Patents Examined by Courtney D. Fields
  • Patent number: 11153750
    Abstract: An apparatus and method are described for sharing WiFi credentials.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: October 19, 2021
    Assignee: Afero, Inc.
    Inventors: Daniel Altin, Scott Zimmerman, Clif Liu, Stephen Sewerynek
  • Patent number: 11144632
    Abstract: Some embodiments described herein include a method to validate supply chains for electronic devices using side-channel information in a signature analysis. The method includes sending, to a target device, a first signal associated with a set of codes to be executed by the target device, and then receiving first side-channel information associated with the target device in response to the target device executing the set of codes. The method also includes determining second side-channel information associated with a simulated device in response to the set of codes. The method further includes comparing a discriminatory feature of the first side-channel information with a discriminatory feature of the second side-channel information to determine a characteristic of the target device based on a pre-determined characteristic of the simulated device. Finally, the method includes sending, to a user interface, a second signal associated with the characteristic of the target device.
    Type: Grant
    Filed: November 21, 2019
    Date of Patent: October 12, 2021
    Assignee: Power Fingerprinting Inc.
    Inventors: Carlos R. Aguayo Gonzalez, Jeffrey H. Reed, Steven C. Chen
  • Patent number: 11139966
    Abstract: Techniques are provided for security code for integration with an application. A first request associated with a request by an application to an application server is received. The application includes security code that performs a set of one or more operations on one or more input parameters. The application is provided one or more parameter values, wherein the security code generates a secret cryptographic key based on the one or more parameter values. A security key is received that includes encrypted client data collected at the client device that is encrypted using the secret cryptographic key. The secret cryptographic key is generated based on the one or more parameter values and knowledge of the set of one or more operations. It is determined that the decrypted client data matches a pattern of data associated with malware. The application server is prevented from processing a second request.
    Type: Grant
    Filed: December 31, 2019
    Date of Patent: October 5, 2021
    Assignee: SHAPE SECURITY, INC.
    Inventors: Carl Schroeder, Ariya Hidayat, Chandrasekhar Rentachintala, Ricky Y. Chiu
  • Patent number: 11113395
    Abstract: According to some embodiments, a plurality of monitoring nodes each generate a series of current monitoring node values over time that represent a current operation of a wind turbine. An abnormality detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The abnormality detection computer platform may also access an abnormality detection model having a plurality of decision boundaries created using wind information (e.g., wind speed and/or acceleration) along with at least one of a set of normal feature vectors and a set of abnormal feature vectors. The abnormality detection computer platform may then select one of the decision boundaries based on current wind information associated with the wind turbine and execute the abnormality detection model and transmit an abnormality alert signal based on the set of current feature vectors and the selected decision boundary.
    Type: Grant
    Filed: May 24, 2018
    Date of Patent: September 7, 2021
    Assignee: General Electric Company
    Inventor: Masoud Abbaszadeh
  • Patent number: 11115223
    Abstract: A method and apparatus for distributing cryptographic material are disclosed. In the method and apparatus, cryptographic material is obtained and it is determined that the cryptographic material is to be made available for use by one or more computing resources. The cryptographic material is then sent to one or more secure modules, whereby a secure module of the one or more secure modules is programmatically accessible to a computing resource of the one or more computing resources and programmatic access enables the computing resource to request performance of one or more cryptographic operations using the cryptographic material while exporting the cryptographic material to the computing resource is denied.
    Type: Grant
    Filed: July 26, 2019
    Date of Patent: September 7, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Todd Lawrence Cignetti, Andrew Jeffrey Doane, Stefan Popoveniuc, Matthew Allen Estes, Alexander Edward Schoof, Robert Eric Fitzgerald, Peter Zachary Bowen
  • Patent number: 11102012
    Abstract: A method for digital signing of a document using a predetermined secret key. An initial internal state is determined by application to a condensate of the document of a first white box implementation of generation of a main nonce; then a modular sum of the main nonce and of a predetermined constant. The method also determines a first internal state by application to the initial internal state of a first modular arithmetic operation, then of a modular product with exponentiation of the predetermined constant. The method then determines a second internal state by application to said condensate of a second white box implementation of generation of the main nonce; and a second modular arithmetic operation function of the first internal state, of the main signature nonce and of the secret key. It then generates a digital signature of the document from the first internal state and the second internal state.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: August 24, 2021
    Assignee: IDEMIA IDENTITY & SECURITY FRANCE
    Inventors: Victor Servant, Emmanuel Prouff, Herve Chabanne
  • Patent number: 11093022
    Abstract: Systems and methods are provided for authenticating an account via a hands-free gesture, such as a tap, pattern of taps, or other physical gesture not requiring a user to hold a computing device. A user can initiate a transaction to purchase an item by interacting with a first computing device (e.g., electronic kiosk, point-of-sale terminal, automated checkout device, etc.). The first computing device can receive a request from the user to purchase the item. In response, the first computing device can broadcast an authentication request. The user can perform the hands-free gesture for detection by a second computing device (e.g., the user's mobile device). The second computing device can transmit information associated with the hands-free gesture in response to the authentication request. The first computing device can authenticate the user based on the information associated with the hands-free gesture.
