Patents Examined by Dant B Shaifer Harriman
  • Patent number: 10368239
    Abstract: A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.
    Type: Grant
    Filed: August 28, 2017
    Date of Patent: July 30, 2019
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Roger Piqueras Jover
  • Patent number: 10360365
    Abstract: Client profile and service policy based captcha techniques. In one embodiment, a method comprises receiving a service request from a client device. A captcha is selected based upon the client information and a client policy in response to the service request. Captcha instructions and expected captcha response are generated for the selected captcha. The captcha instructions are sent to the client device for processing thereby. In response to the captcha instruction, a captcha response from the client device may be received. The captcha response is compared to the expected response to determine based on the service policy if the client device is operating under control of a user or operating autonomously.
    Type: Grant
    Filed: May 8, 2015
    Date of Patent: July 23, 2019
    Assignee: A10 NETWORKS, INCORPORATED
    Inventor: Micheal Thompson
  • Patent number: 10348490
    Abstract: An information processing device includes: a first acquisition unit that acquires authorization omission information being information indicating how many save units among a plurality of save units in which object pieces of an object divided into a division number are stored respectively do not need authorization processing, based on the division number indicating how many object pieces the object is to be divided into and a restoration number being a number of object pieces required to restore the object; and a decision unit that decides a save unit which does not need the authorization processing from among the plurality of save units, based on the authorization omission information acquired by the first acquisition unit.
    Type: Grant
    Filed: December 8, 2016
    Date of Patent: July 9, 2019
    Assignee: NS SOLUTIONS CORPORATION
    Inventors: Masaaki Takada, Hiroshi Furukawa, Hideki Kohno, Ryuichiro Kai
  • Patent number: 10341091
    Abstract: A solution for securing a memory storage is provided. A user password is received. A random number is read from Trusted Platform Module. Values of one or more Platform Configuration Registers of the Trusted Platform Module are received and a blob is created using the random number and the values from the one or more registers and the user password. The blob is encrypted in the Trusted Platform Module and re-encrypted in a Trusted Execution Environment execution mode of the apparatus utilizing hardware specific key and the user password and the re-encrypted blob is stored.
    Type: Grant
    Filed: January 15, 2016
    Date of Patent: July 2, 2019
    Assignee: BITTIUM WIRELESS OY
    Inventors: Vesa Keranen, Kari Nalli
  • Patent number: 10341867
    Abstract: A system, method, and computer program product are provided for improving carrier Wi-Fi authentication response time. In use, at least one message is received at a network policy server indicating user equipment is present in at least one cell associated with a cellular network, the at least one message including information associated with the user equipment and at least one cell identifier associated with the at least one cell. Additionally, one or more Wi-Fi hot-spots that reside in a coverage area associated with the at least one cell are identified.
    Type: Grant
    Filed: October 24, 2016
    Date of Patent: July 2, 2019
    Assignee: AMDOCS DEVELOPMENT LIMITED
    Inventors: Yaron Kadmon, Dori Ben-Moshe, Ronen Kenig
  • Patent number: 10325079
    Abstract: A node, of a network of nodes with access to a distributed ledger, receives a request to verify the user has consented to a current version of terms (i.e., current terms) associated with a program. The node obtains, using the distributed ledger, historical consent data indicating a version of the terms to which the user has previously provided consent. The node performs a first verification procedure to determine the user has not consented to the current terms, provides an indication to a user device that the user has not consented to the current terms, and receives, from the user device, a message indicating an acceptance of the current terms. The node performs additional verification procedures to determine that the user is who consented to the current terms and updates the distributed ledger to include a record indicating that the user consented to the current terms.
    Type: Grant
    Filed: December 4, 2018
    Date of Patent: June 18, 2019
    Assignee: Capital One Services, LLC
    Inventors: Adam Vukich, Abdelkadar M'Hamed Benkreira, Mykhaylo Bulgakov, Joshua Edwards, William Carroll
  • Patent number: 10318757
    Abstract: In an example, a query on a plurality of previously submitted confidential data values for a first cohort having one or more attributes is obtained, and a level in a hierarchy corresponding to an attribute type for the attribute is determined for each attribute. One or more additional cohorts corresponding to different combinations of generalizations of the one or more attributes up one or more levels in each hierarchy corresponding to an attribute type for each attribute are formed. For each cohort, a confidence score and a granularity score are calculated, and then a cohort score is calculated based on a weighted combination of the confidence score and the granularity score. A statistical function is performed on previously submitted confidential data values for a cohort having the highest cohort score, and a response to the query including a result from the statistical function is formed.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: June 11, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Krishnaram Kenthapadi, Stuart MacDonald Ambler
  • Patent number: 10311247
    Abstract: A system and method for isolating secure communication events from a non-secure application are described herein. The method can include the steps of intercepting a communication event from an external communications network or an external communications device and determining whether the communication event is a secure communication event. If the communication event is a secure communication event, the secure communication event can be processed by a secure application. In addition, the secure communication event can be prevented from being processed by the non-secure application.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: June 4, 2019
    Assignee: VMware, Inc.
