Patents Examined by Brandon S Hoffman
  • Patent number: 10291624
    Abstract: Disclosed is a system including a user device and a networked device for providing security and customization of the networked device. Example networked devices include IoT (Internet of Things) devices, such as electronics, software, sensors, network devices, and so on. In the disclosure, a user authenticates with the user device using a biometric. The user device transmits a user profile or settings information, optionally along with user biometric information, to the networked device to operate the networked device.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: May 14, 2019
    Assignee: Synaptics Incorporated
    Inventors: John Cronin, Joseph George Bodkin
  • Patent number: 10284373
    Abstract: Apparatus and methods performing secure communications in an energy delivery system. Energy delivery systems may include phasor measurement units (PMU), phasor data concentrators (PDC) along with power generation, transmission and consumption equipment. The PMU and PDC may communicate in a grid network over secured wired or wireless communication protocols. Embodiments may include utilizing spread spectrum communication between PMU devices and PDC devices to sustain energy delivery functionality during a communications attack. Communications security may include a cryptographic key management scheme for secure PMU and PDC communication and identification. Embodiments may include clustering of PMU and PDC data for analysis and real-time presentation to grid operators. Embodiments may include clustering of PMU devices in a hexagonal geometry to provide for frequency reuse among devices with directional antenna.
    Type: Grant
    Filed: December 12, 2014
    Date of Patent: May 7, 2019
    Assignee: University of North Dakota
    Inventors: Saleh Faruque, Prakash Ranganathan
  • Patent number: 10282553
    Abstract: Systems and methods for controlling the exposure of data privacy elements are provided. The systems and methods may generate an artificial profile model. The artificial profile model may include a constraint for generating new artificial profiles. A signal may be received indicating that a computing device is requesting access to a network location. One or more data privacy elements associated with the computing device can be detected. An artificial profile can be determined for the computing device. The artificial profile may be usable to identify the computing device. The one or more data privacy elements may be automatically modified according to the constraint included in the artificial profile model. The method may include generating a new artificial profile for the computing device. The new artificial profile may include the modified one or more data privacy elements. The new artificial profile may mask the computing device from being identified.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: May 7, 2019
    Assignee: Grey Market Labs, PBC
    Inventors: Kristopher Paul Schroeder, Timothy Ryan Underwood
  • Patent number: 10284574
    Abstract: Exemplary systems and methods for malware attack detection and identification are provided. A malware detection and identification system a controller that features an analysis environment including a virtual machine. The analysis environment to (1) receive data by the virtual machine of the analysis environment and identify a portion of the data that have been received from one or more untrusted, (2) monitor state information associated with the identified portion of the data during execution by the virtual machine, (3) identify an outcome of the state information by tracking the state information during execution of the identified portion of the data by the virtual machine, and (4) determine whether the identified outcome comprises a redirection in control flow during execution by the virtual machine of the portion of the data, the redirection in the control flow constituting an unauthorized activity.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: May 7, 2019
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Wei-Lung Lai, Jayaraman Manni
  • Patent number: 10282524
    Abstract: Intelligent content delivery enables content to be delivered to different devices in formats appropriate for those devices based on the capabilities of those devices. A user might access the same piece of content on two different devices, and can automatically receive a higher quality format on a device capable of playing that higher quality format. The user can purchase rights to content in any format, such that as new formats emerge or the user upgrades to devices with enhanced capabilities, the user can receive the improved formats automatically without having to repurchase the content. Further, the user can pause and resume content between devices even when those devices utilize different formats, and can access content on devices not otherwise associated with the user, receiving content in formats that are appropriate for those unknown devices even if the user has not previously accessed content in those formats.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: May 7, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Ethan Evans, Luis Felipe Cabrera, Hilliard Bruce Siegel, Peter N. DeSantis
  • Patent number: 10284566
    Abstract: Various systems and methods for providing a walk away lock are provided herein. A plurality of data packets may be received at a compute device from a user device. Here, each packet has corresponding time-to-receive value. A baseline latency value of the plurality of data packets may be determined based on their respective time-to-receive values. Additional data packets may be received from the user device, each of these additional data packets having their own corresponding time-to-receive values. A current latency value of the additional data packets may be calculated based on the respective time-to-receive values. A security operation may be performed based on the baseline latency value and the current latency value.
    Type: Grant
    Filed: April 1, 2016
    Date of Patent: May 7, 2019
    Assignee: Intel Corporation
    Inventors: Hormuzd M. Khosravi, David A. Bronleewe, Khaled Almahallawy
  • Patent number: 10277580
    Abstract: Techniques are disclosed for generating multiple key pairs using different algorithms and similarly installing certificates signed using the different algorithms. A customer server receives a selection of algorithms for generating a public/private key pair (e.g., RSA, ECC, DSA, etc.). The customer server generates key pairs for each selection and also generates corresponding certificate signing requests (CSR). The customer server sends the CSRs to a certificate authority (CA). The CA generates certificates associated with algorithm and sends the certificates to the customer server. The customer server may prompt a user to select one or more of the certificates to install, and upon receiving the selection, the customer installs the certificates.
