Patents Examined by Brandon S Hoffman
  • Patent number: 10721285
    Abstract: Systems and methods for quick start-up of playback in accordance with embodiments of the invention are disclosed. Media content may be encoded in a plurality of alternative streams and a quick start-up stream. The quick start-up stream may include media content that is encoded at a lower quality that the alternative streams and may be encrypted with a different, less secure encryption process than that of the alternative streams. During a start-up of playback, the playback device streams the media content from a quick start-up stream until a metric, such as a decryption key for the alternative streams is met. The device then streams the media content from the alternative streams in response to the metric being met.
    Type: Grant
    Filed: August 10, 2018
    Date of Patent: July 21, 2020
    Assignee: DIVX, LLC
    Inventors: Jason Braness, William David Amidei, Cristina Dobrin
  • Patent number: 10719616
    Abstract: A method for communicating between a client application and a license-governing application. The method includes receiving a request at a content application from the client application to access media content from the license-governing application, generating a message at the content application to the license-governing application to request client authentication, and receiving at the content application a client authorization token from the license-governing application. A message is generated at the content application to the client application to request user authentication, and the content application receives an authorization code from the client application.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: July 21, 2020
    Assignee: Beatport, LLC
    Inventors: Sean M. Sullivan, Natalie A. Wolfe, Michael R. McConnell
  • Patent number: 10705923
    Abstract: A method begins with a processing module selecting one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory. The method continues with the processing module sending a DSN memory access request to the one of the plurality of DS processing modules. The method continues with the processing module selecting another one of the plurality of DS processing modules when no response is received within a given time frame or when the response to the access request does not include an access indication. The method continues with the processing module sending the DSN memory access request to the another one of the plurality of DS processing modules.
    Type: Grant
    Filed: November 9, 2018
    Date of Patent: July 7, 2020
    Assignee: PURE STORAGE, INC.
    Inventors: Jason K. Resch, Wesley Leggette
  • Patent number: 10708257
    Abstract: Systems and methods are disclosed for authenticating an identity of an online user. One method includes receiving from the user, through a first device, a request to access a web page associated with the user's online account; transmitting to the user an image that contains a unique ID and a URL of an authentication server; and receiving from the user, through the first device, an authentication request containing the unique ID. The method also includes receiving from the user, through a second device, a log-in ID associated with the user and the unique ID; and authenticating the identity of the user to grant the user access, through the first device, to the web page associated with the user's online account.
    Type: Grant
    Filed: January 30, 2018
    Date of Patent: July 7, 2020
    Assignee: Oath Inc.
    Inventors: Scott Dorfman, Donald P. Sengpiehl
  • Patent number: 10706158
    Abstract: Systems and methods for controlling the exposure of data privacy elements are provided. The systems and methods may generate an artificial profile model. The artificial profile model may include a constraint for generating new artificial profiles. A signal may be received indicating that a computing device is requesting access to a network location. One or more data privacy elements associated with the computing device can be detected. An artificial profile can be determined for the computing device. The artificial profile may be usable to identify the computing device. The one or more data privacy elements may be automatically modified according to the constraint included in the artificial profile model. The method may include generating a new artificial profile for the computing device. The new artificial profile may include the modified one or more data privacy elements. The new artificial profile may mask the computing device from being identified.
    Type: Grant
    Filed: February 20, 2019
    Date of Patent: July 7, 2020
    Assignee: Grey Market Labs, PBC
    Inventors: Kristopher Paul Schroeder, Timothy Ryan Underwood
  • Patent number: 10708057
    Abstract: A control system based on dynamic password and USBKEY including a dynamic password control chip, a USB control chip, a USB interface, a battery, and a detection circuit. The detection circuit is configured to output a detection signal to the dynamic password control chip when it is detected that the USB interface is connected with an external device; the dynamic password control chip is configured to enter a sleep mode when receiving a detection signal; the battery is configured to supply power to the dynamic password control chip and to reduce the power supplied to the dynamic password control chip when the dynamic password control chip enters the sleep mode.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: July 7, 2020
    Assignee: Shenzhen Excelsecu Data Technology Co., LTD
    Inventor: Liuzhang Chen
  • Patent number: 10701063
    Abstract: A first interface is transmitted from the server computer system to a user computer system, the first interface having a field for entering a mobile telephone number. A mobile phone number entered into the field for the mobile phone number is received from the user computer system at the server computer system. A password is generated and transmitting from the server computer system to a mobile device having a mobile phone number corresponding to the mobile phone number received from the user computer system and a second interface is transmitted from the server computer system to the user computer system, the second interface including a field for entering the password. A follow-up message is transmitted from the server computer system to the mobile device if the password is not received from the user computer system at the server computer system within a predetermined period of time.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: June 30, 2020
    Assignee: IHEARTMEDIA MANAGEMENT SERVICES, INC.
