Patents Examined by Courtney D. Fields
-
Patent number: 10574440Abstract: Provided is a computer system and method that enables delegated access to encrypted information for distributed messaging and queuing frameworks, or in general, to publish/subscribe architectures. In said frameworks and architectures, data is published by data producers and organized in channels or queues, which consumer applications can subscribe to, and that are managed by one or multiple broker entities.Type: GrantFiled: May 8, 2018Date of Patent: February 25, 2020Assignee: ZeroDB, Inc.Inventors: Mikhail Egorov, MacLane Scott Wilkison, David Nu{grave over (n)}ez, Isaac Agudo
-
Patent number: 10574644Abstract: Computer processors are configured to verify a unique user identification credential for a requesting user of a first client in response to receiving request for access to a microservice process from the user via the first client; create a client identification token in response to verifying a unique user identification credential for the user, and a session identification token for the request; pass the session identification token to the requesting client mapped to the client identification token; enable requested access by the first client to the requested microservice process in association with the session identification token in a session that is persisted to a session repository identified by the session identification token; and cause the requesting client to replicate the persisted session in association with the session identification token.Type: GrantFiled: May 3, 2017Date of Patent: February 25, 2020Assignee: International Business Machines CorporationInventors: Vijay Kumar Ananthapur Bache, Vijay Ekambaram, Saravanan Sadacharam
-
Patent number: 10564951Abstract: A system, method, and computer-readable medium for performing a secure userless device software deployment operation. The secure userless device software deployment operation enables a client information handing system and a server information handling system to independently and deterministically construct a host reference (such as a host universal resource locator (URL)). In certain embodiments, the host reference is used for the SaaS connection based on a fixed portion plus a unique portion created using a client's public key as an identifier. In certain embodiments, the secure userless device software deployment operation leverages a management system to broker a SaaS service deployment. In certain embodiments, the secure userless device software deployment operation securely attaches a managed userless device to a tenant based SaaS offering by leveraging a connection plug-in and temporary/ephemeral URL architecture with a one-time use construct.Type: GrantFiled: February 26, 2016Date of Patent: February 18, 2020Assignee: Dell Products L.P.Inventors: Carlton A. Andrews, Warren W. Robbins
-
Patent number: 10567171Abstract: Techniques are provided for client-side security key generation. An initial request is received from an application executing on a client device. The application includes a security component includes security code. In response to the initial request, a key component is generated. The key component includes one or more parameters from which a valid security key can be generated at the client device by executing the security code. The key component is provided to the client device. A security key associated with a request from the client device to an application server is received. The security key is checked for validity. In response to determining that the security key is valid, processing of the request by the application server is caused.Type: GrantFiled: June 30, 2017Date of Patent: February 18, 2020Assignee: Shape Security, Inc.Inventors: Carl Schroeder, Ariya Hidayat, Chandrasekhar Rentachintala, Ricky Y. Chiu
-
Patent number: 10528949Abstract: A user device is associated with a dynamic trust score that may be updated as needed, where the trust score and the updates are based on various activities and information associated with the mobile device. The trust score is based on both parameters of the device, such as device type, registered device location, device phone number, device ID, the last time the device has been accessed, etc. and activities the device engages in, such as amount of transactions, dollar amount of transactions, amount of denied requests, amount of approved requests, location of requests, etc. Based on a transaction request from the user device, the trust score and a network reputation score is used to determine an overall trust/fraud score associated with the transaction request.Type: GrantFiled: March 21, 2016Date of Patent: January 7, 2020Assignee: PAYPAL, INC.Inventors: Prashanth Ranganathan, Alexander J. Olson, Frieder Bluemle, Tobias Speckbacher
-
Patent number: 10524119Abstract: An apparatus and method are described for sharing WiFi credentials.Type: GrantFiled: November 23, 2016Date of Patent: December 31, 2019Assignee: Afero, Inc.Inventors: Daniel Altin, Scott Zimmerman, Clif Liu, Stephen Sewerynek
-
Patent number: 10499064Abstract: The present invention discloses an encoding apparatus using a Discrete Cosine Transform (DCT) scanning, which includes a mode selection means for selecting an optimal mode for intra prediction; an intra prediction means for performing intra prediction onto video inputted based on the mode selected in the mode selection means; a DCT and quantization means for performing DCT and quantization onto residual coefficients of a block outputted from the intra prediction means; and an entropy encoding means for performing entropy encoding onto DCT coefficients acquired from the DCT and quantization by using a scanning mode decided based on pixel similarity of the residual coefficients.Type: GrantFiled: October 16, 2017Date of Patent: December 3, 2019Assignees: Electronics and Telecommunications Research Institute, Kwangwoon University Research Institute for Industry Cooperation, Industry-Academia Cooperation Group of Sejong UniversityInventors: Se-Yoon Jeong, Hae-Chul Choi, Jeong-Il Seo, Seung-Kwon Beack, In-Seon Jang, Jae-Gon Kim, Kyung-Ae Moon, Dae-Young Jang, Jin-Woo Hong, Jin-Woong Kim, Yung-Lyul Lee, Dong-Gyu Sim, Seoung-Jun Oh, Chang-Beom Ahn, Dae-Yeon Kim, Dong-Kyun Kim
