Patents Examined by Daniel Potratz
  • Patent number: 9465940
    Abstract: A plurality of data files is received. Thereafter, each file is represented as an entropy time series that reflects an amount of entropy across locations in code for such file. A wavelet transform is applied, for each file, to the corresponding entropy time series to generate an energy spectrum characterizing, for the file, an amount of entropic energy at multiple scales of code resolution. It can then be determined, for each file, whether or not the file is likely to be malicious based on the energy spectrum. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: October 11, 2016
    Assignee: Cylance Inc.
    Inventors: Michael Wojnowicz, Glenn Chisholm, Matthew Wolff, Derek A. Soeder, Xuan Zhao
  • Patent number: 9432336
    Abstract: The present disclosure presents a system, method and apparatus for creating a secure tunnel between a mobile device and a server. The server can be configured to receive authentication information from the mobile device. The server can be further configured to establish a secure tunnel between the server and mobile device through at least one firewall in response to verification of the authentication information, the secure tunnel allowing the mobile device direct access to at least one application associated with the server. Additionally, the server can be configured to provide, to the mobile device, data associated with the at least one application.
    Type: Grant
    Filed: February 13, 2013
    Date of Patent: August 30, 2016
    Assignee: BlackBerry Limited
    Inventor: Gregg Ostrowski
  • Patent number: 9426161
    Abstract: Methods, systems, and computer-readable media for providing device-based authentication for secure online access are provided. An authentication request is received from an online service. The authentication request may be associated with a login request received by the online service from a user. The authentication request may further indicate a list of device identifiers for computing devices connected to a provider network and previously designated by the user as authorized to access the online service. Communication logs collected from the provider network are analyzed to determine whether the login request originated from one of the authorized computing devices based on the list of device identifiers. If it is determined that the login request originated from one of the authorized computing devices, an indication is returned to the online service that the login request was received from an authorized computing device.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: August 23, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Arati Baliga
  • Patent number: 9424575
    Abstract: Embodiments are directed to communicating an operating system-level token for user identification and/or authentication. Embodiments store a token at an operating system-level, wherein the token is accessible by an operating system running on the apparatus, and wherein the token comprises user identification information and/or user authentication information; and in response to an initiating event, initiate communication of the token to a second apparatus external to the apparatus. Some embodiments include initiation of an operation system-level instruction set for periodically, continuously, or in response to detecting a request, initiating communication of the token.
    Type: Grant
    Filed: April 11, 2014
    Date of Patent: August 23, 2016
    Assignee: Bank of America Corporation
    Inventors: David M. Grigg, Richard Andrew Starbuck, Carrie Anne Hanson, Alicia C. Jones
  • Patent number: 9413616
    Abstract: A method for detection of network address spoofing and false positive avoidance in a network is described herein. The network may include one or more hosts and a network management system. The network management system may identify a suspicious host in the network. A condition indicative of network address spoofing by the suspicious host may be detected. It may be determined whether the spoofing condition is expected in normal traffic of the network. In response to a determination that the spoofing condition is expected, it is determined that the suspicious host generated normal traffic.
    Type: Grant
    Filed: October 14, 2009
    Date of Patent: August 9, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Ted T Nguyen, Lynette Nguyen
  • Patent number: 9401930
    Abstract: An attribute-based policy defining subjects' access to resources is enforced by a computer system. A processing means (PDP) in the system communicates with a nearby attribute value source and at least one remote attribute value source and is adapted to evaluate the policy for an access request containing one or more explicit attribute values, which together with the policy define at least one implicit reference to a further attribute value, which is retrievable from one of said attribute value sources. The processing means reduces the policy by substituting attribute values for attributes in the policy if they are contained in the request or retrievable from the nearby source. References to further attributes retrievable from a remote source only are cached together with intermediate results. All attribute values from a given remote source are retrieved on one occasion, and the intermediate results are used to terminate the evaluation.
    Type: Grant
    Filed: July 1, 2013
    Date of Patent: July 26, 2016
    Assignee: AXIOMATICS AB
    Inventors: Pablo Giambiagi, Erik Rissanen
  • Patent number: 9400881
    Abstract: A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential issuance and incident(s) management. An exemplary aspect of the invention also relates to physical and logical security management and information technology/network security management, with a credential issuance and integrity checking system as well as associated readers and printers of the credential. Still further aspects of the invention relate to obtaining, assembling and analyzing one or more of data, video information, image information, biometric information, sensor information, terrorist information, profile information, and/or other types of information to provide a comprehensive platform for all aspects of security management.