    Inventor: Paula Buzzard
  • Patent number: 10693634
    Abstract: The disclosure provides a key generation method and apparatus. The key generation method comprises: encrypting a first key factor generated by a first device with an initial key, and sending the encrypted first key factor to a second device through a first secure channel, wherein the initial key is a key preset for the first device and the second device; receiving, through the first secure channel, a second key factor encrypted with the initial key, wherein the second key factor is generated by the second device; decrypting the second key factor encrypted with the initial key and received through the first secure channel, so as to obtain the second key factor; and generating a shared key between the first device and the second device according to the first key factor and the second key factor.
    Type: Grant
    Filed: August 16, 2016
    Date of Patent: June 23, 2020
    Assignee: ALIBABA GROUP HOLDING LIMITED
    Inventors: Qing An, Yingfang Fu
  • Patent number: 10691784
    Abstract: Systems, methods, and processor-readable media are disclosed to adaptively secure access operations with respect to electronic resources. A request from an endpoint device may be detected, and adaptive authentication may be initiated. Identifiers for the endpoint device may be generated or retrieved. An access-right indicator may be identified to facilitate determination of whether particularized access for electronic resources is to be granted. Initiation of access events by the endpoint device may be detected. Sensor-based data that is based on a first set of sensors capturing phenomena at the endpoint device may be received. A particularized specification of recognized patterns mapped to the access-right indicator may be adaptively developed. A nonconformance of additional data with respect to the particularized specification may be detected.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: June 23, 2020
    Assignee: PEARSON EDUCATION, INC.
    Inventors: Derek Frempong, Geanie Paek, Andrew Silverman
  • Patent number: 10693917
    Abstract: Providing streaming of applications from streaming servers onto clients. The applications are contained within isolated environments, and the isolated environments are streamed from the servers onto clients. The system may include the option of running both in on-line and off-line. When on-line, the system may include authentication of the streaming servers and authentication of clients and credentialing of the isolated environments and applications the clients are configured to run. The system may further include encrypted communication between the streaming servers and the clients. When off-line, the system may include the ability to run already installed isolated environments without requiring credentialing. The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: June 23, 2020
    Assignee: OPEN INVENTION NETWORK LLC
    Inventor: Allan Havemose
  • Patent number: 10691782
    Abstract: An electronic device for acquiring biometric information may include a display, and a fingerprint sensor configured to acquire fingerprint data through at least a partial display region of the display. A processor may execute a first application in which a graphical object is displayed, for controlling a designated function other than a fingerprint registration function. A user input on the graphical object may be used to collect fingerprint information, which is used as part of a fingerprint registration function.
    Type: Grant
    Filed: December 26, 2017
    Date of Patent: June 23, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Hyeongwook Yang, Kyungsoo Lim, Hyung-Woo Shin, Hyemi Lee, Heekuk Lee, Yumin Jung, Tushar Balasaheb Sandhan, Pil-Joo Yoon
  • Patent number: 10691783
    Abstract: Systems, methods, and processor-readable media are disclosed to adaptively secure access operations with respect to electronic resources. A request from an endpoint device may be detected, and adaptive authentication may be initiated. Identifiers for the endpoint device may be generated or retrieved. An access-right indicator may be identified to facilitate determination of whether particularized access for electronic resources is to be granted. Initiation of access events by the endpoint device may be detected. Sensor-based data that is based on a first set of sensors capturing phenomena at the endpoint device may be received. A particularized specification of recognized patterns mapped to the access-right indicator may be adaptively developed. A nonconformance of additional data with respect to the particularized specification may be detected.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: June 23, 2020
    Assignee: PEARSON EDUCATION, INC.
    Inventors: Derek Frempong, Geanie Paek, Andrew Silverman
  • Patent number: 10693874
    Abstract: Systems, methods, and processor-readable media are disclosed to adaptively secure access operations with respect to electronic resources. A request from an endpoint device may be detected, and adaptive authentication may be initiated. Identifiers for the endpoint device may be generated or retrieved. An access-right indicator may be identified to facilitate determination of whether particularized access for electronic resources is to be granted. Initiation of access events by the endpoint device may be detected. Sensor-based data that is based on a first set of sensors capturing phenomena at the endpoint device may be received. A particularized specification of recognized patterns mapped to the access-right indicator may be adaptively developed. A nonconformance of additional data with respect to the particularized specification may be detected.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: June 23, 2020
    Assignee: PEARSON EDUCATION, INC.
    Inventors: Derek K. Frempong, Geanie Paek, Andrew Silverman
  • Patent number: 10693895
    Abstract: According to an example, security indicator access determination may include determining a security indicator that is received from a first entity by a security indicator sharing platform for sharing with a second entity. A rule associated with identification of a third entity that has access to the security indicator may be analyzed. The third entity may be different from the second entity, and if the second entity belongs to a community, the third entity may not be in the community of the second entity. A determination may be made as to whether to identify the third entity based on the analysis of the rule. In response to a determination that the third entity is to be identified or not to be identified, the third entity may be identified to the first entity, or not identified to the first entity.
