Patents Examined by Canh Le
-
Patent number: 10257705Abstract: This document describes, inter alia, techniques for configuring or setting up a wireless device. As an example of the features described herein, a first wireless device may be used to configure a second wireless device as follows: the first wireless device may detect that the second wireless device is available and is configurable; the first wireless device may connect to the second wireless device and transmit configuration information to the second wireless device, where the configuration information includes credentials that may be used to access a wireless network (e.g., a password to access a Wi-Fi network); the first wireless device and the second wireless device may then both connect to the wireless network, using the credentials; once both devices are connected to the wireless network, the first wireless device may verify that the second wireless device has been correctly configured.Type: GrantFiled: May 28, 2014Date of Patent: April 9, 2019Assignee: Apple Inc.Inventors: Bob Bradley, Andrew W. Burks, Gregg J. Golembeski
-
Patent number: 10248781Abstract: A system and method unlock a passcode-secured device using force detection and haptic feedback. When prompted for a passcode, a user applies a press and hold gesture, applying continuous pressure force, to a surface of the device while receiving tactile feedback at the surface in the form of vibratory pulses. The vibratory pulses continue until the pressure force is released from the surface. The user counts the number of pulses sensed by tactile feedback at the surface until the desired number is obtained, then releases the pressure force from the surface, signaling that the pulse count should be entered as a passcode digit value. The process is repeated for each sequential passcode digit until a passcode is entered in the device. The device unlocks if the entered passcode matches a reference passcode in the device.Type: GrantFiled: May 16, 2016Date of Patent: April 2, 2019Assignee: BlackBerry LimitedInventors: Michael Joseph DeFazio, Ryan Gerard Ebbers
-
Patent number: 10243948Abstract: A communication apparatus enhances security in transmitting electronic mail to a destination mail address without degrading operability. An MFP is connected to an authentication server and a mail server via a network. A user name and password are entered in a user name entry screen. The MFP requests the authentication server to authenticate the entered user name and password. When the user name and password are authenticated, the MFP is operable to acquire an e-mail address, a SMTP authentication user name, and a SMTP authentication password according to SMTP associated with the authenticated user name and password from the authentication server. The MFP requests the mail server to authenticate the acquired SMTP authentication user name and SMTP authentication password according to SMTP. When the SMTP authentication user name and the SMTP authentication password are authenticated, the MFP is operable to transmit e-mail to the mail server.Type: GrantFiled: November 22, 2013Date of Patent: March 26, 2019Assignee: CANON KABUSHIKI KAISHAInventor: Nobuyuki Tonegawa
-
Patent number: 10243928Abstract: Various techniques that allow group members to detect the use of stale encryption policy by other group members are disclosed. One method involves receiving a message from a first group member via a network. The message is received by a second group member. The method then detects that the first group member is not using a most recent policy update supplied by a key server, in response to information in the message. In response, a notification message can be sent from the second group member. The notification message indicates that at least one group member is not using the most recently policy update. The notification message can be sent to the key server or towards the first group member.Type: GrantFiled: January 29, 2016Date of Patent: March 26, 2019Assignee: Cisco Technology, Inc.Inventors: Warren Scott Wainner, Sheela D. Rowles, Brian E. Weis, David Arthur McGrew, Scott R. Fluhrer, Kavitha Kamarthy
-
System and method to detect domain generation algorithm malware and systems infected by such malware
Patent number: 10198579Abstract: Systems and methods for detection of domain generated algorithms (DGA) and their command and control (C&C) servers are disclosed. In one embodiment, such an approach includes examining DNS queries for DNS resolution failures, and monitoring certain set of parameters such as number of levels, length of domain name, lexical complexity, and the like for each failed domain. These parameters may then be compared against certain thresholds to determine if the domain name is likely to be part of a DGA malware. Domain names identified as being part of a DGA malware may then be grouped together. Once a DGA domain name has been identified, activity from that domain name can be monitored to detect successful resolutions from the same source to see if any of the successful domain resolutions match these parameters. If they match specific thresholds, then the domain is determined to be a C&C server of the DGA malware and may be identified as such.Type: GrantFiled: August 22, 2014Date of Patent: February 5, 2019Assignee: MCAFEE, LLCInventors: Neeraj Thakar, Praveen Kumar Amritaluru, Vikas Taneja -
Patent number: 10164972Abstract: A system receives a request to authenticate a user and determines a first set of cell identifiers of a card matrix to associate with the user. The system receives a first factor, which comprises a first set of received cell values corresponding to the first set of cell identifiers of the card matrix. The system further determines a first set of stored cell values corresponding to the first set of cell identifiers of the card matrix and compares the first set of received cell values to the first set of stored cell values. The system also receives a second factor, which is different than the first factor. Finally, the system determines that the user is authenticated based at least in part upon the comparison of the first set of receives cell values to the first set of stored cell values.Type: GrantFiled: January 28, 2016Date of Patent: December 25, 2018Assignee: Bank of America CorporationInventors: Amanda J. Adams, Lawrence R. LaBella
