Patents Examined by Brian F Shaw
  • Patent number: 10664145
    Abstract: This application discloses various unlocking control methods and apparatuses, and various electronic devices. An unlocking control method disclosed herein comprises: in response to an orientation of a to-be-unlocked first control plane of an electronic device as a reference orientation, acquiring second unlocking input information through a second control plane of the electronic device, and an orientation of the second control plane and the orientation of the first control plane being different; according to the second unlocking input information, unlocking the first control plane. This application improves privacy and security of the unlocking control.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: May 26, 2020
    Assignee: BEIJING ZHIGU RUI TUO TECH CO., LTD.
    Inventor: Ran Xu
  • Patent number: 10659463
    Abstract: A customer care site includes a content item posted by a first user. The content item is associated with a first contact link for requesting communication with the first user. When a second user tries to contact the first user by selecting the first contact link, a computing system associated with the customer care site identifies contact information of the first user using information associated with the first contact link. The computing system can establish a communication session between the first user and the second user without revealing contact information of the first user and the second user to each other during the communication session.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: May 19, 2020
    Assignee: T-Mobile USA, Inc.
    Inventor: Christopher Harvey Joul
  • Patent number: 10652257
    Abstract: A computer-implemented method for detecting anomalous behavior of one or more computers in a large group of computers comprises (1) receiving log files including a plurality of entries of data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with the actions of one computer, (2) applying a first plurality of algorithms to determine features of the data which may contribute to anomalous behavior of the computers, and (3) applying a second plurality of algorithms to determine which computers are behaving anomalously based upon the features.
    Type: Grant
    Filed: July 7, 2017
    Date of Patent: May 12, 2020
    Assignee: State Farm Mutual Automobile Insurance Company
    Inventors: Rajiv Shah, Shannon Morrison, Jeremy Cunningham, Taylor Smith, Sripriya Sundararaman, Jing Wan, Jeffrey Hevrin, Ronald Duehr, Brad Sliz, Lucas Allen
  • Patent number: 10635810
    Abstract: Disclosed are systems and associated methods for protecting systems against software intended to damage or disable computers and computer systems, commonly called “malware” especially encrypting malware. Both agent-based and agentless implementations allow the identification of malware and the protection of local and cloud-based data by observing changes to filesystem structure and the information content of files, with no need to scan memory or interfere with the processing of individual processes. The data permeability of the protected system can be dynamically changed, allowing user-directed changes to be committed to storage and backed up, while adverse or potentially adverse changes are quarantined.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: April 28, 2020
    Assignee: JUNGLE DISK, L.L.C.
    Inventor: Bret Piatt
  • Patent number: 10630699
    Abstract: A module for providing security to an in-vehicle communication network having a bus and at least one node connected to the bus, the module including: a memory having software including a model of an expected behavior of data communications over the portion of the in-vehicle communication network; and a processor that processes, responsive to the software in the memory, a plurality of messages registered from a portion of the in-vehicle network to: determine, based on the model and a context comprising attributes of the plurality of messages, whether or not at least one of the messages complies with the model; and if the at least one message does not comply with the model, then perform at least one action on the message.
    Type: Grant
    Filed: August 14, 2017
    Date of Patent: April 21, 2020
    Assignee: Argus Cyber Security Ltd.
    Inventors: Yaron Galula, Ofer Ben Noon, Oron Lavi
  • Patent number: 10609043
    Abstract: Some embodiments of reassembly-free deep packet inspection (DPD on multicore hardware have been presented. In one embodiment, a set of packets of one or more files is received at a networked device from one or more connections. Each packet is scanned using one of a set of processing cores in the networked device without buffering the one or more files in the networked device. Furthermore, the set of processing cores may scan the packets substantially concurrently.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: March 31, 2020
    Assignee: SONICWALL INC.
    Inventors: Aleksandr Dubrovsky, John E. Gmuender, Huy Minh Nguyen, Ilya Minkin, Justin M. Brady, Boris Yanovsky
  • Patent number: 10602352
    Abstract: A method for managing ciphering configurations for LTE WLAN Aggregation includes a source evolved Node B ciphering configuration which is implemented at a mobile device and at a source eNB, for communicating data between the mobile device and the source eNB via a WLAN node. A WLAN ciphering configuration is implemented at the mobile device and at the WLAN node, for communicating data between the mobile device and the source eNB via the WLAN node. In response to determining that the WLAN ciphering configuration has been implemented, a message is transmitted indicating that the WLAN ciphering configuration has been implemented and at least one action is performed in response to the message.