    Inventors: Andrew James Dobson, David Medina
  • Patent number: 10305902
    Abstract: The present invention relates to a two-channel authentication proxy system capable of detecting application tampering, and a method therefor, and provides a method for detecting tampering of an authentication application installed on a mobile terminal, and an authentication proxy system, which performs two-channel device authentication in an authentication proxy server by using a mobile terminal, without individual authentication, by a user, in N (N?1) number of sites, relays the result thereof to a site to be authenticated, and enables repudiation to be prevented by leaving a relay record.
    Type: Grant
    Filed: June 19, 2017
    Date of Patent: May 28, 2019
    Inventor: Juhan Kim
  • Patent number: 10298405
    Abstract: A system may provide hardware acceleration for corrective blockchain-based record entry. Blockchain management circuitry (BMC) may receive a correction to a record entry. The BMC may access a consensus operating procedure. The BMC may apply the consensus operating procedure to the record entry to determine a corrective indicator. After completing the consensus operating procedure, the BMC may append a corrective block generated based on the record entry and corrective indicator to the blockchain. Accordingly, the system may ensure that corrective blocks added to the blockchain were generated in compliance with the consensus operating procedure.
    Type: Grant
    Filed: June 5, 2018
    Date of Patent: May 21, 2019
    Assignee: Accenture Global Solutions Limited
    Inventors: Noel Vivek Ramathal, Kevin Bernard Greene
  • Patent number: 10291648
    Abstract: A system for distributing virtual entity behavior profiling in cloud deployments is disclosed. In particular, the system may include conducting entity behavior profiling closer to where data and data logs are generated, such as at a hypervisor server, in a distributed fashion. By doing so, the system may reduce bandwidth consumption typically associated with transferring data to a central processing system, may be able to use more data collected closer to sources of data generation, and may provide faster reaction times because of the faster processing of data enabled by the system. Additionally, the system may assist with reducing false positives associated with malware detection and other compromises associated with entities by aggregating the results of distributed computations at different sites.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: May 14, 2019
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Paul Giura, Gustavo de los Reyes
  • Patent number: 10284550
    Abstract: The present invention relates to a method and an apparatus for employing an embedded subscriber identity module (hereinafter referred to as eSIM) to apply a policy such as a subsidy policy to, activate, deactivate, add to, update, and delete a user profile in a mobile communications network. The present invention enables a mobile device to determine whether to host the policy of a new service provider when it changes the present service provider or to perform a lock for prohibiting the policy change, and to change the profile related to the determination. The present invention also enables a mobile device to replace the policy related to the service provider by applying the policy, or to employ eSIM so as to activate, deactivate, revise, add, or delete the rules of the policy related to the service provider.
    Type: Grant
    Filed: April 15, 2014
    Date of Patent: May 7, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Kyungjoo Suh
  • Patent number: 10284536
    Abstract: A method for coordinating network entry of a device includes authenticating the device coupled to the controller, and allocating an address for the device, wherein allocating the address for the device occur concurrently with but independently of authenticating the device. The method also includes completing the network entry of the device upon successful completion of authenticating the device and allocating the address for the device.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: May 7, 2019
    Assignee: Futurewei Technologies, Inc.
    Inventor: Phillip Barber
  • Patent number: 10268835
    Abstract: A hosted application gateway server node may be communicatively coupled to backend systems, client devices, and database shards associated with database servers. Through the gateway server node, various services may be provided to managed containers running on client devices such that enterprise applications can be centrally managed. A sharding manager may manage relationships of database items across database shards. Each shard stores a copy of a table representing a split of a relationship. A shard ID mask is included in each item's ID. At query time, the shard ID can be extracted and used to query the correct database. This query routing mechanism allows navigation from one shard to another when multiple items are in a relationship (e.g., share the same resource such as a document). As such, embodiments can eliminate the need for APIs to join in data that span multiple shards.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: April 23, 2019
    Assignee: Open Text SA ULC
    Inventors: Gregory Beckman, Robert Laird, Geoffrey Michael Obbard
  • Patent number: 10268809
    Abstract: A multi-factor user authentication framework using asymmetric key includes a host device, a user agent, a gesture system, and an authentication system. The multiple factors include a user credential as well as a user gesture that indicates that the user is present. The user interacts with the user agent via the host device in order to obtain access to something for which user authentication is needed. The authentication system maintains the user credentials, which are provided to authenticate the user in response to the authentication system determining that the user is present (which can be determined in different manners, such as using a personal identification number (PIN), biometric information regarding the user, geographic location of the gesture system, etc.). The user agent, gesture system, and authentication system can be implemented on the same device (e.g., the host device), or alternatively implemented across one or more different devices.