    Type: Grant
    Filed: July 17, 2015
    Date of Patent: July 26, 2016
    Assignee: VETRIX, LLC
    Inventors: Melani S. Hernoud, Elizabeth J. Pierce, Gregory Reith
  • Patent number: 9397989
    Abstract: Disclosed are various embodiments that facilitate bootstrapping authentication of a user at a first device using a second device. The second device is authenticated for access to a user account via a first security credential. A second security credential is received by the second device. The second security credential is then sent to the first device. Subsequently, the second security credential is received from the first device, and the first device is authenticated for access to the user account.
    Type: Grant
    Filed: July 3, 2013
    Date of Patent: July 19, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Harsha Ramalingam, Jesper Mikael Johansson, Bharath Kumar Bhimanaik
  • Patent number: 9378339
    Abstract: A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to a connection server.
    Type: Grant
    Filed: May 25, 2015
    Date of Patent: June 28, 2016
    Inventors: Wayne Odom, Karolyn Gee
  • Patent number: 9378358
    Abstract: A password management system includes a character string conversion unit that converts an input character string to a character string different from the input character string using a predetermined arithmetic expression, the predetermined arithmetic expression being capable of giving a same converted result for a same character string and capable of converting a character string such that a plurality of original character string candidates exist for a converted character string; a password data storage unit that stores, for each user, a converted past password character string CPP that is a converted state of a past password character string PP of the user using the predetermined arithmetic expression and is different from the past password character string PP; and a strength determining unit that determines strength of a password.
    Type: Grant
    Filed: October 23, 2014
    Date of Patent: June 28, 2016
    Assignee: DeNA Co., Ltd.
    Inventor: Toshiharu Sugiyama
  • Patent number: 9380025
    Abstract: An example method is provided and, in an example embodiment, includes receiving a data packet at an ingress switch function, the data packet associated with a data packet flow; obtaining access control information associated with a destination of the data packet flow from a centralized service engine; and performing access filtering on the data packet flow at the ingress switch function using the access control information.
    Type: Grant
    Filed: July 3, 2013
    Date of Patent: June 28, 2016
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Suraj Nellikar, Maithili Narasimha
  • Patent number: 9361597
    Abstract: The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transaction, performing the amount of real-time risk analysis based on the set amount, and performing an amount of time-delayed risk analysis. In some embodiments, the amount of real-time risk analysis may depend on a predetermined period of time for completion of the real-time risk analysis. In other embodiments, the amount of real-time risk analysis may depend on selected tests to be completed during the real-time risk analysis.
    Type: Grant
    Filed: October 19, 2011
    Date of Patent: June 7, 2016
    Assignee: The 41st Parameter, Inc.
    Inventors: David Britton, Ori Eisen, Raz Yalov
  • Patent number: 9344411
    Abstract: In a method for key handling in mobile communication systems, first and second numbers are exchanged between entities of the mobile communication system. The first and second numbers are respectively used only once with respect to the respective system parameters of the communication system and therefore allowing greater security in the communication system.
    Type: Grant
    Filed: March 18, 2008
    Date of Patent: May 17, 2016
    Assignee: Nokia Solutions and Networks GmbH & Co. KG
    Inventors: Dan Forsberg, Guenther Horn, Ulrike Meyer
  • Patent number: 9336396
    Abstract: A system for generating a security policy for protecting an application-layer entity. The system comprises a security sitemap generator for generating a security sitemap of a protected application-layer entity, the security sitemap is stored in a first repository connected to the security sitemap generator; and a policy builder for generating a security policy for the application-layer entity based on the security sitemap, the security policy is stored in a second repository connected to the policy builder, wherein the security policy includes a plurality of enforcement rules for at least one of a resource, a group of resources, and a client-side input parameter of at least a portion of the protected application-layer entity.
    Type: Grant
    Filed: October 25, 2010
    Date of Patent: May 10, 2016
    Assignee: Radware, Ltd.
