Patents Examined by David Garcia Cervetti
  • Patent number: 10068070
    Abstract: A method of obscuring software code implementing an elliptic curve cryptography (ECC) point multiplication function, including: receiving ECC parameters including a multiplier d having N bits; transforming multiplier d into an array d(i) with ?1, 0, and +1 values while maintaining the same value for d; and generating ECC point multiplication function operations using the transformed multiplier array d(i) and N, wherein the generated ECC point multiplication function operations are split variable operations.
    Type: Grant
    Filed: July 31, 2015
    Date of Patent: September 4, 2018
    Assignee: NXP B.V.
    Inventors: Jan Hoogerbrugge, Wil Michiels, Pim Vullers
  • Patent number: 10068081
    Abstract: An information processing system includes a terminal apparatus including an instruction information creation unit and a first transmission unit, and an information processing apparatus including an execution unit, a reception unit, and a controller. The instruction information creation unit accepts one or more settings relating to processing and creates instruction information denoting the one or more settings. The first transmission unit transmits the instruction information to the information processing apparatus. The execution unit performs the processing related to the one or more settings denoted by the instruction information. The reception unit receives the instruction information and certificate information. The certificate information is information that certifies content of a first prohibition check process in which whether the execution unit supports the one or more settings is determined.
    Type: Grant
    Filed: February 16, 2016
    Date of Patent: September 4, 2018
    Assignee: FUJI XEROX CO., LTD.
    Inventor: Tomokazu Yoshimura
  • Patent number: 10057769
    Abstract: A method for updating a key in an active state is disclosed according to the embodiments of the present invention. The method includes steps of: initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; updating the key by the network side and the user equipment, and negotiating an activation time of the new keys. An apparatus for updating a key in an active state is also disclosed according to the present invention. With the present invention, the user equipment in an active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in an active state.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: August 21, 2018
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Yanmei Yang, Min Huang
  • Patent number: 10043003
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to acquire a plurality of reputations related to an object and combine the plurality of reputations to create a total reputation for the object. The object can include a plurality of sub-objects and each of the plurality of reputations can correspond to one of the sub-objects.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: August 7, 2018
    Assignee: McAfee, LLC
    Inventors: Joel R. Spurlock, John D. Teddy
  • Patent number: 10033678
    Abstract: A system and method of security for emoji based actions. The system and method may include processes such as obtaining a first text associated with an emoji image and a second text, determining to implement a security measure based at least in part on the first text associated with the emoji image, and determining a security level based at least in part on the second text.
    Type: Grant
    Filed: January 8, 2016
    Date of Patent: July 24, 2018
    Assignee: PAYPAL, INC.
    Inventors: Poornima Venkatakrishnan, Megan Marie O'neill
  • Patent number: 10033737
    Abstract: A system and method for cross-cloud identity matching are provided. The method includes receiving at least one user identifier of a user of a client node; determining at least one cloud-based resource accessed by the client node; selecting a cloud-based resource of the at least one accessed cloud-based resource; extracting at least one possible user identity of the user from the selected cloud-based resource; identifying at least one user identifier of the extracted at least one possible user identity; matching between each identified user identifier and the at least one received user identifier; determining whether each possible user identity is associated with the user respective of the matching; and upon determining that at least one possible user identity is associated with the user, storing each associated user identity respective of the client node.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: July 24, 2018
    Assignee: HARMON.IE R&D LTD.
    Inventor: Roy Sheinfeld
  • Patent number: 9992175
    Abstract: Systems, methods, and computer-readable media for providing standards compliant encryption, storage, and retrieval of date are disclosed. In an embodiment, data is received at a first data center from a first device in connection with a service request, and encrypted to produce encrypted data. The encrypted data may be transmitted from the first data center to the first device, and then may subsequently be received at a second data center. The second data center may store the encrypted data in a database accessible to the second data center. Because all data provided to the system is encrypted by the first data center prior to being stored and/or provided to the second data center, the database and the second data canter may be out of the scope of compliance monitoring, auditing, and reporting for one or more date security standards.
    Type: Grant
    Filed: January 8, 2016
    Date of Patent: June 5, 2018
    Assignee: Moneygram International, Inc.