    Type: Grant
    Filed: April 2, 2018
    Date of Patent: April 23, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander Thomas Weinert, Octavian T. Ureche, Benjamin Richard Vincent, Tarek Bahaa El-Din Mahmoud Kamel
  • Patent number: 10270597
    Abstract: Some embodiments provide a method for a first device to join a group of related devices. The method receives input of a password for an account with a centralized entity and a code generated by a second device in the group. When the second device determines that the code input on the first device matches the generated code, the method receives an authentication code from the second device for authorizing the first device with the entity as a valid device for the account. The method uses the password and information regarding the first device to generate an application to the group. After sending the application to the second device, the method receives information from the second device that enables the first device to add itself to the group. The second device verifies the generated application, and the method uses the information received from the second device to join the group.
    Type: Grant
    Filed: September 22, 2016
    Date of Patent: April 23, 2019
    Assignee: APPLE INC.
    Inventors: Yannick L. Sierra, Mitchell D. Adler
  • Patent number: 10257188
    Abstract: Techniques to facilitate offline access control for an application associated with an industrial automation environment are disclosed herein. In at least one implementation, a a user login prompt for the application is displayed on a display system of a computing system, wherein the user login prompt provides an offline access option for a user to request offline access to the application for a period of time. User login credentials are received along with a selection of the offline access option, which are transferred for delivery to an authentication server, wherein the authentication server authorizes the user for the offline access to the application for the period of time based on the user login credentials. An authentication response is received from the authentication server, wherein the authentication response instructs the application to authorize the user to operate the application for the period of time without requiring authorization from the authentication server.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: April 9, 2019
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Ashish Anand, Kyle Reissner
  • Patent number: 10255441
    Abstract: A method of managing an image by an electronic device may include: generating a first encryption image by encrypting a first image; acquiring bitstream data corresponding to a second image related to the first image; generating a changed image by combining at least some of the bitstream data and the first encryption image; and transmitting the changed image to an external electronic device.
    Type: Grant
    Filed: September 7, 2016
    Date of Patent: April 9, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Chan-Ho Jung, Han-Gil Moon
  • Patent number: 10235583
    Abstract: Disclosed are a method and apparatus for storing and/or digitizing documents that preserves the confidentiality of the documents. The technology includes a process, referred to herein as “shredding”, that extracts portions of a digitized document, such as a scanned document or an image file, to create “shreds.” A shred can be, for example, a field of a form, a portion of a photo, etc. In some embodiments where the source document includes confidential information, each individual shred does not include the confidential information and, with information of only one shred, a person cannot obtain the confidential information. As a result, while the source document needs to be stored in a secure fashion to prevent disclosure of the confidential information, the shreds can be stored in a non-secure fashion without risking disclosure of the confidential information.
    Type: Grant
    Filed: February 23, 2016
    Date of Patent: March 19, 2019
    Assignee: CAPTRICITY, INC.
    Inventors: Kuang Chen, Hui Peng Hu, Yoriyasu Yano, Nicholas Andre Jalbert
  • Patent number: 10216966
    Abstract: A technique perturbs an extent key to compute a candidate extent key in the event of a collision with metadata (i.e., two extents having different data that yield identical hash values) stored in a memory of a node in a cluster. The perturbing technique may be used to compute a candidate extent key that is not previously stored in an extent store instance. The candidate extent key may be computed from a hash value of an extent using a perturbing algorithm, i.e., a hash collision computation, which illustratively adds a perturb value to the hash value. The perturb value is illustratively sufficient to ensure that the candidate extent key resolves to a same hash bucket and node (extent store instance) as the original extent key. In essence, the technique ensures that the original extent key is perturbed in a deterministic manner to generate the candidate extent key, so that the original extent and candidate extent key “decode” to the same hash bucket and extent store instance.
    Type: Grant
    Filed: February 24, 2016
    Date of Patent: February 26, 2019
    Assignee: NetApp, Inc.
    Inventors: Edward D. McClanahan, Jeffrey S. Kimmel