Patents Examined by D'Arcy Winston Straub
  • Patent number: 10911603
    Abstract: Embodiments of the present invention provide a service allocation method and apparatus. The method includes: firstly, generating, by a core network side device, a first dedicated network identifier according to an association relationship sent by user equipment UE, where the first dedicated network identifier is used to identify the association relationship; secondly, sending, by the core network side device, the first dedicated network identifier to the UE; receiving, by the core network side device, a service request message sent by the UE; and finally, allocating a service to the UE according to the service request message and the first dedicated network identifier. Because each wireless router has a unique first dedicated network identifier, the core network side device can provide, according to the first dedicated network identifier, a targeted service or tariff policy for UE corresponding to each wireless router.
    Type: Grant
    Filed: April 22, 2015
    Date of Patent: February 2, 2021
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Changzhu Li, Guangxue Sun
  • Patent number: 10862684
    Abstract: The present disclosure relates to technologies for sensor networks, machine to machine (M2M) communication, machine type communication (MTC), and Internet of Things (IoT). The present disclosure may be utilized for intelligent services based on the above technologies (smart homes, smart buildings, smart cities, smart or connected cars, health care, digital education, retail businesses, security and safety-related services). The present invention relates to a method and apparatus that, when a user equipment notifies its identification information using an unsecured connection, enable the user equipment to notify the identification information in a secure manner using a one-time password (OTP) algorithm and proximity authentication and to receive services customized to user needs.
    Type: Grant
    Filed: November 17, 2015
    Date of Patent: December 8, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Dohy Hong, Hyeonjin Kang, Ilju Na, Kitaek Bae
  • Patent number: 10855464
    Abstract: Methods, apparatus, systems and articles of manufacture manage credentials in hyper-converged infrastructures are disclosed. An example method includes establishing, by executing an instruction with at least one processor, a communication between a software defined data center manager of the hyper-converged infrastructure and a component of the hyper-converged infrastructure using first credentials included in a known hosts file. The example method also includes generating, by executing an instruction with the at least one processor, second credentials at the component in response to a power-on event detected by the software defined data center manager. The example method also includes recording, by executing an instruction with the at least one processor, the second credentials at the known host file.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: December 1, 2020
    Assignee: VMWARE, INC.
    Inventor: Vishesh Kumar Nirwal
  • Patent number: 10848320
    Abstract: A device assists an embedded Universal Integrated Circuit Card (eUICC) resident in the device with verification of public key information or of security materials. The verification provided by the device can be configured by the user and/or by the eUICC. The verification includes checking for expiration of public key information or presence of an associated public key in a trusted list. The trusted list in some instances includes pinning hash values. The device can warn an end user and/or an infrastructure entity, of an issue if the verification fails. An extension of certificate revocation lists includes a logical indication of at least one new public key in a CRL list. A CRL data field may also indicate a previous CRL, where the previous CRL is the most recent CRL containing a public key listing with at least one new entry.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: November 24, 2020
    Assignee: Apple Inc.
    Inventor: Xiangying Yang
  • Patent number: 10839098
    Abstract: A router system includes a router, a memory storing a client program, and a processor configured to execute the client program. The client program is configured to enable a user to transfer a file from a source to a destination, determine whether data within the file includes sensitive information, determine a probability that transmission of the data from the source to the destination would violate a policy, send normal data packets to the router based on the file, and send a stop data packet to the router when the probability exceeds a threshold. The router forwards the normal data packets to the destination until the router receives the stop data packet.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: November 17, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jorgen Emil Borup, Marco Aurelio Stelmar Netto, Thiago Cesar Rotta, Sergio Varga
  • Patent number: 10833858
    Abstract: The disclosed technology is generally directed to secure transactions. In one example of the technology, a secure encrypted communication tunnel between the enclave and a hardware security module (HSM) may be established and used. Establishing the tunnel includes the following steps. A session public/private enclave key pair, including a session enclave private key and a session enclave public key, may be derived from the public/private key pair of the enclave. The session enclave public key may be sent to the HSM. A session HSM public key may be received from the HSM. Additional information may be encrypted with the session HSM public key. The encrypted additional information may be sent to the HSM. Further encrypted information may be received from the HSM. The further encrypted information may be decrypted with the session enclave private key.
    Type: Grant
    Filed: May 11, 2017
    Date of Patent: November 10, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: John Marley Gray
  • Patent number: 10797874
    Abstract: The disclosed technology is generally directed to secure transactions. In one example of the technology, a secure encrypted communication tunnel between the enclave and a hardware security module (HSM) may be established and used. Establishing the tunnel includes the following steps. A session public/private enclave key pair, including a session enclave private key and a session enclave public key, may be derived from the public/private key pair of the enclave. The session enclave public key may be sent to the HSM. A session HSM public key may be received from the HSM. Additional information may be encrypted with the session HSM public key. The encrypted additional information may be sent to the HSM. Further encrypted information may be received from the HSM. The further encrypted information may be decrypted with the session enclave private key.
