Patents Examined by C. Wang
  • Patent number: 10439802
    Abstract: Processing circuitry includes key store hardware that stores a plurality of encryption keys. Key stream generator hardware generates a plurality of key streams from the plurality of encryption keys, wherein each key stream comprises a repeating stream of key data. Key river generator hardware generates a key river by parallelizing the plurality of key streams as key river symbols, wherein bits from each key river symbol are selected from each key stream as individual bits from differing ones of the plurality of encryption keys. Binary processor hardware generates a key path as a sequence of binary digits generated from at least one binary function of the key river.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: October 8, 2019
    Inventor: Lawrence P. Huang
  • Patent number: 10409970
    Abstract: A system and method obtain a recording of an interaction with a user and a screen recording related to the interaction; extract, from the screen recording, a unique identification value related to the user; resolve the identity of the user using the extracted unique identification value; and associate the user with the recorded interaction by associating the unique identification value with the interaction.
    Type: Grant
    Filed: February 22, 2016
    Date of Patent: September 10, 2019
    Assignee: Nice Ltd.
    Inventors: Tal Zur, Roie Mandler, Oren Weiss
  • Patent number: 10404667
    Abstract: The disclosure includes novel encryption and/or decryption methods and systems that provide various security benefits. More specifically, the disclosure includes a description of a file encryption process and its ability to dynamically control permissions on who is allowed to decrypt the file. Moreover, the disclosed process permits an encrypted file to be freely distributed without losing the ability to govern/regulate decryption.
    Type: Grant
    Filed: November 17, 2016
    Date of Patent: September 3, 2019
    Assignee: Bank of America Corporation
    Inventors: Shankar Ramasubramanian Iyer, Navanith R. Keerthi, Maria Auxilia Dominique
  • Patent number: 10402560
    Abstract: Methods, systems, and computer program products for selecting a virtual machine to perform a task corresponding to a client request and performing the task at the virtual machine. After performing the task at the virtual machine, an indicator corresponding to a shutdown of the virtual machine is detected. After detecting the indicator and prior to the shutdown of the virtual machine, a memory space is preserved corresponding to the virtual machine. The preserved memory space is then scanned for malware.
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: September 3, 2019
    Assignee: RED HAT, INC.
    Inventor: David Gilbert
  • Patent number: 10395032
    Abstract: An apparatus for testing, inspecting or screening an electrically powered device for modified or unmodified hardware, firmware or software modifications including Malware, Trojans, adware, improper versioning, worms, or virus and the like, includes an antenna positioned at a distance from the electrically powered device and a signal receiver or sensor for examining a signal from the electrically powered device. The receiver or sensor collects unintended RF energy components emitted by the electrically powered device and includes one or more processors and executable instructions that perform analysis in a response to the acquired signal input while the electrically powered device is active or powered. The characteristics of the collected RF energy may be compared with RF energy characteristics of an unmodified device. The comparison determines one of a modified, unmodified or score of certainty of modified condition of the electrically powered device.
    Type: Grant
    Filed: March 19, 2015
    Date of Patent: August 27, 2019
    Assignee: NOKOMIS, INC.
    Inventors: Walter John Keller, Bogdan Amaru Pathak, Andrew Richard Portune, Todd Eric Chornenky
  • Patent number: 10397238
    Abstract: Systems and methods are provided for managing electronic tokens for device interactions. In some embodiments, a unified graphical user interface is provided for an account, for controlling the activation status and settings associated with authorized electronic devices used for conducting transactions on the account. The electronic devices may be programmed with an electronic token that allows a server to look up sensitive account information, although the electronic token does not divulge the account information itself. Therefore, if an electronic token is compromised or stolen, the account does not need to be closed, and sensitive information remains safe. Moreover, the unified graphical user interface provides detailed and highly customizable controls for settings and restrictions associated with each of the electronic tokens, without modifying or accessing sensitive account or personal information.
    Type: Grant
    Filed: February 23, 2018
    Date of Patent: August 27, 2019
    Assignee: Capital One Services, LLC
    Inventors: Paul Moreton, Lawrence Douglas, Thomas Poole, Thomas Christopher Clarke, Saejin Choi
  • Patent number: 10387676
    Abstract: Embodiments use crowd disambiguation techniques to protect the privacy of potentially sensitive client resources in web transactions. Crowd disambiguation servers can aggregate information about resources, such as URLs, accessed by clients, in the form of resource fingerprints submitted by the clients. Said resource fingerprints can be used to provide crowd-sourced services in a privacy-protected manner. For example, in some embodiments a fingerprint of a URL visited by a client can be communicated to the server as both a fully ambiguated resource instance (FARI) and a partially disambiguated resource instance (PDRI). When only one client, or a limited number of clients, has communicated a certain resource fmgerprint, the underlying identity of the resource, in this case the URL, remains obfuscated from the crowd disambiguation server, which lacks sufficient information to reconstruct it.