-
Patent number: 10484359Abstract: An embodiment may include transmitting a manufacturer security certificate to a provisioning server device, and establishing, with the provisioning server device, a secure connection based on the manufacturer security certificate. The embodiment may also involve transmitting, over the secure connection, device data that characterizes the client device, and receiving, over the secure connection, a server security certificate. The embodiment may further include obtaining a unique client device identifier. The embodiment may additionally include, possibly based on the server security certificate and the unique client device identifier, accessing protected information available to a particular pre-validated server device.Type: GrantFiled: March 13, 2017Date of Patent: November 19, 2019Assignee: Confia Systems, Inc.Inventor: Nadaradjane Ramatchandirane
-
Patent number: 10474844Abstract: A device has an installed cryptographic program that performs cryptographic operations in dependence upon a received diversification value. The diversification value is generated by an obfuscated personalisation program installed in the device and is dependent upon a personalisation input to the personalisation program. The personalisation input is characteristic of the particular execution environment provided by the device, and may take the form of a proper subset selected from among variables characterising the device, such as hardware properties, static software configuration and results from processing dynamic variables to check that they have expected properties. The diversification value generated by the personalisation program is returned (in encrypted form) to a server which also has a copy of the cryptographic program. Thus, the server and the device may communicate using a secure channel provided by the combination of the cryptographic program and the diversification value.Type: GrantFiled: September 8, 2016Date of Patent: November 12, 2019Assignee: Trustonic LimitedInventors: Jan-Erik Gustav Ekberg, Donald Kenneth Felton
-
Patent number: 10440033Abstract: An integrity check for a first file is initiated. In response, a first key corresponding to the first file is obtained. The first file is hashed to determine that the first key is not equivalent to the hashed first file. A second key is then obtained that corresponds to the hashed first file. A second file is then obtained using the second key. This second file is hashed to determine whether the second key is equivalent to the hashed second file. Integrity of the first file is confirmed if the second key is equivalent to the hashed second file or integrity of the first file is rejected if the second key is not equivalent to the hashed second file. Related apparatus, systems, techniques and articles are also described.Type: GrantFiled: March 16, 2017Date of Patent: October 8, 2019Assignee: SAP SEInventor: Udo Klein
-
Patent number: 10411889Abstract: In an embodiment, an apparatus includes a first logic to receive from a first node a synchronization portion of a message and to generate a set of state information using the synchronization portion, to synchronize the apparatus with the first node. The apparatus may further include a second logic to decrypt a data portion of the message using the set of state information to obtain a decrypted message. Other embodiments are described and claimed.Type: GrantFiled: August 30, 2016Date of Patent: September 10, 2019Assignee: Intel CorporationInventors: David Gomez Gutierrez, Rafael De La Guardia Gonzalez
-
Patent number: 10389689Abstract: Systems and methods securely provide media content from a media server to a media client via a network. The media content is segmented to create multiple media segments that are each identified in a playlist, and at least one of the media segments is encrypted using a cryptographic key. The cryptographic key is also identified in the playlist, and the playlist is provided from the media server to the media client via the network. The various media segments and cryptographic keys may then be requested from and provided by the media server using hypertext transport protocol (HTTP) or similar constructs to allow the media client to receive and decrypt the various segments of the media content.Type: GrantFiled: June 1, 2016Date of Patent: August 20, 2019Assignee: SLING MEDIA L.L.C.Inventor: Rajesh Kanungo
-
Patent number: 10387627Abstract: Disclosures herein describe methods and systems for detecting unlicensed content that can be accessed by electronic devices using an automated framework for analyzing applications present on the electronic device that allow a user of the electronic device to access unlicensed content.Type: GrantFiled: September 28, 2016Date of Patent: August 20, 2019Assignee: KRYPTOWIRE LLCInventors: Ryan Johnson, Nikolaos Kiourtis, Angelos Stavrou
-