    Type: Grant
    Filed: September 19, 2017
    Date of Patent: April 30, 2019
    Assignee: DigiCert, Inc.
    Inventors: Michael Klieman, Perry Tancredi
  • Patent number: 10277570
    Abstract: A communication apparatus includes a holding unit, an updating unit, an authentication unit, a mode controller, and a mode acquisition unit. The holding unit holds configuration information used to control the communication apparatus. The updating unit updates the configuration information held in the holding unit with occasional configuration information. The authentication unit performs user authentication in communication with the external apparatus. The mode controller controls the mode of the communication apparatus. The mode acquisition unit acquires the mode of the communication apparatus controlled by the mode controller. The configuration information includes an account configuration used for the authentication unit. Depending on a result of acquisition performed by the mode acquisition unit, the updating unit does not update, with the occasional configuration information, at least part of the account configuration included in the configuration information held in the holding unit.
    Type: Grant
    Filed: January 22, 2016
    Date of Patent: April 30, 2019
    Assignee: Canon Kabushiki Kaisha
    Inventor: Shinjiro Takami
  • Patent number: 10277606
    Abstract: Methods and systems are disclosed for providing approaches to anonymous application wrapping on a mobile device. The methods and systems may include receiving, by a controller service, a request to associate a first application executing on a client device with the controller service, and obtaining, by the controller service, a first application identifier associated with the first application. The methods and systems may also include receiving, by the controller service from an application service, a request for a first service and a conditional application identifier, and configuring, by the controller service and based on the request for the first service, the first application with a second set of one or more policy instructions used to control the first application.
    Type: Grant
    Filed: March 2, 2018
    Date of Patent: April 30, 2019
    Assignee: Citrix Systems, Inc.
    Inventors: Richard Hayton, Georgy Momchilov, Gary Barton, Andrew Innes
  • Patent number: 10270602
    Abstract: A method, system, and computer usable program product for verifying and enforcing certificate use are provided in the illustrative embodiments. A certificate is received from a sender. The certificate is validated before communicating a message associated with the certificate to a receiver. If the certificate is invalid, a policy is selected based on a type of invalidity of the certificate. An action is taken to enforce the policy for using the certificate. The certificate may be received from the sender at a proxy. The validating may further include verifying the validity of the certificate using a certificate from a certificate database accessible to the proxy over a network. the proxy may copy a part of the certificate database to a second certificate database local to the proxy. The validating may further include verifying the validity of the certificate using a certificate revocation list accessible to the proxy over a network.
    Type: Grant
    Filed: October 1, 2008
    Date of Patent: April 23, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Heather Maria Hinton
  • Patent number: 10270743
    Abstract: Proxy-based access occurs between a cloud database and analytical client tool, without requiring a separate intervening application server. A client proxy (tool side) communicates exclusively with a server proxy (database side). In response to a connect request in a database protocol (e.g., Structured Query Language—SQL) received from the tool by the client proxy, the server proxy is caused to initiate an authentication process (e.g., using Security Assertion Markup Language—SAML) with an Identity Provider (IdP). The client proxy intercepts and extracts a security token from the IdP in order to establish a tunnel with the server proxy. Upon ultimately receiving the connect command through the tunnel, the server proxy replaces an end-user credential (recognized by the tool but meaningless to the database) with the security token in order to establish a technical user and a query session context that can be recognized by the database.
    Type: Grant
    Filed: October 11, 2016
    Date of Patent: April 23, 2019
    Assignee: SAP SE
    Inventor: Peter Eberlein
  • Patent number: 10270762
    Abstract: Disclosed is a user authentication method including at least: (1) performing a primary conversion to generate a first common authentication key and performing a secondary conversion to provide an encrypted first common authentication key, and registering the encrypted first common authentication key; (2) generating a first server authentication key, and performing an OTP operation on the first server authentication key to generate first server authentication information; (3) performing a primary conversion to generate a second common authentication key, performing a secondary conversion to generate an encrypted second common authentication key, generating a first user authentication key, and performing an OTP operation on the first user authentication key to generate first user authentication information; and (4) performing a user authentication or an authentication of the authentication server for determining a genuineness of the authentication server, based on coincidence of the first server authentication
    Type: Grant
    Filed: March 20, 2017
    Date of Patent: April 23, 2019
    Assignee: SSenStone Inc.
