Patents Examined by Darshan Dhruv
  • Patent number: 10346616
    Abstract: One method for developing a data loss prevention model includes receiving, at a processing device, an event record corresponding to an operation performed on a computing device. The event record includes an event type and event data. The method also includes transforming, using the processing device, the event type to an event number corresponding to the event type. The method includes transforming, using the processing device, the event data to a numerical representation of the event data. The method includes associating an indication of whether the event type and the event data correspond to a data loss event with the event number and the numerical representation. The method also includes determining the data loss prevention model using the indication, the event number, and the numerical representation.
    Type: Grant
    Filed: July 15, 2013
    Date of Patent: July 9, 2019
    Assignee: GENERAL ELECTRIC COMPANY
    Inventors: Shiva Prasad Kasiviswanathan, Lei Wu, Daniel Edward Marthaler, Scott Charles Evans, Varian Paul Powles, Philip Paul Beauchamp
  • Patent number: 10104545
    Abstract: An anonymity authentication method for wireless sensor networks is provided. A smart card carried by a user is used to provide two-factor verification protection. Moreover, a random factor and a hash function operation are introduced for participating an operation of the transmitted messages in all phases. Moreover, the operation of the transmitted messages uses only hash function and XOR operator.
    Type: Grant
    Filed: November 2, 2016
    Date of Patent: October 16, 2018
    Assignee: NATIONAL CHIN-YI UNIVERSITY OF TECHNOLOGY
    Inventor: Chi-Tung Chen
  • Patent number: 10095845
    Abstract: A license manager includes a processor and non-transitory computer readable media having encoded thereon a set of instructions executable by the at least one processor to receive a request, from a virtual machine, to reserve an individual license of the set of authorized licenses for a vendor software instance, determine the availability licenses for the requested vendor software, register a unique identifier of the virtual machine in association with an available individual license, grant the individual license to the virtual machine, and prevent the granted individual license from concurrent use by other virtual machines or devices.
    Type: Grant
    Filed: October 15, 2015
    Date of Patent: October 9, 2018
    Assignee: CenturyLink Intellectual Property LLC
    Inventors: Steven M. Casey, Thomas Schwengler, Kevin M. McBride, Felipe Castro
  • Patent number: 10068083
    Abstract: Methods and systems for secure web form submission may implement one or more operations including, but not limited to: receiving web content including at least one web form from a web server at a client; determining a value of at least one web form submission security attribute of the at least one web form; and transmitting submission data associated with the at least one web form from the client to the web server according to the value of the web form submission security attribute.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: September 4, 2018
    Assignee: International Business Machines Corporation
    Inventors: Ory Segal, Orli Gan
  • Patent number: 10069634
    Abstract: Apparatuses and methods for certificate generation, certificate revocation and certificate verification are provided. The certificate generation and revocation apparatus includes: a key set computation unit receiving a secret value and a hash function set and generating a key set of an entity; a hash function unit generating the hash function set; a certificate generation unit generating certificates corresponding to the public/private key pairs and the key set; a certificate revocation unit acquiring derived secret key corresponding to a revoked certificate set and updating a certificate revocation list; and a certificate revocation list broadcast unit broadcasting the certificate revocation list; wherein the secret value corresponds to a root of a key tree, wherein the key set is generated by leaves of the key tree, wherein each node of the key tree is generated by a randomly selected hash function.
    Type: Grant
    Filed: February 17, 2015
    Date of Patent: September 4, 2018
    Assignee: Industrial Technology Research Institute
    Inventors: Huei-Ru Tseng, Pei-Chuan Tsai
  • Patent number: 10027621
    Abstract: A system for classifying an Internet protocol (IP) address, including: a data store for storing client profile data associated with a client, the client profile data including an Internet protocol address of a server; and a processor for receiving a resolved Internet protocol address from the client, and determining whether the resolved Internet protocol address corresponds to a second server associated with the first server. The data store includes configuration data representing Internet protocol addresses corresponding to servers in a server farm, and the processor determines that the servers are associated and part of the server farm when the resolved IP address corresponds to one of the IP addresses of the configuration data. The resolved IP address is received with a client request, and the request is allowed when the second server is associated with the first server.
