Patents Examined by Chi Nguy
-
Patent number: 9769250Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to a trigger, such as determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.Type: GrantFiled: July 2, 2015Date of Patent: September 19, 2017Assignee: Architecture Technology CorporationInventors: Judson Powers, Stephen K. Brueckner, Robert A. Joyce, Kenneth J. Thurber
-
Patent number: 9766986Abstract: A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database.Type: GrantFiled: August 27, 2013Date of Patent: September 19, 2017Assignee: Architecture Technology CorporationInventors: Stephen K. Brueckner, Robert A. Joyce, Carl Manson, Hajime Inoue, Kenneth J. Thurber
-
Patent number: 9762593Abstract: Systems and methods to automatically generate signatures used to detect malware are provided. The systems and methods use machine learning techniques, to build an over-trained heuristic model to analyze software, cluster identified patterns, validate the clusters against known reputational metrics, automatically create signatures and, in some examples, deploy such signatures to remote computing devices.Type: GrantFiled: September 9, 2014Date of Patent: September 12, 2017Assignee: Symantec CorporationInventors: Mark Kennedy, Kenneth Coleman
-
Patent number: 9760637Abstract: A encrypted text wildcard search method enables wildcard search of encrypted text by using a permuterm index storing permuted keyword strings that are encrypted using an order preserving encryption algorithm. The permuted keyword strings are encrypted using an order preserving encryption algorithm or a modular order preserving encryption algorithm and stored in the permuterm index. In response to a search query containing a wildcard search term, the encrypted text wildcard search method transforms the wildcard search term to a permuted search term having a prefix search format. The permuted search term having the prefix search format is then used to perform a range query of the permuterm index to retrieve permuted keyword strings having ciphertext values that fall within the range query. In some embodiments, the encrypted text wildcard search method enables prefix search, suffix search, inner-wildcard search, substring search and multiple wildcard search of encrypted text.Type: GrantFiled: September 11, 2015Date of Patent: September 12, 2017Assignee: Skyhigh Networks, Inc.Inventor: Paul Grubbs
-
Patent number: 9672189Abstract: The present invention discloses methods for effective network-security inspection in virtualized environments, the methods including the steps of: providing a data packet, embodied in machine-readable signals, being sent from a sending virtual machine to a receiving virtual machine via a virtual switch; intercepting the data packet by a sending security agent associated with the sending virtual machine; injecting the data packet into an inspecting security agent associated with a security virtual machine via a direct transmission channel which bypasses the virtual switch; forwarding the data packet to the security virtual machine by employing a packet-forwarding mechanism; determining, by the security virtual machine, whether the data packet is allowed for transmission; upon determining the data packet is allowed, injecting the data packet back into the sending security agent via the direct transmission channel; and forwarding the data packet to the receiving virtual machine via the virtual switch.Type: GrantFiled: July 23, 2009Date of Patent: June 6, 2017Assignee: CHECK POINT SOFTWARE TECHNOLOGIES, LTD.Inventors: Ofer Raz, Amnon Perlmutter, Erez Berkner
-
Patent number: 9672335Abstract: A method of user logon to a computing device or computer system that, distinct from requiring entry of a set of known logon credentials such as a username and password, introduces an additional thought-directed user interface whereby the user must respond to one or more prompts that measure the user's cognitive function at the time of logon or during an active logon session. The user's responses to these prompts are evaluated for several purposes, including determining whether the user demonstrates the required level of cognitive function to gain access to the computer system or continue an active logon session. The user's responses and associated data may also be stored and retrieved at a later time for various purposes, including determining whether and to what extent the user's level of cognitive function is improving, diminishing, or remaining static over time.Type: GrantFiled: December 15, 2010Date of Patent: June 6, 2017Inventors: Laird H Shuart, Dustin Matthew Engelhaupt, Sharon Elizabeth Jankowski, Bruce David Jankowski, Marcia L. Shuart
-
Patent number: 9654972Abstract: Techniques are described for securely provisioning a client device. A client device may output first client information over a secure interface to a trusted device to be transmitted to an authentication server. Second client information related to the first client information may be transmitted to the authentication server. The authentication server may link the second client information and the first client information. The client device may receive an encrypted authentication credential from the authentication server. The authentication credential may be encrypted based at least in part on the first client information or the second client information. The client device may decrypt the encrypted authentication credential using the first client information, the second client information, or a shared secret key.Type: GrantFiled: August 18, 2014Date of Patent: May 16, 2017Assignee: QUALCOMM IncorporatedInventors: Olivier Jean Benoit, Peerapol Tinnakornsrisuphap
-