    Inventors: Chang Hun Yoo, Un Yeong Heo, Min Gyu Kim, Woo Yong Seo
  • Patent number: 10262137
    Abstract: A method for providing security recommendations is described. In one embodiment, the method may include identifying a set of monitored customers. In some cases, each monitored customer may include one or more computing devices. The method may include identifying a first computing device of a monitored customer for evaluation, selecting a potential security product to install on the first computing device, and quantifying the ability of the monitored customer to detect or prevent malware incidents based at least in part on the selected potential security product.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: April 16, 2019
    Assignee: Symantec Corporation
    Inventors: Michael Hart, Kevin Alejandro Roundy, Shang-Tse Chen, Christopher Gates
  • Patent number: 10264024
    Abstract: Aspects of the subject technology relate to administration of wireless peripheral devices. A computer-implemented method includes connecting to a peripheral device through a first connection, and determining a peripheral identifier corresponding to the peripheral device. The method further includes associating the peripheral identifier with a device identifier corresponding to a user device and sending an updated policy based on the association between the peripheral identifier and the device identifier to the peripheral device through the first connection. The method further includes pairing, through the first connection, the peripheral device and the user device based on the updated policy to establish a second connection between the peripheral device and the user device.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: April 16, 2019
    Assignee: GOOGLE LLC
    Inventor: Jian Wei Leong
  • Patent number: 10263966
    Abstract: Rules are applied at a network perimeter to outbound network communications that contain file attachments. The rules may, in a variety of circumstances, require wrapping of an outbound file from the endpoint in a portable encrypted container. The network perimeter may be enforced locally at the endpoint, or at any network device between the endpoint and a recipient.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: April 16, 2019
    Assignee: Sophos Limited
    Inventors: Russell Humphries, Gordon Sullivan, Kenneth D. Ray, Anthony John Merry, Harald Schutz, Andreas Berger
  • Patent number: 10262155
    Abstract: Examples are generally directed towards disabling features using a feature toggle associated with an application programming interface (API). A server receives an API request including one or more elements. An element is associated with a set of features. If a feature state of every feature within the set of features is an enabled feature state, the element state is an enabled element state and the request is validated. The validated request is executed and a response to the request is returned to the client. If at least one feature state of at least one feature within the set of features is a disabled feature state or a hidden feature state, the element state is a disabled element state and the request is invalided. The invalidated request is rejected and an error message is returned to the client.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: April 16, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Hao Sun, Jim Pendergraft, Jichao Zhang, Link Yu, Wei Wang, Nicholas Wei
  • Patent number: 10263960
    Abstract: A wireless communication device 1 encrypts a passphrase which corresponds to a communication mode after change and which is a character string for authentication by using an encryption key PTK corresponding to a communication mode before change, and transmits the encrypted passphrase to a wireless communication device 2, and also creates an encryption key PTK corresponding to the communication mode after change from the passphrase corresponding to the communication mode after change. The wireless communication device 2 receives the encrypted passphrase transmitted from the wireless communication device 1 and decrypts the encrypted passphrase by using an encryption key PTK corresponding to the communication mode before change, and also creates an encryption key PTK corresponding to the communication mode after change from the decrypted passphrase.
    Type: Grant
    Filed: July 14, 2014
    Date of Patent: April 16, 2019
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Shintaro Fujikami, Yukimasa Nagai, Takenori Sumi
  • Patent number: 10263974
    Abstract: An apparatus is provided for facilitating cross-platform authentication. The apparatus may include at least one memory and at least one processor configured to detect that a visual token includes data indicating one or more authentication credentials for accessing a communication device in response to scanning the visual token. The computer program code may further cause the apparatus to communicate the authentication credentials of the detected visual token to the communication device to request the communication device to determine whether the authentication credentials are valid for a user. The computer program code may further cause the apparatus to enable access to the communication device in response to receiving an indication from the communication device that the authentication credentials of the detected visual token are valid. Corresponding computer program products and methods are also provided.
    Type: Grant
    Filed: September 20, 2017
    Date of Patent: April 16, 2019
    Assignee: United Parcel Service of America, Inc.
    Inventors: Weiqun Jack Zheng, Robert Frederick Myrick
  • Patent number: 10262142
    Abstract: The field of the invention relates to systems and methods for advanced dynamic analysis scanning for vulnerabilities using a universal translator. In an embodiment, the system includes a dynamic analysis scanner subsystem communicatively coupled to a networked computing system; the scanner subsystem is configured to crawl one or more dynamic web pages of the networked computing system, generate test data for the networked computing system, transmit the generated test data to the networked computing system, and record the networked computing system's response to the generated test data. The scanner may further comprise a universal translator configured to detect vulnerabilities and generate test data for the dynamic web pages of the networked computing system. The scanner subsystem may further comprise a smart scheduler.
    Type: Grant
    Filed: March 14, 2016
    Date of Patent: April 16, 2019
    Assignee: Rapid7 LLC
    Inventors: Dan Kuykendall, Matthew Cohen, Dmitriy Kashitsyn, Andrew Tisdale, Michael J. Morton, Artem Astrakhantsev
  • Patent number: 10264016
    Abstract: The present disclosure discloses a method of allowing Web View to verify the security level of a web content and inform the user with regards to the security and blocks web contents that are determined harmful or inappropriate. In one embodiment of the present disclosure, the Web View checks a trusted data source to see if the visited web content has been labeled or flagged as safe or unsafe by initiating a connection to a trusted third-party database using a to determine whether or not the URL is associated with a domain that has been classified or labeled as safe or unsafe. The Web View then informs the user about the security level of the web content through a visual indicator or it can redirect the user to a warning page explaining why access to the site is prohibited, or it can block access without warning.
    Type: Grant
    Filed: April 23, 2016
    Date of Patent: April 16, 2019
    Inventor: Paul Fergus Walsh