    Type: Grant
    Filed: December 22, 2008
    Date of Patent: July 17, 2018
    Assignee: Network Box Corporation Limited
    Inventor: Mark Crispin Webb-Johnson
  • Patent number: 10015542
    Abstract: A method and system are provided for securely storing and retrieving live off-disk media programs. Events delineate media segments, each of which are encrypted with a different key so as to be streamable to a remote device via digital living network alliance (DLNA) or HTTP live streaming protocols. Media segments and identifiers for managing the storage and retrieval of such media segments are compatible with live streaming data structures, obviating the need to re-encrypt data streams.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: July 3, 2018
    Assignee: ARRIS Enterprises LLC
    Inventors: Rafie Shamsaasef, William P Franks, Geetha Mangalore, Paul Moroney
  • Patent number: 9992025
    Abstract: Software applications previously or currently being installed on a plurality of user devices are monitored. In one embodiment, a first set of the installed applications that is signed with a signing identifier of a developer are identified. A report is then sent to the developer that includes an identification of the first set. In another embodiment, the authenticity of a first application is evaluated including determining, based on a respective signing identifier for each of a plurality of applications, that the applications are similar to the first application. A notification is sent to the developer that identifies applications having a signing identifier that is different from the signing identifier of the developer.
    Type: Grant
    Filed: April 15, 2014
    Date of Patent: June 5, 2018
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
  • Patent number: 9971888
    Abstract: A system and method for protecting against the unauthorized use of operating system level commands is disclosed. The system includes a computer module including: a processor configured for performing data operations; a memory unit configured to store instructions executable by the processor; and an operating system module for supporting basic functions of the computer module, such as scheduling tasks, executing applications, and controlling peripherals. A virtual keyboard is connected to the computer module for creating one or more events or sequences of events recognizable by the operating system module. A system level command filter module is provided for filtering system level commands from the one or more recognizable events or sequences of events.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: May 15, 2018
    Assignee: ID Integration, Inc.
    Inventor: Gene Anderson
  • Patent number: 9965816
    Abstract: The product unit disclosed herein has identification data that are stored internally in memory. This stored identification data can be viewed as the product unit's “digital nameplate,” in that the data can represent the product unit's identifier, brand, and so on. Each data set is digitally signed while on the production line by using an encryption technique. The digitally signed data set is then written into the product unit's memory where it can be used for verification. A first digitally-signed data set can be used to control the use of one or more software modules that are provided by a software owner. The data that are undergoing signature contain at least one globally-unique identifier, which can be used to identify cloning attempts. Additionally, more than one digital signature can be used, in order to protect and control the use of features other than the software, such as the product brand.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: May 8, 2018
    Assignee: Silvair Sp. z o.o.
    Inventors: Maciej Langman, Szymon Slupik, Adam Gembala
  • Patent number: 9928387
    Abstract: The present invention is a self contained, portable security case or container. The case is secure in its locked condition by locks which are preferably operated by an electronic key. The electronic key can be programmed to open the case or container dependent upon various different conditions, for example, location, time, identification of operator, etc. In addition to the electronic key, a biometric identification device can be employed. The exterior of the case or container is made from different materials which are impermeable and resistant to heat, drilling and ballistic impact. A GPS type of location device located within the case enables the case to be tracked from remote locations.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: March 27, 2018
    Assignee: Charles Hallinan
    Inventor: Anthony T. Simpson
  • Patent number: 9910790
    Abstract: Provided are a memory system, memory controller, and method for using a memory address to form a tweak key to use to encrypt and decrypt data. A base tweak co is generated as a function of an address of a block of data in the memory storage. For each sub-block of the block, performing: processing the base tweak to determine a sub-block tweak; combining the sub-block tweak with the sub-block to produce a modified sub-block; and performing an encryption operation comprising one of encryption or decryption on the modified sub-block to produce sub-block output comprising one of encrypted data and unencrypted data for the sub-block.
    Type: Grant
    Filed: December 12, 2013
    Date of Patent: March 6, 2018
    Assignee: INTEL CORPORATION
    Inventors: Kirk S. Yap, Gilbert M. Wolrich, Vinodh Gopal, Wajdi K. Feghali
  • Patent number: 9894082
    Abstract: Various methods for unwanted traffic control in a wireless network are provided. One example method may include detecting an occurrence of unwanted content as indicated by receipt of a complaint about a content item provided by a source device, wherein the complaint may be received from a remote mobile device or generated locally based on a local detection. The example method may further include determining a trust value for the source device based at least on the complaint, determining that the source device is a distrusted device based at least on a comparison between the trust value and a trust threshold value, and causing traffic from the source device to be controlled as unwanted traffic. Similar and related example methods, example apparatuses, and example computer program products are also provided.
    Type: Grant
    Filed: January 18, 2011
    Date of Patent: February 13, 2018
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Patent number: 9880891
    Abstract: Included are embodiments for assignment and failover of resources. More specifically, at least one embodiment of a method includes assigning, to a user of an access device (202), at least one primary resource (210, 212). Some embodiments include assigning, to the user of the access device (202), at least one backup resource (210, 212).