Patent number: 9612979Abstract: An apparatus to protect contents of a memory region is presented. In one embodiment, the apparatus includes a non-volatile memory, memory check logic to generate check values for protected memory regions, and comparison logic to compare stored check values from the non-volatile memory with generated check values from the memory check logic. The apparatus also includes security logic to prevent executing code in the protected memory regions if the comparison logic detects a mismatch between the stored check values and the generated check values.Type: GrantFiled: October 22, 2010Date of Patent: April 4, 2017Assignee: Intel CorporationInventor: Yen Hsiang Chew
-
Patent number: 9563766Abstract: A device authenticates accessories by detecting that an accessory is attached to the device, determining a unique identification (ID) for the accessory, determining, based on the unique ID, if the accessory has been paired to the device, and in response to determining that the accessory has been paired to the device, enable use of the accessory by the device. In response to determining the accessory has not been paired to the device, the devices performs a secondary authentication process on the accessory.Type: GrantFiled: April 30, 2014Date of Patent: February 7, 2017Assignee: Infineon Technologies Austria AGInventors: Cheow Guan Lim, Robert P. Rozario
-
Patent number: 9548988Abstract: The disclosed computer-implemented method for attributing potentially malicious email campaigns to known threat groups may include (1) identifying a potentially malicious email campaign targeting at least one organization, (2) detecting, within the potentially malicious email campaign, an incriminating feature that has been linked to a known threat group, (3) determining, based at least in part on detecting the incriminating feature linked to the known threat group, that the known threat group is likely responsible for the potentially malicious email campaign, and then in response to determining that the known threat group is likely responsible for the potentially malicious email campaign, (4) attributing the potentially malicious email campaign to the known threat group. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: August 18, 2014Date of Patent: January 17, 2017Assignee: Symantec CorporationInventors: Kevin Alejandro Roundy, Olivier Thonnard
-
Patent number: 9548999Abstract: The obfuscation of information included in Session Initiation Protocol (SIP) invites for the purposes of facilitating Lawfully Authorized Electronic Surveillance (LAES) is contemplated. The obfuscation may include the use of LAES headers with invites of sessions that require surveillance as well as those not requiring surveillance and/or selecting values or otherwise influencing parameter selection of data included in LAES headers according to a validity function, a shared secret, a key or other construct.Type: GrantFiled: May 1, 2014Date of Patent: January 17, 2017Assignee: Cable Television Laboratories, Inc.Inventors: David Hancock, Sumanth Channabasappa
-
Patent number: 9525667Abstract: A method and system for roaming website accounts and passwords are provided. The method is operational on a first client and includes: authenticating website accounts and passwords that have been stored; obtaining the stored website addresses, accounts and passwords according to a success verification; encrypting the stored website addresses, accounts and passwords for generating encrypted information, and generating a first QR code to be obtained by a second client according to the encrypted information. The website accounts and passwords are roamed and synchronized to be shared. The synchronization process verifies the accounts and passwords, and would not need a third-party server. Risk of data lost in case that the third-party server is attacked would be eliminated, and the safety for the accounts and passwords is improved.Type: GrantFiled: April 30, 2014Date of Patent: December 20, 2016Assignee: TENCENT TECHNOLOGY (SHENZHEN) CO., LTD.Inventor: Wanxin Wang
-
Patent number: 9521153Abstract: A system and method of providing a platform trust extension for an information handling system is disclosed herein. The platform trust extension receives a notification that an application is selected for installation or execution on an information handling system. The identify of the application or the source of the application is identified based upon a signature of the application. The platform trust extension determines whether the application or the source of the application is semi-trusted based upon the signature of the application. If the application is semi-trusted, the platform trust extension permits the application to run at an additional trust level.Type: GrantFiled: August 18, 2014Date of Patent: December 13, 2016Assignee: Dell Products L.P.Inventor: Gabriel Jakobus Grosskopf
-
Patent number: 9497029Abstract: Various embodiments are generally directed to hardening the performance of calculations of a digital signature system for authenticating computing devices against side-channel attacks. An apparatus comprises a processor circuit and an interface operative to communicatively couple the processor circuit to a network; a storage communicatively coupled to the processor circuit and arranged to store instructions operative on the processor circuit to digitally sign a message to create a first signature using a modular arithmetic operation arranged to compensate for a value of a variable greater than a modulus without use of a branching instruction; and transmit the first signature to a verifying server via the network. Other embodiments are described and claimed herein.Type: GrantFiled: September 28, 2012Date of Patent: November 15, 2016Assignee: INTEL CORPORATIONInventors: Sergey Kirillov, Jiangtao Li, Marc A. Valle