    Type: Grant
    Filed: February 1, 2018
    Date of Patent: August 17, 2021
    Assignee: eBay Inc.
    Inventors: Bryant Genepang Luk, Robert He, Christopher Diebold O'Toole, Jennifer T. Robertson, Yu Tang
  • Patent number: 11089004
    Abstract: A method at a network element for attestation of applications, the method including sending a challenge to an application at an electronic device; receiving a response from the electronic device; processing the response; and upon determining that the response is invalid based on the processing, taking an enforcement action against the application.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: August 10, 2021
    Assignee: BlackBerry Limited
    Inventors: Johnathan White, Amit Ghosh
  • Patent number: 11089476
    Abstract: The present invention provides a network access control method. The network access control method includes: configuring network access permission of a first application, where the network access permission includes allowing the first application to access a network resource by using a first type of network access point, and the first type of network access point includes at least one first network access point; accessing a second network access point, where the second network access point belongs to the first type of network access point; when the first application is running, allowing the first application to access the network resource by using the second network access point; and when a third network access point is accessed, if the third network access point does not belong to the first type of network access point, prohibiting the first application from accessing the network resource by using the third network access point.
    Type: Grant
    Filed: July 18, 2018
    Date of Patent: August 10, 2021
    Assignee: Huawei Device Co., Ltd.
    Inventors: Xi Huang, Yongfeng Tu, Huangwei Wu
  • Patent number: 11088995
    Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: August 10, 2021
    Assignee: SHAPE SECURITY, INC.
    Inventor: Justin Call
  • Patent number: 11082412
    Abstract: A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: August 3, 2021
    Assignee: Wickr Inc.
    Inventors: Thomas Michael Leavy, Christopher Howell, Joël Alwen
  • Patent number: 11068577
    Abstract: A method for connecting a mobile device with a vehicle-based system is described. The vehicle based-system comprises a first device and a second device that are both in possession of a system key. For an initial connection request between the first device and the mobile device, a token pair comprising a plaintext token and an encrypted token has been provided. The encrypted token is obtainable by applying the system key to at least the plaintext token. The mobile device is connected with the vehicle-based system by receiving, for a subsequent connection request with the second device and from the mobile device, the token pair comprising the plaintext token and the encrypted token. The token pair is verified using at least the system key. The subsequent connection is accepted upon successful verification of the token pair.
    Type: Grant
    Filed: April 19, 2017
    Date of Patent: July 20, 2021
    Assignee: E.SOLUTIONS GMBH
    Inventors: Martin Clement, Lukasz Gut, Micha Mutschler, Andreas Seuss
  • Patent number: 11070571
    Abstract: Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. The data packets constitute at least a part of a file being addressed to a client machine coupled to the gateway device. The gateway device forwards an identification of the file to a remote datacenter in parallel with forwarding the data packets to the client machine. The datacenter performs signature matching on the identification and returns a result of the signature matching to the gateway device. The gateway device determining whether to block the file from the client machine based on the result of the signature matching from the datacenter.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: July 20, 2021
    Assignee: SONICWALL INC.
    Inventors: Aleksandr Dubrovsky, Senthilkumar G. Cheetancheri, Boris Yanovsky
  • Patent number: 11050787
    Abstract: Systems and methods are provided for adaptively configuring and deploying honeypots in user compute resources. The methods select, based at least in part on a profile associated with a user account, a virtual machine image having a type and associated with a countermeasure. Cause a virtual machine to be launched in connection with a virtual network associated with the user account.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: June 29, 2021
    Assignee: Amazon Technologies, Inc.