    Type: Grant
    Filed: June 7, 2017
    Date of Patent: March 24, 2020
    Assignee: JRD COMMUNICATIONS INC.
    Inventor: Caroline Jactat
  • Patent number: 10599867
    Abstract: Embodiments described herein provide a privacy mechanism to protect user data when transmitting the data to a server that estimates a frequency of such data amongst a set of client devices. In one embodiment, a differential privacy mechanism is implemented using a count-mean-sketch technique that can reduce resource requirements required to enable privacy while providing provable guarantees regarding privacy and utility. For instance, the mechanism can provide the ability to tailor utility (e.g. accuracy of estimations) against the resource requirements (e.g. transmission bandwidth and computation complexity).
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: March 24, 2020
    Assignee: Apple Inc.
    Inventors: Abhishek Bhowmick, Andrew H. Vyrros, Umesh S. Vaishampayan, Kevin W. Decker, Conrad Shultz, Steve Falkenburg, Mateusz Rajca
  • Patent number: 10601797
    Abstract: In one embodiment, a network management system associated with a multi-hop wireless network may receive registration information associated with a network node, wherein the registration information comprises cipher text encoded with a public key, and wherein the cipher text comprises a MAC address and one or more of a firmware hash assigned to the network node or a serial number assigned to the network node. The network management system may decode the cipher text with a private key corresponding to the public key. The network management system may record the registration information in a lookup table on a data store of the network management system. The network management system may register the network node associated with the recorded registration information as an unignited network node on the multi-hop wireless network.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: March 24, 2020
    Assignee: Facebook, Inc.
    Inventor: David Thiel
  • Patent number: 10594694
    Abstract: Disclosed embodiments relate to securely caching and provisioning secrets for use in an offline process. Techniques include accessing, at an endpoint computing resource storing a secret, a first cryptographic key; encrypting the secret using the first cryptographic key; receiving, from an auxiliary device, a second cryptographic key; encrypting the encrypted secret with the second cryptographic key to produce an encrypted block; sending, without using a network connection, the encrypted block to the auxiliary device for decryption; receiving, from the auxiliary device and without using a network connection, a decrypted version of the encrypted block; and decrypting the encrypted secret with a cryptographic key corresponding to the first cryptographic key.
    Type: Grant
    Filed: March 11, 2019
    Date of Patent: March 17, 2020
    Assignee: CYBERARK SOFTWARE LTD.
    Inventors: Arthur Bendersky, Dima Barboi
  • Patent number: 10594655
    Abstract: Methods and systems for classifying malicious locators. A processor is trained on a set of known malicious locators using a non-supervised learning procedure. Once trained, the processor may classify new locators as being generated by a particular generation kit.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: March 17, 2020
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Aditya Kuppa, Suchin Gururangan, Andrew Reece
  • Patent number: 10567371
    Abstract: In a method for enabling support for backwards compatibility in a User Domain, in one of a Rights Issuer (RI) and a Local Rights Manager (LRM), a Rights Object Encryption Key (REK) and encrypted REK are received from an entity that generated a User Domain Authorization for the one of the RI and the LRM and the REK is used to generate a User Domain Rights Object (RO) that includes the User Domain Authorization and the encrypted REK.
    Type: Grant
    Filed: February 18, 2019
    Date of Patent: February 18, 2020
    Assignee: GOOGLE TECHNOLOGY HOLDINGS LLC
    Inventor: David W. Kravitz
  • Patent number: 10554421
    Abstract: Once information requesting superseding of a log-in through an authentication app is obtained from a service provision app on a user terminal, a service provision server transfers authentication request response information to the service provision app and, after an authentication redirection request thereof is transferred to the authentication app and then server challenge request information is obtained, server challenge request response information is transferred to the authentication app, thereby supporting the determination as to whether or not certificates of the server and the app are valid, an authentication result message including information on the validity is obtained from an authentication server, a predetermined access token is transferred to the service provision app, and thereby the log-in is handled by providing support such that a service can be used.
    Type: Grant
    Filed: August 14, 2019
    Date of Patent: February 4, 2020
    Assignee: Coinplug, Inc.