-
Patent number: 9467492Abstract: One embodiment provides a system for assembling a reconstructable content stream. The system obtains a content collection that includes a plurality of content components and generates a manifest. An entry in the manifest corresponds to a content component. The system obtains a set of stream-construction rules, generates a stream-construction manifest by attaching the set of stream-construction rules to the manifest, and constructs a set of stream objects based on the stream-construction rules. A respective stream object may include an embedded chunk of a content component. The system signs the set of stream objects and assembles the reconstructable content stream by including the stream-construction manifest followed by the set of stream objects, thereby enabling an intermediate node to extract and store one or more content components and to reconstruct, at a later time, stream objects for the one or more content components based on the stream-construction manifest and the stored components.Type: GrantFiled: August 19, 2014Date of Patent: October 11, 2016Assignee: PALO ALTO RESEARCH CENTER INCORPORATEDInventors: Marc E. Mosko, Ignacio Solis
-
Patent number: 9465933Abstract: Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed.Type: GrantFiled: November 30, 2012Date of Patent: October 11, 2016Assignee: Intel CorporationInventors: Siddhartha Chhabra, Reshma Lal, Jason Martin, Daniel Nemiroff
-
Patent number: 9460293Abstract: A software module executes on a first operating system running. The software module determines that the first operating system has caused data to the written to a first clipboard maintained by the first operating system. The software module consults policy data to determine whether the data should additionally be written to a second clipboard maintained by a second operating system. The policy data may only allow the data to be written to the second clipboard if the data was written to the first clipboard at the initiation of or approved by a user. If the software module determines that the policy data allows the data to be written to the second clipboard, then the software module, without human instruction, causes the data to written to the second clipboard.Type: GrantFiled: June 20, 2013Date of Patent: October 4, 2016Assignee: Bromium, Inc.Inventors: Rahul Kashyap, Rafal Wojtczuk, Ian Pratt
-
Patent number: 9450758Abstract: A first request from a client using a first protocol is translated into one or more second requests by a servicer using a second protocol through a virtual request using the first protocol. A client may use parameters of the first protocol to pass virtual request components to the servicer. A format agreement between the client, servicer and/or authentication service may allow the servicer and/or authentication service to translate the virtual request components over the first protocol to one or more second requests using the second protocol. Virtual request components may prove the authenticity of the virtual request received by the servicer to an authentication service. Once satisfied the virtual request is valid, the authentication service may issue a credential to the servicer to send the one or more second requests to an independent service. Virtual requests may be included in various protocols, including credential-based protocols and certificate exchange-based protocols.Type: GrantFiled: March 12, 2012Date of Patent: September 20, 2016Assignee: Amazon Technologies, Inc.Inventors: Nicholas Alexander Allen, Gregory B. Roth, Elena Dykhno
-
Patent number: 9432382Abstract: A device may receive, from a first user device, a request to transmit a message to a user of a second user device. The request may include particular information indicating that content of the message is to be displayed to the user for a particular amount of time. The device may encrypt, based on receiving the request and using a key, the content of the message to obtain an encrypted message. The device may transmit the encrypted message to the second user device and receive, from the second user device, a request for the key. The device may transmit, to the second user device, the key and information identifying the particular amount of time to cause the second user device to decrypt the encrypted message, using the key, to obtain a decrypted message and cause the second user device to delete the decrypted message after the particular amount of time.Type: GrantFiled: August 19, 2014Date of Patent: August 30, 2016Assignee: Verizon Patent and Licensing Inc.Inventors: Zhijian Lin, Amir Mayblum, Jerry M. Kupsh
-
Patent number: 9419803Abstract: Various exemplary embodiments relate to a method, device, and storage medium including: receiving an NDEF message by an NFC device including a payload and at least one of a digital signature and a reference to a digital signature; stripping data from the payload to produce a stripped payload; verifying the payload using the digital signature and the stripped payload; and conditionally interpreting the payload based on whether the payload is verified. Various embodiments are described wherein: the payload includes a URI including a fragment denoted by a pound character; and stripping data includes stripping the fragment from the URI. Various embodiments are described wherein the payload is verified, the fragment comprises fragment data, and interpreting the payload comprises: transmitting a message requesting a resource identified by the URI, wherein the request omits the fragment data; executing a received script to transmit the fragment data to a device.Type: GrantFiled: December 31, 2013Date of Patent: August 16, 2016Assignee: NXP B.V.Inventor: Philippe Teuwen