    Type: Grant
    Filed: September 14, 2015
    Date of Patent: August 20, 2019
    Assignee: VIASAT, INC.
    Inventors: David F Lerner, Peter J Lepeska, Douglas C Larrick, Devin R Toth
  • Patent number: 10379845
    Abstract: Implementations provide for a source to image transformation pipeline for a Platform-as-a-Service (PaaS) system. A method of the disclosure includes receiving a request to create an application for execution on a Platform-as-a-Service (PaaS) system, identifying, by a processing device, at least one of language or a framework corresponding to the application, identifying, by the processing device, a build image corresponding to the identified at least one of the language or the framework, constructing, by the processing device, a build configuration object, a deployment configuration object, and a networking configuration object for the application, and transmitting, by the processing device, the build configuration object, the deployment configuration object, and the networking configuration object to the PaaS system to enable the PaaS system to build and deploy the application at one or more nodes of the PaaS system without user intervention.
    Type: Grant
    Filed: August 8, 2017
    Date of Patent: August 13, 2019
    Assignee: Red Hat, Inc.
    Inventors: Benjamin Parees, Cesar Wong, Clayton Coleman
  • Patent number: 10379925
    Abstract: Embodiments of the present invention provide a system and methods for detecting power bugs. In one embodiment, a computer-implemented method for analyzing a computer code includes generating a control flow graph for at least a portion of the computer code at a processor. The method further includes identifying power bugs by traversing the control flow graph if the control flow graph exits without performing a function call to deactivate power to any component of a device configured to execute computer executable instructions based on the compute code after performing a function call to activate power.
    Type: Grant
    Filed: November 21, 2016
    Date of Patent: August 13, 2019
    Assignee: Purdue Research Foundation
    Inventors: Yu Charlie Hu, Abhilash Jindal, Samuel Midkiff, Abhinav Pathak
  • Patent number: 10375116
    Abstract: Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score and a current protection, level of the data item. A policy is applied to determine an appropriate protection for the data item based upon the sensitivity score and the current protection level. A protected data item is provided to the client device by applying the appropriate protection to the data item.
    Type: Grant
    Filed: March 2, 2017
    Date of Patent: August 6, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved, Wilfried Teiken
  • Patent number: 10372893
    Abstract: Embodiments of the present disclosure relate to a new approach for sensor-based authentication to enhance mobile security. In the computer-implemented method, motion related sensor data is obtained. A label of a behavior is determined wherein the behavior has a time information of the behavior. The label is associated with at least part of the motion related sensor data based on the time information of the behavior and the time information of the motion. At least one comparable motion is determined from the associated part of motion related sensor data. At least one motion passcode based on the determined comparable motion is identified.
    Type: Grant
    Filed: November 1, 2016
    Date of Patent: August 6, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jing Li, Jie Ma, Li Jun Mei, Jian Wang
  • Patent number: 10372383
    Abstract: Embodiments of the present disclosure provide a method, system and computer program product for providing a secure access to data in mobile devices by acquiring the data from one of a plurality of remote storage devices in response to receiving an access request for the data from one or more applications; storing the data in a secure memory space in the mobile device; providing the one or more applications with an access to the data in the secure memory space when a predetermined condition is satisfied, wherein the predetermined condition at least comprises the one or more applications having an access permission to the secure memory space.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: August 6, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Patrick Minggang Lu, Chao Chen, Grissom Tianqing Wang, Yong Que, Lu Lei
  • Patent number: 10365941
    Abstract: Methods and systems for providing a communication path are disclosed. Information can be received via a first communication session based on a first messaging protocol. The first communication session can be terminated at a virtual machine of a group of virtual machines. A dynamically bound communication path to a resource can be selected based on a dynamically reconfigurable routing table for the group of virtual machines. A second communication session can be initiated, at the virtual machine, via the selected dynamically bound communication path. The information can be transmitted to the resource via the second communication session based on a second messaging protocol.