    Type: Grant
    Filed: May 11, 2017
    Date of Patent: October 6, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: John Marley Gray
  • Patent number: 10790984
    Abstract: A method for user credential location using prefix matching is described. In one embodiment, the method may include enabling a user to generate remotely a cryptographic hash of a user credential of the user, receiving a portion of the cryptographic hash from the user, comparing the portion of the cryptographic hash with a plurality of cryptographic hashes of user credentials stored at a database, determining whether a match exists between the portion of the cryptographic hash and at least one of the plurality of cryptographic hashes, and transmitting a notification to the user indicating whether the user credential is stored at the database based at least in part on a result of the comparing.
    Type: Grant
    Filed: March 21, 2018
    Date of Patent: September 29, 2020
    Assignee: ALTIRIS, INC.
    Inventor: Adam J. Stiles
  • Patent number: 10783262
    Abstract: Embodiments of the present invention provide systems, methods, and computer storage media directed to facilitate identification of security policies for documents. In one embodiment, content features are identified from a set of documents having assigned security policies. The content features and corresponding security policies are analyzed to generate a security policy prediction model. Such a security policy prediction model can then be used to identify a security policy relevant to a document.
    Type: Grant
    Filed: February 3, 2017
    Date of Patent: September 22, 2020
    Assignee: ADOBE INC.
    Inventors: Tanya Goyal, Sanket Vaibhav Mehta, Balaji Vasan Srinivasan, Ankur Jain
  • Patent number: 10771496
    Abstract: Techniques for detecting suspicious file access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to folders, a set of the folders accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of folder access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a file of a folder that is not within the set of accessed folders of the issuing user's user group, and because the folder is not within the sets of accessed folders of any nearby user groups.
    Type: Grant
    Filed: August 10, 2017
    Date of Patent: September 8, 2020
    Assignee: Imperva, Inc.
    Inventors: Guy Shtar, Shiri Margel
  • Patent number: 10764260
    Abstract: The invention provides a system for encryptedly storing product data of a product having an attached tag centrally on a product data server, and reading out the centrally stored product data by production stations which are to process the product. The product data are encrypted with a document key which in turn is encrypted with a public key of the tag. The tag contains access information for the centrally stored product data. When a production station accesses product data on the product data server, the tag carries out a re-encryption of the document key from the key system of the tag to that of the accessing production station.
    Type: Grant
    Filed: January 22, 2016
    Date of Patent: September 1, 2020
    Assignee: Giesecke+Devrient Mobile Security GmbH
    Inventors: Frank-Michael Kamm, Volker Stöhr
  • Patent number: 10735965
    Abstract: A system for controlling accesses to network enabled devices includes a network interface over which a hub communicates with network enabled devices, a processor, and a multilayer access control layer. The access control layer includes instructions that, when executed by the processor, cause the processor to detect, at the hub, a request representing an attempt by an application executing on a remote host device to access a network enabled device communicatively coupled to the hub, characterize the request according to a user of the remote host device, the application making the attempt, and the network enabled device, and determine whether to allow or deny the request based upon the characterization and a plurality of rules. The rules may include definitions of access rights, with respect to the network enabled device, for users, applications, commands or queries made by applications, remote host devices, and network domains.
    Type: Grant
    Filed: October 6, 2016
    Date of Patent: August 4, 2020
    Assignee: McAfee, LLC
    Inventors: Himanshu Srivastava, Dattatraya Kulkarni, Srikanth Nalluri, Krishnapur N. Venkatasubrahmanyam, Kamlesh Halder, Raj Vardhan
  • Patent number: 10708298
    Abstract: In general, some embodiments described herein relate to using agile or dynamic addresses for multicasting that may be difficult or impossible for a malicious actor to predict. Such agile addresses may prevent a malicious actor from attacking a single static multicast address and may prevent the architecture of the multicast network from propagating the attack. Data sent to invalid (e.g., expired, revoked, and/or otherwise depreciated addresses) can be filtered out and dropped from the network. For example, a first group key associated with a first time period can be calculated based on a first shared secret and a second group key associated with a second time period can be calculated based on a second shared secret. At any given time at least one group key can be an accepted group key. When a multicast address includes a currently accepted group key, the data can be sent to a group.
    Type: Grant
    Filed: November 3, 2016
    Date of Patent: July 7, 2020
    Assignee: Axiom, Inc.