-
Patent number: 10146926Abstract: Embodiments for providing differentiated authentication for accessing groups of compartmentalized computing resources, and accessing each compartmentalized computing resources, as displayed on a desktop environment of an operating system. In one embodiment, a method includes organizing one or more computing resources accessible in a desktop environment into a group. The one or more computing resources include a data content, an application, a network portal, and a device. The method also includes providing an authentication policy for actions that can be performed on each computing resource. The authentication policy is configured to associate an authentication input to each action for a particular computing resource. The method further includes receiving an authentication input when the user intends one of the actions on the particular computing resource.Type: GrantFiled: July 18, 2008Date of Patent: December 4, 2018Assignee: Microsoft Technology Licensing, LLCInventor: Thomas C. Jones
-
Patent number: 10140453Abstract: A vulnerability records manager (VRM) receives respective vulnerability data sets (VDS) from a first and second vulnerability information collector. Each VDS comprises values of a different set of attributes defined in a vulnerability taxonomy specification. The VRM normalizes the VDSs to generate a first and second vulnerability record comprising a particular plurality of attributes defined in the specification, and stores the vulnerability records in a repository. In response to a request received via a programmatic interface, the VRM transmits contents of the vulnerability records to an automated risk analyzer or a reporting/presentation component.Type: GrantFiled: March 16, 2015Date of Patent: November 27, 2018Assignee: Amazon Technologies, Inc.Inventor: Stephen George Fridakis
-
Patent number: 10142362Abstract: Systems and method are implemented by one or more servers associated with a cloud-based security system, for determining security risks of entities including users or groups of users associated with the cloud-based security system and optimizing remediation based thereon. The method includes maintaining logs of transactions through the cloud-based security system; obtaining a plurality of attributes from the transactions while excluding impossible comparison items from the transactions; performing empirical scoring on normalizing the plurality of attributes for ranking risky entities; identifying the risky entities based on one of the empirical scoring and analytics; and updating policies and/or monitoring in the cloud-based system based on the identifying.Type: GrantFiled: June 2, 2016Date of Patent: November 27, 2018Assignee: Zscaler, Inc.Inventors: Loren Weith, Deepen Desai, Amit Sinha
-
Patent number: 10133873Abstract: The present invention addresses the deficiencies of the art in respect to data security control and provides a method, system and computer program product for securing confidential data through transient on-demand data security control. In one embodiment of the invention, a method of securing confidential data can be provided. The method can include decrypting confidential data in a document, determining a subset of the confidential data specified by an author of the document, rendering a view of the confidential data including the subset, and, in response to detecting when an authorized viewer of the document no longer views the document, concealing the subset of the confidential data while maintaining a view of the confidential data not included in the subset.Type: GrantFiled: September 9, 2007Date of Patent: November 20, 2018Assignee: International Business Machines CorporationInventors: Barry A. Kritt, Thomas S. Mazzeo, Rodney E. Shepard, II
-
Patent number: 10116623Abstract: Token-based firewall functionality. A request is received for access to a resource from a remote user device, the request received by an application firewall. A token is associated with the request. The token and associated information are stored in an event correlator coupled with the application firewall. The token is associated with one or more subsequent actions by the resource in response to receiving the request. A response to the request including the token is generated. The response with the token is transmitted to the remote user device via the application firewall. The application firewall analyzes the response and determines an action to be taken on the response based on the token and the associated information.Type: GrantFiled: May 19, 2016Date of Patent: October 30, 2018Assignee: salesforce.com, inc.Inventor: Yoel Gluck
-
Patent number: 10091194Abstract: A computing platform may receive, from a client portal server, a request to authenticate a first user to a first user account. The computing platform may generate a first one-time passcode for a first computing device associated with the first user account and may send, to the first computing device, the first one-time passcode. The computing platform also may generate a second one-time passcode for a second computing device associated with the first user account and may send, to the second computing device, the second one-time passcode. Thereafter, the computing platform may receive first one-time passcode input and second one-time passcode input, which the computing platform may validate. Based on the validating, the computing platform may generate a validation message directing the client portal server to provide the first user with access to the first user account, which the computing platform may send to the client portal server.Type: GrantFiled: May 12, 2016Date of Patent: October 2, 2018Assignee: Bank of America CorporationInventors: Elizabeth S. Votaw, Andrew T. Keys