    Type: Grant
    Filed: July 22, 2014
    Date of Patent: June 23, 2020
    Assignee: Micro Focus LLC
    Inventors: Anurag Singla, Amir Kibbar, Tomas Sander, Edward Ross, Serhan Shbeita
  • Patent number: 10693966
    Abstract: An Internet of things (IoT) system, including a distributed system of virtual machines, includes at least one IoT platform system control engine, that includes a platform system control engine secure system space and a IoT platform system control engine user defined space, at least one network node device that includes a network node device secure system space and an IoT network node device user defined space, and at least one edge device that includes an edge device secure system space and an edge device user defined space, where the secure system space of the control engine, the network node device, and the edge device are each configured to be secured to prevent unauthorized access, and the user defined spaces of the platform system control engine, the network node device and the edge device each define a respective virtual machine.
    Type: Grant
    Filed: August 22, 2017
    Date of Patent: June 23, 2020
    Assignee: FYBR
    Inventors: Paul Becker, Linnell Gorden, Jr., Bret Beringer, James Crain, Mrinal Wadhwa, Richard E. Goodwin
  • Patent number: 10686827
    Abstract: An endpoint encrypts local files with a key to protect file contents. If the endpoint or processes on the endpoint becomes exposed to potentially harmful locations or resources, the key can be revoked to prevent access to encrypted files on the endpoint. In order to facilitate continued operation of the endpoint, files that are currently open can be encrypted with a second key so that the corresponding data is isolated from the other encrypted files while remaining accessible to current users.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: June 16, 2020
    Assignee: Sophos Limited
    Inventors: Harald Schutz, Anthony John Merry, Kenneth D. Ray, Andreas Berger
  • Patent number: 10686796
    Abstract: Methods, systems and computer programs for verifying permissioning rights to one or more data resources associated with a data processing platform (DPP) are disclosed. An exemplary method comprises receiving an assertion statement (AS) identifying a user, a data resource and an operation performable with respect to the data resource, the operation comprising a read operation or a view operation, and applying the AS to a network database storing an access control list defining, for each of a plurality of data resources associated with the DPP, one or more users having permission to perform one or more operations on the respective data resource, wherein applying the AS is effective to determine validity of the AS in relation to the data resource identified in the AS. If the assertion is false, an error message is generated for output; if the assertion is true, the read operation or the view operation is executed.
    Type: Grant
    Filed: October 12, 2018
    Date of Patent: June 16, 2020
    Assignee: Palantir Technologies Inc.
    Inventor: Luke Tomlin
  • Patent number: 10673886
    Abstract: Methods and systems for visualizing, analyzing, archiving and securing computer and internet of things (IoT) data networks are disclosed. The system includes a data collection device (sensor), preprocessing unit, analysis unit containing at least the Koopman mode analysis unit, and a postprocessing unit. The methods include Koopman mode analysis, support vector machines or deep learning used to compute the baseline, detect and rank known and unknown threats to the system, visualize and archive them. The methods also include creating and representing an Artificial Intelligence (AI) determined risk level indicators; using combined intel and notice alert severities with the AI risk level indicators to rank the alerts; using the AI indicators to create zero day risks; an AI Button to show the AI indicators and ranked alerts on a computer screen; and graphic user interfaces (GUI) to intuitively represent and interact with the AI indicators and ranked alerts.
    Type: Grant
    Filed: September 26, 2019
    Date of Patent: June 2, 2020
    Assignee: PacketSled, Inc.
    Inventors: Igor Mezic, Troy Molsberry, Ante Kalajzic, Aleksandr Andrejcuk, Bryan Elliot
  • Patent number: 10673854
    Abstract: Systems and methods for proactively deleting applications and/or deactivating permissions granted thereto are described. A system determines a user's usage pattern of an application. The system also determines a standard usage pattern associated with the application. The standard usage pattern may be determined from application usage patterns of multiple users of the system. When the user's usage pattern deviates from the standard usage pattern, the system may cause the application to be deleted from one or more of the user's devices. The system may also deactivate user permissions associated with the application when the user's usage pattern deviates from the standard usage pattern. The system also outputs an indication to the user soliciting whether the system to re-download the application and/or reactivate the permissions.
    Type: Grant
    Filed: September 12, 2017
    Date of Patent: June 2, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Felix Wu, Rohan Mutagi
  • Patent number: 10674360
    Abstract: A user equipment (UE) may be configured to transmit a registration message to a network to establish a secure connection for non-access stratum (NAS) messages between the network and a UE, the secure connection based at least in part on a UE identifier and security capabilities of the UE included in the registration message. The UE may then exchange NAS methods with the network over the secure connection. The UE may also establish, in response to the registration message, an authentication protocol with the network and encrypt subsequent NAS messages based in part on the authentication protocol.
    Type: Grant
    Filed: May 7, 2019
    Date of Patent: June 2, 2020
    Assignee: Qualcomm Incorporated
    Inventors: Soo Bum Lee, Anand Palanigounder, Adrian Edward Escott