    Type: Grant
    Filed: September 30, 2008
    Date of Patent: January 30, 2018
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeffrey Joel Walls, Byron A. Alcorn, Thomas J. Flynn, Roland M Hochmuth, Quoc P. Pham, Valentin Popescu
  • Patent number: 9867043
    Abstract: A secure device enrollment process to enroll a mobile device for access to a service can include receiving an application package including an application used for accessing the service via the mobile device. The application authenticity and the application integrity of the downloaded application are determined. The device integrity of the mobile device is also determined. An automatic enrollment message digest is generated to facilitate enrollment of the mobile device. The enrolment message digest provides an association between the downloaded application, the mobile device, and user identifying information of a user of the mobile device; and is sent to a server associated with a service provider to enroll the mobile device for the service provided by the service provider.
    Type: Grant
    Filed: August 27, 2013
    Date of Patent: January 9, 2018
    Assignee: Visa International Service Association
    Inventor: Selim Aissi
  • Patent number: 9779220
    Abstract: A method includes (a) selecting a first token column or a second token column of a token table as an active token column based upon the value of a current token flag, (b) selecting a row of the token table uniquely associated with a sensitive piece of data, the selected row having a first token field storing a first token value and a second token field storing a second token value, (c) selectively extracting an active token value from the first token field when the first token column is the active token column and from the second token field when the second token column is the active token column, (d) selecting a row of a data table having the extracted active token value within a token field, and (e) causing contents of the selected row of the data table to be displayed to a user over a user interface.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: October 3, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Boris Kronrod, Shadi Ibrahim, Oleg Freylafert
  • Patent number: 9754133
    Abstract: A semiconductor device may include a secure memory configured to store a programmable key, an interface for programming the programmable key in the secure memory, and a plurality of configurable features of the semiconductor device that are associated with the programmable key, each configurable feature having a set of multiple selectable configurations, wherein a value of the key defines a selection of one of the multiple configurations for each of the configurable features. For example, the key may include multiple sub-keys, each associated with one of the configurable features, wherein a value of each sub-key defines a selection of one of the multiple configurations for the configurable feature associated with that sub-key. In addition, the full programmable key may enable an additional functionality of the semiconductor device.
    Type: Grant
    Filed: February 17, 2014
    Date of Patent: September 5, 2017
    Assignee: MICROCHIP TECHNOLOGY INCORPORATED
    Inventor: Michael Simmons
  • Patent number: 9705897
    Abstract: A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple encryption operation is determined of the first processing element and the second processing element. The first processing element includes a first encryption key for encrypting the tuples as the leave the first processing element. An encryption workload is measured of the tuple encryption operation of a processing workload of the use of the first encryption key of a transfer of the stream of tuples. A threshold of the tuple encryption operation is determined. The second processing element is migrated to the first compute node and fused to the first compute node with the first processing element. The tuple encryption operation is removed from the first processing element.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: July 11, 2017
    Assignee: International Business Machines Corporation
    Inventors: Eric L. Barsness, Michael J. Branson, John M. Santosuosso
  • Patent number: 9674167
    Abstract: The present invention provides a new method of site and user authentication. This is achieved by creating a pop-up window on the user's PC that is in communication with a security server, and where this communication channel is separate from the communication between the user's browser and whichever web site they are at. A legitimate web site embeds code in the web page which communicates to the security server from the user's desktop. The security server checks the legitimacy of the web site and then signals both the web page on the user's browser, as well as the pop-up window to which it has a separate channel. The security server also sends a random image to both the pop-up window and the browser. If user authentication is requested by the web site the user is first authenticated by the security server for instance by out of band authentication. Then the security server computes a one time password based on a secret it shares with the web site and sends it to the pop up window.
    Type: Grant
    Filed: April 15, 2013
    Date of Patent: June 6, 2017
    Assignee: Early Warning Services, LLC
    Inventor: Ravi Ganesan
  • Patent number: 9536063
    Abstract: A processing device provides a method for protecting a program from unauthorized copying. The processing device may include an encrypted version of the program. According to one example method, the processing device creates a secure enclave, and in response to a request to execute the encrypted program, the processing device automatically generates a decrypted version of the program in the secure enclave by decrypting the encrypted program in the secure enclave. After automatically generating the decrypted version of the program in the secure enclave, the processing device may automatically execute the decrypted version of the program in the secure enclave. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 24, 2013
    Date of Patent: January 3, 2017
    Assignee: Intel Corporation
    Inventors: Bin Xing, Bo Zhang, Mark W. Shanahan, James D. Beaney, Jr.