-
Patent number: 10079678Abstract: Embodiments of methods, systems, and storage medium associated with providing access to encrypted data for authorized users are disclosed herein. In one instance, the method may include obtaining a derived value for an authenticated user based on user personalization data of the authenticated user, and generating a user-specific encryption key based on the derived value. The derived value may have entropy in excess of a predetermined level. The user-specific encryption key may enable the authenticated user to access the encrypted data stored at the storage device. Other embodiments may be described and/or claimed.Type: GrantFiled: July 24, 2012Date of Patent: September 18, 2018Assignee: Intel CorporationInventors: Ned M. Smith, George W. Cox, David Johnston
-
Patent number: 10075846Abstract: Systems and methods for continuous and transparent verification, authentication, and identification of individuals are provided. A method can include detecting a signal from a sensor embedded in a wearable device, determining a set of features unique to the wearer of the wearable device, creating a user profile of that individual, detecting a signal from a sensor of an unknown individual, determining a set of features unique to the unknown individual, and comparing the features of the unknown individual to the previously created user profile.Type: GrantFiled: August 10, 2017Date of Patent: September 11, 2018Assignee: The Florida International University Board of TrusteesInventors: Abbas Acar, Hidayet Aksu, Kemal Akkaya, A. Selcuk Uluagac
-
Patent number: 10068100Abstract: A facility for interacting with an electronic document is described. The facility causes to be displayed a visual representation of the document, and receives input representing a painting interaction with a portion of the displayed visual representation of the document that corresponds to a portion of the document. In response to receiving the first input, the facility imposes on the corresponding portion of the document a distinguished content classification level.Type: GrantFiled: January 20, 2016Date of Patent: September 4, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Jonathan Edgar Fay, Robert Earl Standefer, III, Christopher Lee Mullins, Joshua Allen Cowhig
-
Patent number: 10057238Abstract: Devices, systems, and methods for generating a secure token specific to an online service provider are provided. User account information of a user is transmitted to a token processor from an online service provider requesting a secure token generation. The token processor also receives, from the online service provider, exchange information for an exchange between the user and the online service provider. The token processor generates, based on the exchange information and the user account information, a secure token to be used for the exchange. The generated secure token is mapped to the online service provider and transmitted to the online service provider. The exchange information is deleted from the online service provider. The stored secure token is usable only at the mapped online service provider.Type: GrantFiled: February 28, 2018Date of Patent: August 21, 2018Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventor: Michael Gulledge
-
Patent number: 10015768Abstract: The disclosed computer-implemented method for locating unrecognized computing devices may include (1) identifying a plurality of cooperating computing devices on a wireless network that are each configured with a device location application, (2) determining a physical location for each cooperating computing device within the plurality of cooperating computing devices, (3) receiving, from the device location application on the plurality of cooperating computing devices, data about packets intercepted by the plurality of cooperating computing devices that are directed to the wireless network by an unrecognized computing device, and (4) locating the unrecognized computing device based on information received from the plurality of cooperating computing devices that identifies both the physical location for each cooperating computing device and signal strengths of the packets intercepted by the plurality of cooperating computing devices.Type: GrantFiled: December 12, 2016Date of Patent: July 3, 2018Assignee: Symantec CorporationInventors: Qiyan Wang, Anand Kashyap
-
Patent number: 10007807Abstract: Methods and systems for managing I/O requests in a secure storage appliance are disclosed. One method includes receiving a plurality of I/O requests at the secure storage appliance, each I/O request associated with a block of data and a volume, each volume associated with a plurality of shares stored on a plurality of physical storage devices. The method further includes storing a plurality of blocks of data in buffers of the secure storage appliance, each of the blocks of data associated with one or more of the plurality of I/O requests. The method also includes associating a state with each of the blocks of data, the state selected from a plurality of states associated with processing of an I/O request.Type: GrantFiled: December 30, 2008Date of Patent: June 26, 2018Assignee: Unisys CorporationInventors: Scott Summers, Albert French
-
Patent number: 10003458Abstract: Management of user keys for public key authentication using the SSH in large SSH deployments is automated by deploying a management system in the environment, discovering SSH identity keys and authorized keys, analyzing authorized connections between user accounts, and automatically managing the authorized connections and the key pairs used for authentication.Type: GrantFiled: December 21, 2012Date of Patent: June 19, 2018Assignee: SSH COMMUNICATIONS SECURITY CORP.Inventor: Tatu J. Ylonen
-
Patent number: 9998432Abstract: A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence.Type: GrantFiled: December 28, 2015Date of Patent: June 12, 2018Assignee: Dennis DurayInventor: Dennis Dupray