    Inventors: Michael Groskop, Roy Zisapel
  • Patent number: 9332034
    Abstract: Disclosed are system, methods, and computer program product for designation of encryption policies for user devices. An example method includes determining one or more criteria for the user device related to encryption requirements of the user device; determining numeric values for each of the one of more criteria; determining a coefficient for the device based on the numeric values; determining an encryption policy for the device based on the coefficient; and applying the determined encryption policy to the device.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: May 3, 2016
    Assignee: AO Kaspersky Lab
    Inventor: Oleg V. Zaitsev
  • Patent number: 9305189
    Abstract: A rugged, integrated network interface appliance for ensuring secure data transfer comprising send-only network interface circuitry comprising a microprocessor, a program memory, a first host interface, and a first serial interface; receive-only network interface circuitry comprising a microprocessor, a program memory, a second host interface, and a second serial interface; a single data link connecting the first serial interface of the send-only network interface circuitry to the second serial interface of the receive-only network interface circuitry that is configured such that the send-only network interface circuitry is configured not to receive any data from said data link, and the receive-only network interface circuitry is configured not to send any data to said data link.
    Type: Grant
    Filed: April 14, 2010
    Date of Patent: April 5, 2016
    Assignee: Owl Computing Technologies, Inc.
    Inventors: Ronald Mraz, Steven Staubly
  • Patent number: 9288049
    Abstract: Methods and apparatus are provided for cryptographically linking data identifiers and authentication identifiers without storing the association between the authentication and data secrets in the database of the server. A data secret of a client is provided to a server for storage with an authentication identifier (AuthId) and a pseudo-random client value. The server provides the client with a sequence number of the stored data secret that is associated with a data identifier (DataId) identifying the data secret obtained using a Key Derivation Function and a storage seed. The client registers with the server to obtain the authentication identifier (AuthId). Techniques are also provided for retrieving and updating the data secret.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: March 15, 2016
    Assignee: EMC Corporation
    Inventors: Peter Robinson, David Alistair Healy, Nikolaos Triandopoulos
  • Patent number: 9276905
    Abstract: An architecture and system are provided for flexible, composable attestation systems. Systems built according to this attestation architecture can be composed to accomplish complex attestation scenarios. The system is designed around composable components to permit flexible recombination. A system, method, and computer program product are provided for proving attestations to an appraiser regarding a target system. In an embodiment, an attestation request is sent from an appraiser to a target system, wherein the attestation request includes queries regarding properties of the target system needed by the appraiser to make trust decisions regarding the target system. The attestation request is forwarded from the target system to an attester which collects the requested data.
    Type: Grant
    Filed: February 15, 2008
    Date of Patent: March 1, 2016
    Assignee: The MITRE Corporation
    Inventors: George S. Coker, II, Amy L. Herzog, Joshua Guttman, Peter A. Loscocco, Jonathan K. Millen, John D. Ramsdell, Ariel Segall, Justin Sheehy, Brian T. Sniffen, Grant Wagner
  • Patent number: 9262603
    Abstract: Receiving an input authentication pattern, the input authentication pattern including non-alphanumeric input data. Determining if the input authentication pattern matches a previously stored authentication pattern. Providing access to a computing resource if the input authentication pattern matches the previously stored authentication pattern.
    Type: Grant
    Filed: October 21, 2011
    Date of Patent: February 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eli M. Dow, Marie R. Laser, Sarah J. Sheppard, Jessie Yu
  • Patent number: 9256728
    Abstract: An apparatus for managing software versions may include a processor. The processor may be configured to determine whether a security identifier of a first security certificate matches a trusted security identifier. In this regard, the first security certificate may include software version criteria. The processor may also be configured to determine whether a software version of a software application satisfies software version criteria of the first security certificate. The processor may be configured to make this determination in response to determining that the security identifier of the first certificate matches the trusted security identifier. Further, the processor may also be configured to permit execution of the software application, in response to determining that the software version satisfies the software version criteria. Associated methods and computer program products may also be provided.
    Type: Grant
    Filed: November 26, 2008
    Date of Patent: February 9, 2016
    Assignee: Nokia Technologies Oy
    Inventors: Janne Petteri Takala, Olli Pekka Juhani Muukka, Rauno Juhani Tamminen, Janne Johannes Jarvinen