    Inventors: Seung Il Ra, Hee Soon Kim, Jay Wu Hong, Joon Sun Uhr
  • Patent number: 10554657
    Abstract: Disclosed are various embodiments for using an audio interface device to facilitate authentication for other devices. An authentication service causes a first client device to present an authentication code via an output device of the first client device. The authentication service receives the authentication code from a second client device. The second client device is in an authenticated state for access to an account, and the second client device received the authentication code from an environmental sensor while in a listening mode. The authentication service authenticates the first client device for access to the account in response to determining that the authentication code received from the second client device matches the authentication code presented by the first client device.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: February 4, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Shariq Siddiqui, Daniel Wade Hitchcock, Bharath Kumar Bhimanaik, Natalie Nguyen, Annabelle Richard Backman
  • Patent number: 10541983
    Abstract: Systems and techniques are disclosed for secure storage and searching of information on insecure search systems. One of the methods is implemented by a system of one or more computers being in communication with clients and search engines. A request associated with storage of client information in a search engine is obtained. First cryptographic information is generated based on a portion of the client information, such that the first cryptographic is to be utilized for indexing by the search engine. Second cryptographic information is generated based on performing an order-preserving encryption process on portion of the client information, such that the second cryptographic information is to be utilized to recover order associated with information included in the portion. The first cryptographic information and the second cryptographic information are provided for storage in the search system.
    Type: Grant
    Filed: July 19, 2017
    Date of Patent: January 21, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Afshin Khashei Varnamkhasti, Bogdan Ciprian Pistol
  • Patent number: 10536458
    Abstract: This invention provides a method for managing a transaction right in a digital rights management server. The transaction right is the right to a transaction of a utilization right of a digital content item. The method comprises steps of obtaining an attribute associated with the digital content item from metadata of the digital content item; and generating the transaction right on the basis of a pre-stored rule and the attribute of the digital content item. Since the transaction right is generated on the basis of the attribute of the digital content item, or in other words, the transaction right is dependent on the attribute of the digital content item, the generated transaction right of digital content items can be different if the corresponding attribute associated with the digital content items are different. Furthermore, in additional to the metadata, the generation of the transaction right only requires the pre-stored rule, resulting in affordable complexity and cost.
    Type: Grant
    Filed: November 1, 2013
    Date of Patent: January 14, 2020
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Jin Qu, Fulong Ma, Xin Ge
  • Patent number: 10511615
    Abstract: A system for detecting a non-targeted attack by a first machine on a second machine is provided. The system includes an application that includes instructions configured to: extract network data corresponding to traffic flow between the first and second machines, where the second machine is implemented in a cloud-based network; identify a first suspect external IP address based on the network data; calculate features for the first suspect external IP address, where the features include exploration type features and exploitation type features; train a classifier based on predetermined examples and the features to generate and update a model; classify the first suspect external IP address based on the model and at least some of the features; and perform a countermeasure if a classification provided from classifying the first suspect external IP address indicates that the first suspect external IP address is associated with a malicious attack on the second machine.
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: December 17, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Royi Ronen, Hani Hana Neuvirth, Tomer Koren, Omer Karin
  • Patent number: 10505953
    Abstract: A cyber-security system and method for proactively predicting cyber-security threats are provided. The method comprises receiving a plurality of security events classified to different groups of events; correlating the plurality of received security events to classify potential cyber-security threats to a set of correlation types; determining a correlation score for each classified potential cyber-security threat; and determining a prediction score for each classified potential cyber-security threat, wherein the prediction score is determined based in part on the correlation score.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: December 10, 2019
    Assignee: Empow Cyber Security Ltd.
    Inventors: Rami Cohen, Avi Chesla, Shlomi Medalion, Ron Katz
  • Patent number: 10492076
    Abstract: A method of securely supporting at least one application for use on a wireless device, including storing a plurality of locations, storing a plurality of public asymmetric keys for encryption of the plurality of locations, providing an interface for a virtual store, providing the location of a plurality of authorization files, displaying a list of applications available for the wireless device, presenting content associated with the list of applications available for the wireless device, receiving a customer selection of an application, creating an authorization file comprising the location of the application, storing the plurality of authorization files, providing an authorization file, authorizing one of the plurality of locations based on decryption of at least one of the plurality of public asymmetric keys, and installing on the wireless device the user selected application.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: November 26, 2019
    Assignee: TRACFONE WIRELESS, INC.
    Inventor: Satish Ramprasad
  • Patent number: 10484344
    Abstract: A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials). The secret is stored in a directory such that it is retrievable when the unique user input is received via a user interface of a device on which the security application executes or is coupled with. Responsive to receiving an identifier associated with the secret, the security application prompts, e.g., via a user interface of the mobile phone, entry of the unique user input; and, subsequently, verifies the unique user input. Following such verification, the security application provides the secret for use in encoding a communication with a remote computer-based station. Entry of the user credentials may be required prior to the security application generating the secret, and may be responsive to receipt of an invitation (e.g., from the remote computer-based station) to generate it.
    Type: Grant
    Filed: December 7, 2018
    Date of Patent: November 19, 2019
    Assignee: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder