 10360414
    Abstract: An anti-tamper system includes a first object, second objects, and an anti-tamper circuit that includes conductive networks and a control unit. Each conductive network includes: conductive modules, each of which is sandwiched between the first object and a corresponding second object; and conductive connection members which are coupled to the conductive modules in such away that at least the conductive modules and the conductive connection members cooperatively form a corresponding electrical path sequentially going through the second objects. The control unit detects damage of each electrical path, and initiates a predetermined action upon detecting the damage.
    Type: Grant
    Filed: March 8, 2017
    Date of Patent: July 23, 2019
    Assignee: MITAC COMPUTING TECHNOLOGY CORPORATION
    Inventor: Ming-Hsiung Lin
  • Patent number: 10354516
    Abstract: A security system comprises at least one component interconnected with the security system for detecting an alarm condition. A control panel is interconnected with the security system for at least one of controlling and communicating with the at least one component. A memory is interconnected with the control panel for storing a system identifier (ID) associated with the control panel and for storing connection information for accessing a system configuration file associated with the system ID. The system ID and the connection information are stored prior to interconnecting the control panel and the security system. The system configuration file identifies the at least one component and is stored remote from the security system.
    Type: Grant
    Filed: September 15, 2006
    Date of Patent: July 16, 2019
    Assignee: TYCO SAFETY PRODUCTS CANADA, LTD.
    Inventor: Stéphan Frenette