    Inventor: Aaron Ferguson Cooley
  • Patent number: 9986374
    Abstract: Systems and methods are disclosed for providing personnel communications management within an enterprise or group of related enterprises during crisis situations. In particular, the systems and methods provide event management, shared situational awareness, personnel tracking, and unified crisis notification management to multiple users.
    Type: Grant
    Filed: November 19, 2015
    Date of Patent: May 29, 2018
    Assignee: AtHoc, Inc.
    Inventors: Guy Miasnik, Aviv Siegel, Rakesh Gupta
  • Patent number: 9979590
    Abstract: A digital video system including one or more video cameras and a video server connected to the one or more video cameras is disclosed. In an illustrative embodiment, the video server includes a computer having a central processing unit (CPU) for executing machine instructions and a memory for storing machine instructions that are to be executed by the CPU. The machine instructions when executed by the CPU implement a number of functions including identifying a failure mode of one or more cameras from one or more failure modes and executing a contingency function from one or more contingency functions based on the identification of the failure mode. The failure mode may be selected from a first, second and third failure mode. The contingency function may be selected from a first and second contingency function.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: May 22, 2018
    Assignee: JDS Technologies, Inc.
    Inventor: Joseph Robert Marchese
  • Patent number: 9977888
    Abstract: Systems and techniques for privacy protected input-output port control are described herein. In an example, an indication may be obtained that a protected port is disabled. A set of application attributes stored in a secure memory location may be compared to a set of attested application attributes to create a verification flag. At least one port attribute of the protected port may be obtained based on the verification flag. The protected port may be enabled using the at least one port attribute. Other examples, for controlling an input-output port using computer firmware and trusted execution techniques are further disclosed.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: May 22, 2018
    Assignee: Intel Corporation
    Inventors: Nitin V. Sarangdhar, Raul Gutierrez
  • Patent number: 9973479
    Abstract: The present embodiments relate to a communication system, communication method, information processor, method, device, program, and recording medium which permit plural algorithms to be treated and which can impart expansibility to communications. A capability list stores a capability list in which capabilities regarding algorithms for encryption and decryption treated by a reader/writer are described. Similarly, a capability list stores a capability list in which capabilities regarding algorithms for encryption and decryption treated by an IC card are described. The reader/writer and the IC card exchange their mutual capability lists, select algorithms capable of securing a security level according to the importance of the data sent and received, and perform communications based on the selected algorithms. The present embodiments can be applied, for example, to a device that performs communications by the NFCIP method.
    Type: Grant
    Filed: March 17, 2016
    Date of Patent: May 15, 2018
    Assignee: SONY CORPORATION
    Inventor: Katsuyuki Teruyama
  • Patent number: 9965654
    Abstract: Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of a puzzle, a plurality of images that collectively represent a keypad (for example) are generated and each image represents a different part of the characters. The generated images are to be displayed to a human user in a sequential fashion at at least a predetermined minimum frame rate, such that the plurality of images sequentially displayed are perceivable by the human user collectively as the keypad. In each of the plurality of images, at least a part of the characters of the keypad is disguised or concealed, and in some embodiments, to the extent that not a single character of the keypad is recognizable by a human or a machine. Further, bogus data can be selectively inserted to enhance security.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: May 8, 2018
    Assignee: SQUARE, INC.
    Inventor: Dino Dai Zovi
  • Patent number: 9967319
    Abstract: Examples of the present disclosure describe security context enforcement in a multi-tenant environment. Security context data may be transmitted through an un-secure multi-tenant computational environment. The security context data is secured by protection layers that restrict untrusted resources from running tenant applications and restrict the ability of unauthorized tenants to access context information associated with a tenant. Data may be received and evaluated at a component of a multi-tenant environment. If the component is a trusted component and the security context data indicates that the tenant is authorized to execute an application using a specified context, the component may run a tenant application in a context associated with the security context data.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: May 8, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Alexandra Savelieva, Mohammad Usman, Daniel Eshner, Nuwan Ginige
  • Patent number: 9959402
    Abstract: An MFP sets an access condition for an external device with respect to a cloud box. The access condition is transmitted from the MFP to a relay device, and is registered in a memory of the relay device. When the relay device receives an access request made by the external device with respect to the MFP serving as an internal device, the relay device determines whether to permit or deny access to the MFP by comparing the access request with the access condition. When the access is permitted, the access request is transferred from the relay device to the MFP, whereas when the access is denied, the relay device notifies the external device of it.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: May 1, 2018
    Assignee: KONICA MINOLTA INC.