Patent number: 10382456Abstract: A computing device may include a memory and a processor cooperating therewith to operate a plurality of virtual computing sessions for a plurality of client devices. Each of the virtual computing sessions may have access to a network. The processor may further operate at least one security agent configured to detect security threats from the virtual computing sessions, and a virtual management agent configured to, responsive to detection of a security threat from a given virtual computing session, discontinue access to the computing network by the given virtual computing session.Type: GrantFiled: September 19, 2016Date of Patent: August 13, 2019Assignee: CITRIX SYSTEMS, INC.Inventors: Simon Frost, Robert Dobson
-
Patent number: 10379824Abstract: An example system and method for securing computer code of a dynamic Domain Specific Language (DSL) that leverages a General Purpose Language (GPL). An example method includes enhancing compile-time security enforcement functionality for computer code written using the DSL, in part by using a compiler to perform static analysis on the DSL computer code. The static analysis includes referencing a security policy defining one or more unacceptable program behaviors; and indicating when execution of the computer code would result in performance of the one or more unacceptable program behaviors based on results of the static analysis.Type: GrantFiled: February 26, 2016Date of Patent: August 13, 2019Assignee: Oracle International CorporationInventors: John Smiljanic, Shailesh Vinayaka
-
Patent number: 10367643Abstract: The disclosed computer-implemented method for managing encryption keys for single-sign-on applications may include (1) receiving, from an identity service, notification of a request to access encrypted data on a cloud service, the notification including a session key for encrypting and decrypting a master key for decrypting cloud service keys, (2) deriving the master key, (3) decrypting, using the master key, a cloud service key for decrypting data on the cloud service, (4) storing the master key, encrypted using the session key, (5) receiving an additional notification of an additional request to access encrypted data on an additional cloud service, the notification including the session key, (6) without again obtaining the authentication element from the user, decrypting the master key, and (7) decrypting, using the master key, an additional cloud service key for decrypting data on the additional cloud service. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 28, 2016Date of Patent: July 30, 2019Assignee: Symantec CorporationInventors: Ilya Sokolov, Keith Newstadt
-
Patent number: 10367646Abstract: A method and apparatus for distributing cryptographic material are disclosed. In the method and apparatus, cryptographic material is obtained and it is determined that the cryptographic material is to be made available for use by one or more computing resources. The cryptographic material is then sent to one or more secure modules, whereby a secure module of the one or more secure modules is programmatically accessible to a computing resource of the one or more computing resources and programmatic access enables the computing resource to request performance of one or more cryptographic operations using the cryptographic material while exporting the cryptographic material to the computing resource is denied.Type: GrantFiled: October 21, 2014Date of Patent: July 30, 2019Assignee: Amazon Technologies, Inc.Inventors: Todd Lawrence Cignetti, Andrew Jeffrey Doane, Stefan Popoveniuc, Matthew Allen Estes, Alexander Edward Schoof, Robert Eric Fitzgerald, Peter Zachary Bowen
-
Patent number: 10360396Abstract: Described are a method and system of authorizing software execution on a computing device having a processor, the device storing a production key associated with software authorized for end-user release and storing a pre-release key associated with software not authorized for end-user release. The method includes determining that a signed software image is not signed with the production key; determining that the device has stored in memory thereon a pre-release token, the pre-release token containing data uniquely identifying the device and identifying the pre-release key; validating the pre-release token; and authenticating the signed software image using the pre-release key and, in response, permitting execution of the software image.Type: GrantFiled: October 30, 2015Date of Patent: July 23, 2019Assignee: BlackBerry LimitedInventors: Daniel Jonas Major, Michael Alievsky, Robert David Turner, Adam Richard Schieman
-
Patent number: 10354067Abstract: An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and can add the harvested data to a local data store maintained on the endpoint computer system. In some examples, the local data store can be an audit log and/or can include one or more tamper resistant features. Systems, methods, and computer program products are described.Type: GrantFiled: November 18, 2016Date of Patent: July 16, 2019Assignee: Cylance Inc.Inventors: Ryan Permeh, Matthew Wolff, Samuel John Oswald, Xuan Zhao, Mark Culley, Steve Polson
-
Patent number: 10354066Abstract: An endpoint computer system can harvest data relating to a plurality of events occurring within an operating environment of the endpoint computer system and can add the harvested data to a local data store maintained on the endpoint computer system. A query response can be generated, for example by identifying and retrieving responsive data from the local data store. The responsive data are related to an artifact on the endpoint computer system and/or to an event of the plurality of events. In some examples, the local data store can be an audit log and/or can include one or more tamper resistant features. Systems, methods, and computer program products are described.Type: GrantFiled: November 17, 2016Date of Patent: July 16, 2019Assignee: Cylance Inc.Inventors: Ryan Permeh, Matthew Wolff, Samuel John Oswald, Xuan Zhao, Mark Culley, Steve Polson