    Type: Grant
    Filed: October 18, 2016
    Date of Patent: July 30, 2019
    Assignee: COMCAST CABLE COMMUNICATIONS, LLC
    Inventors: Sudhir Borra, Douglas Makofka
  • Patent number: 10356075
    Abstract: A method, a computing system and a computer program product are provided. A computing device identifies a credential of a first entity and determines one or more second entities, each electronically verifying the credential of the first entity. The computing device determines one or more third entities, each electronically verifying one or more from a group of second entities and other ones of the third entities, wherein the second and third entities form a set of chains of verification from the first entity. The computing device analyzes the set of chains of verification to detect one or more loops within the set of chains among the second and third entities. A verification of the credential is generated by the computing device based on detection of a trusted entity within one of the set of chains and not detecting a loop within the one of the set of chains.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: July 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Rahul Gupta, David B. Kumhyr, Hari H. Madduri, Maharaj Mukherjee
  • Patent number: 10324831
    Abstract: Described are techniques for testing software. The techniques may include identifying, at a first point in time, first code that has been modified, identifying, using first mapping information, a testing set of one or more test cases wherein the first mapping information identifies each test case of the testing set as a test case used to test the first code, running the testing set, generating coverage information in accordance with executing; analyzing the coverage information, generating second mapping information in accordance with said analyzing, and updating the first mapping information in accordance with the second mapping information.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: June 18, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Zhipeng Zhang, Shouyuan Cheng, Binbin Deng, Bo Wu, Binhua Lu, Scott D. Von Rhee
  • Patent number: 10325088
    Abstract: A system is provided for facilitating multi-party authentication. During operation, the system receives, via a communication module, an operation request from a primary user. The system then sends an authentication request to the authentication assistance user and receives a response from the authentication assistance user. Subsequently, the system allows or denies the operation request based on the response received from the authentication assistance user.
    Type: Grant
    Filed: June 3, 2015
    Date of Patent: June 18, 2019
    Assignee: ALIBABA GROUP HOLDING LIMITED
    Inventor: Jinsai Chen
  • Patent number: 10303879
    Abstract: A multi-tenant trusted platform module (MTTPM) is attached to a communication bus of a virtualization host. The MTTPM includes a plurality of per-guest-virtual-machine (per-GVM) memory location sets. In response to an indication of a first trusted computing request (TCR) associated with a first GVM of a plurality of GVMs instantiated at the virtualization host, a first memory location of a first per-GVM memory location set is accessed to generate a first response indicative of a configuration of the first GVM. In response to an indication of a second TCR associated with a second GVM, a second memory location of a second-per-GVM memory location set is accessed to generate a second response, wherein the second response is indicative of a different configuration of the second GVM.
    Type: Grant
    Filed: November 6, 2014
    Date of Patent: May 28, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Nachiketh Rao Potlapally, Uwe Dannowski, Derek Del Miller, David James Borland, Rahul Gautam Patel, William John Earl
  • Patent number: 10296305
    Abstract: A method for automated generation and provision of at least one client/server-based software application having a user interface for a user is provided. The method provides at least the following: an application platform, which a user can log into, at least one client-specific database in which data can be stored, at least one application model stored in the client-specific database for generating the at least one software application, which application model is used to describe the functionality of the software application, a user interface and the data structure in a machine-processable form, and a model engine on the application platform for accessing data in the client-specific database.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: May 21, 2019
    Inventor: Rudolf Markus Petri
  • Patent number: 10289437
    Abstract: A system and method are disclosed for managing idle processors in virtualized systems. In accordance with one embodiment, a hypervisor executing on a host computer receives an anticipated idle time for a processor of the host computer system from a guest operating system of a virtual machine executing on the host computer system. When the anticipated idle time divided by a performance multiplier exceeds an exit time of a first power state of the processor, the processor is caused to be halted.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: May 14, 2019
    Assignee: Red Hat Israel, Ltd.
    Inventors: Henri Han van Riel, Michael Tsirkin
  • Patent number: 10289422
    Abstract: A device includes a first processor and a second processor, the first processor being able to execute a boot loader. The device implements a phase of boot-securing in the event of an electrical anomaly occurring while the boot loader is being updated, the phase of boot-securing being implemented by way of an emergency power supply source acting as a relay for a main power supply, the phase of boot-securing including the following steps: stopping the current updating of the boot loader; and invalidating the boot loader. The device implements a phase of delayed booting of the second processor, enabling to boot the device in a boot loader update mode if the stored boot loader is invalid.
    Type: Grant
    Filed: September 9, 2014
    Date of Patent: May 14, 2019
    Assignee: SAGEMCOM BROADBAND SAS
    Inventor: Nicolas Dangy-Caye