    Inventor: Nima Sharifi Mehr
  • Patent number: 11025420
    Abstract: Secure operations can be performed using security module instances offered as a web service through a resource provider environment. State data and cryptographic material can be loaded and unloaded from the instance as needed, such that the instance can be reused for operations of different customers. The material and data can be stored as a bundle encrypted using a key specific to the hardware security module and a key specific to the resource provider, such that the bundle can only be decrypted in an instance of that type of security module from the associated manufacturer and operated by that particular resource provider. The customer is then only responsible for the allocation of that instance during the respective cryptographic operation(s).
    Type: Grant
    Filed: May 2, 2019
    Date of Patent: June 1, 2021
    Assignee: Amazon Technologies, Inc.
    Inventor: Steven Preston Lightner Norum
  • Patent number: 10984114
    Abstract: A document processing method and apparatus are disclosed in embodiments of the present application. The method includes: obtaining a target geographic location where the first electronic device is currently located, when a predetermined operation for a document is detected; determining whether the target geographic location matches a target password that is used to encrypt the document in advance; and if so, allowing the predetermined operation to be performed on the document; and if not, preventing the predetermined operation from being performed on the document. The apparatus includes an obtaining module, a determining module, and a decision module. In the embodiment of the present application, the document is encrypted and decrypted by using a target password generated based on a geographic location, which ensures the security of password transmission, and improves the security of the use of the document and the convenience of authorization and decryption.
    Type: Grant
    Filed: October 25, 2016
    Date of Patent: April 20, 2021
    Assignees: Beijing Kingsoft Office Software, Inc., Zhuhai Kingsoft Office Software Co., Ltd., Guangzhou Kingsoft Mobile Technology Co., Ltd.
    Inventor: Chuantong Huang
  • Patent number: 10956572
    Abstract: A domain-specific hardwired symbolic web browser machine is described that processes information via the hardwired mapping of symbols from one or more domains onto other such domains, computing and communicating with improved security and reduced power consumption because it has no CPU, no Random Access Memory (RAM), no instruction registers, no Instruction Set Architecture (ISA), no operating system (OS) and no applications programming. The machine provides web browser functionality including, for example, the display of web pages. In some embodiments, the machine has no unconstrained RAM into which malware may insert itself and needs no anti-virus software.
    Type: Grant
    Filed: August 21, 2017
    Date of Patent: March 23, 2021
    Assignee: Hackproof Technologies Inc.
    Inventor: Joseph Mitola, III
  • Patent number: 10924283
    Abstract: Techniques for use in generating a dynamically-changing IoT device identity with robust blockchain validation are provided. When entering a communication network, an IoT device performs a procedure for registration. The procedure includes communicating, in a transaction, data associated with the IoT device to a network device (e.g. a fog router). The data includes, amongst other data items, an identity for addressing communications to and from the IoT device. A transaction number associated with the transaction is received based on a blockchain registration of the transaction. An updated identity of the IoT device is then derived based on the transaction number. In one example, the updated identity of the IoT device may be derived by combining a static address of the IoT device and the transaction number. The steps may be repeated by the device for each one of a plurality of network registrations.
    Type: Grant
    Filed: June 12, 2017
    Date of Patent: February 16, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Rajiv Asati, Nagendra Kumar Nainar, Carlos M. Pignataro
  • Patent number: 10909218
    Abstract: A system and method for providing content consumption data to users in a multi-device environment. Activity data from a plurality of UE devices associated with a subscriber account are obtained when one or more users tied to the subscriber account consume content on one or more UE devices. The activity data may be correlated with one or more pieces of information relating to the consumed content. When a journal request is received from a user operating a UE device associated with the subscriber account, a response is generated containing data for presentation in a journal format that includes correlated subscriber activity data for the subscriber account over a select period of time.
    Type: Grant
    Filed: February 13, 2018
    Date of Patent: February 2, 2021
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: Nicolas Pintaux
  • Patent number: 10902132
    Abstract: An apparatus, method and system are disclosed which may be used for assessing the trustworthiness of a particular proprietary microelectronics device design representation in a manner that will maintain its confidentiality and, among other things, thwart attempts at unauthorized access, misappropriation and reverse engineering of the confidential proprietary aspects contained in the design representation and/or its bit stream design implementation format. The disclosed method includes performing a process for assessing/verifying a particular microelectronics device design representation and then providing some indication of the trustworthiness of that representation. An example utility/tool which implements the disclosed method is described that is particularly useful for trust assessment and verification of FPGA designs.
    Type: Grant
    Filed: August 25, 2017
    Date of Patent: January 26, 2021
    Assignee: Graf Research Corporation
    Inventors: Jonathan Peter Graf, Ali Asgar Ali Akbar Sohanghpurwala, Scott Jeffery Harper