    Inventors: Akihiro Torigoshi, Kazumi Sawayanagi, Noriaki Asamoto, Masami Yamada, Shuji Yoneda, Hisashi Uchida, Kazuya Anezaki, Yasutaka Ito
  • Patent number: 9959217
    Abstract: For storing data in a data-storage structure of a server computer, an infrastructure is deployed to a server computer. The infrastructure has a forwarder module to receive data from an application and to identify a data portion, a crypto module to encrypt the data portion with a key and key control module adapted to generate and to store the key. The infrastructure is also able to process data in the opposite direction. The key is provided into the key control module upon receiving a key trigger from the client computer.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: May 1, 2018
    Assignee: eperi GmbH
    Inventor: Elmar Eperiesi-Beck
  • Patent number: 9953173
    Abstract: A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database.
    Type: Grant
    Filed: May 4, 2015
    Date of Patent: April 24, 2018
    Assignee: NETFLIX, INC.
    Inventors: Ariel Tseitlin, Roy Rapoport, Jason Chan
  • Patent number: 9954851
    Abstract: A method for controlling access security at a vehicle gateway of a vehicle including at least one control unit in communication with the vehicle gateway includes: receiving a certificate from a diagnosis device; recognizing a rating of the certificate; and performing at least one of an integrity checking process and a security key authorization process according to the rating of the certificate to determine whether the diagnosis device is allowed to access to the vehicle.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: April 24, 2018
    Assignee: Hyundai Motor Company
    Inventors: Hyun Soo Ahn, A Ram Cho, Ho Jin Jung
  • Patent number: 9948468
    Abstract: In an example, a DHN (DHN) is provided for enabling grantees to access digitally-controlled assets of a principal. The principal (level 0) establishes a digital testament (DT), identifying one or more grantees on levels 1-n. Each grantee receives a digital heritage certificate (DHC), which may be based on the PKI certificate definition. The DHC includes a “PREDECESSORS” field, identifying one or more predecessor certificates that must be revoked before the DHC is valid. All grantee DHCs have the principal's level 0, DHC as a predecessor certificate. Level n certificates may also be valid only if all certificates at level n?1, have been revoked. In practice, a DHC may be revoked when a user of the certificate passes away, so that nth generation grantees inherit only when generation n?1, has passed away.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: April 17, 2018
    Assignee: McAfee, LLC
    Inventors: Alex Nayshtut, Oleg Pogorelik, Avishay Sharaga, Ned M. Smith, Igor Muttik
  • Patent number: 9934385
    Abstract: In a system for facilitating distributed security and vulnerability testing of a software application, each development sandbox in a set of sandboxes receives a portion of the entire application, and the received portion may be tested based on an application-level security policy to obtain a pass/fail result. The portion of the application corresponding to a certain sandbox may be modified and rescanned (i.e., retested) until the modifications, i.e., development achieves functional and quality requirements, and a pass result is obtained. Thereafter, the scan results are promoted to a policy sandbox, where a compliance result for the entire software application can be obtained based on, at least in part, the promoted results. Other sandboxes may also perform their respective pass/fail testing using the promoted results, thus minimizing the need for synchronizing the code changes in different sandboxes before testing for security policy in any sandbox and/or during application-level scanning.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: April 3, 2018
    Assignee: Veracode, Inc.
    Inventor: Peter J. Chestna
  • Patent number: 9935935
    Abstract: An identity selector manages the identity requirements of an online interaction between a user and a service provider environment. The identity selector is adapted for interoperable use with a user-portable computing device. The user device enables a user to carry identification information and to generate security tokens for use in authenticating the user to a service provider. The identity selector includes an agent module that facilitates communication with the user device. The identity selector imports the user identities from the user device and determines which user identities satisfy a security policy of a relying party. After the user selects one of the eligible user identities, the identity selector generates a token request based on the selected identity and forwards it to the user device, which in response issues a security token. The security token is returned to the identity selector and used to facilitate the authentication process.
    Type: Grant
    Filed: November 29, 2016
    Date of Patent: April 3, 2018
    Assignee: Open Invention Network LLC
    Inventor: Gail-Joon Ahn