    Inventor: Hugh William Harney
  • Patent number: 10673833
    Abstract: An information processing system includes a client device and a server device. The client device includes a transmitter that transmits, to the server device, a request to acquire information for connecting to an external device that provides an external service. The server device includes a storage that stores attributes of accounts of the external service, and the information for connecting to the external device by using the accounts; a receiver that receives the acquisition request from the client device; an identifier that identifies candidate accounts to be used when the client device receives the external service, the candidate accounts being identified based on information elements and the attributes, the information elements being included in the acquisition request and identifying the accounts; and a transmitter that transmits, to the client device, the information for connecting to the external device by using the identified candidate accounts.
    Type: Grant
    Filed: August 5, 2016
    Date of Patent: June 2, 2020
    Assignee: Ricoh Company, Ltd.
    Inventors: Shigeki Kashiyama, Hiroki Ohzaki, Masato Nakajima, Yasuharu Fukuda
  • Patent number: 10664589
    Abstract: A memory alignment randomization method of a memory heap exploit is provided, memory alignment of objects inside a heap area is randomly performed to mitigate the exploits of the vulnerability of the software memory heap area The heap exploit is powerfully mitigated by aligning randomly obtained memory addresses instead of aligning memory addresses at multiples of 4 or 8 when the memory alignment for the objects inside the heap area.
    Type: Grant
    Filed: April 12, 2017
    Date of Patent: May 26, 2020
    Assignee: Korea Advanced Institute of Science and Technology
    Inventors: Brent ByungHoon Kang, Daehee Jang, Minsu Kim, Jonghwan Kim, Daegyeong Kim, Hojoon Lee
  • Patent number: 10659234
    Abstract: In one embodiment, a computing device receives an image that has been signed with a first key, wherein the image includes a first computational value associated with it. A second computational value associated with the image is determined and the image is signed with a second key to produce a signed image that includes both the first and second computational values. Prior to loading the dual-signed image, the computing device attempts to authenticate the dual-signed image using both the first and second computational values, and, if successful, loads and installs the dual-signed image.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: May 19, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Kannan Varadhan, Chirag Shroff, Rakesh Chopra
  • Patent number: 10650156
    Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, from an application executing on a system, a request to access a data file, receiving data describing the request, wherein the data describing the request includes data from a runtime stack of the application, wherein the data from the runtime stack includes a program statement number, identifying, in a protected memory block, a first rule for accessing the data file, wherein the first rule specifies a program statement number permitted to access the data file, and upon determining that the program statement number from the runtime stack does not match the program statement number specified in the first rule, restricting access to the data file by the application.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: May 12, 2020
    Assignee: International Business Machines Corporation
    Inventors: Mark J. Anderson, Scott Forstie, Jeffrey M. Uehling
  • Patent number: 10616185
    Abstract: Methods and a first node, a second node and a network node for managing traffic characteristics of one or more packets on a connection are disclosed. The first node exchanges, with the network node, traffic characteristic semantics and a common key for encryption of a traffic characteristic value to be applied for the one or more packets on the connection, wherein the traffic characteristic semantics include the traffic characteristic value and an associated characteristic for the one or more packets. Moreover, the first node sends the traffic characteristic value and the common key to the second node. The network node checks and applies the traffic characteristics value according to service policies of the network node. Next, the first node exchanges, with the second node, payload which includes one or more packets over the connection. Information about the traffic characteristic value is included in a transport header of each packet carrying the payload.
    Type: Grant
    Filed: March 11, 2015
    Date of Patent: April 7, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Attila Mihály, Szilveszter Nádas, Lars Westberg
  • Patent number: 10615959
    Abstract: A control circuit causes a first cryptographic module to perform a dummy operation in a command processing period and a data processing period in which a second cryptographic module performs a normal operation while the first cryptographic module does not perform a normal operation.
    Type: Grant
    Filed: July 19, 2016
    Date of Patent: April 7, 2020
    Assignee: MEGACHIPS CORPORATION
    Inventors: Takahiko Sugahara, Hiromu Yutani
  • Patent number: 10567380
    Abstract: Method and apparatus for allowing the changing of security values and consent data is provided. The security values allow for dynamically changing the security level and ease of access associated with performing specific transactions on specific accounts. The consent data may be pushed or pulled and when stored, may be used for future transactions, of both the same or a different type. The changing of security levels and consent data may be accomplished over the internet using mobile devices over both secure and non-secure networks.
    Type: Grant
    Filed: July 8, 2017
    Date of Patent: February 18, 2020
    Assignee: Bank of America Corporation
    Inventors: Elizabeth S. Votaw, David J. Smiddy, FNU Sidharth, Stephen T. Shannon, James Alexander