Patents Examined by David Garcia Cervetti
-
Patent number: 11416417Abstract: A method is provided that includes reading data in a storage medium, detecting, during the reading of the data in the storage medium, by a controller a change in an encryption/decryption scheme used to read and write the data in the storage medium, in response to detecting the change in encryption/decryption scheme in the data, causing, by the controller, a logical block address to return an indication of being written in zeros when a physical block address associated with the logical block address encrypted using an first encryption/decryption scheme, and causing, by the controller, a write channel to write zeroes using a second encryption/decryption scheme to the physical block address.Type: GrantFiled: May 18, 2020Date of Patent: August 16, 2022Assignee: Western Digital Technologies, Inc.Inventors: Darin Edward Gerhart, Cory Lappi, Daniel Robert Lipps, William Jared Walker
-
Patent number: 11409844Abstract: Present embodiments are directed toward a domain-separated license management system (DSLMS) for managing software license compliance in a domain-separated architecture, such as a domain-separated client instance. The DSLMS populates a domain tree structure with a determined number of software licenses assigned to, and a determined number of software licenses in use by, each granular domain of the instance, and this information is stored in the leaf nodes of the domain tree structure. The domain tree structure may be further populated to include a number of software licenses assigned to, and a number of software licenses in use by, each non-leaf node of the domain tree structure. Once populated, the domain tree structure is used to determine whether the represented domain-separated client instance is fully-compliant, partially-compliant, or non-compliant.Type: GrantFiled: February 11, 2019Date of Patent: August 9, 2022Assignee: ServiceNow, Inc.Inventor: Benwen Sun
-
Patent number: 11397793Abstract: The present disclosure relates to systems, methods, and computer-readable media for providing digital content for an application to users. For example, systems described herein can provide a license for the digital content during a rental time. Systems disclosed herein may additionally track a duration of use of an application and compare the tracked use against an amount of rental time purchased (e.g., rented) by a user. The systems described herein may further extend a license or terminate the license based on a determination of whether the amount of use exceeds a rental time. Features and functionality described herein provide a flexible and efficient mechanism that enables users having a variety of content-consuming preferences to receive affordable content while ensuring that use of an application is efficiently and accurately tracked.Type: GrantFiled: December 3, 2019Date of Patent: July 26, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Geoffrey Edward Pease, Daniel Christopher Rodgers, Jesse Daniel Kaplan, Madhusri Nayak
-
Patent number: 11386239Abstract: A method for the transition is provided from a Boolean masking of a value to be kept secret to an additive masking of the value to be kept secret. The value to be kept secret is present in the Boolean masking as a representation masked with a first Boolean mask and a second Boolean mask. A first additive mask and a second additive mask are determined for the value to be kept secret. A first masking transition is executed in which the first Boolean mask is converted into the first additive mask. A second masking transition is executed in which the obfuscation value is converted into an additive correction value, and a third masking transition is executed in which the second Boolean mask is converted into the second additive mask.Type: GrantFiled: February 28, 2018Date of Patent: July 12, 2022Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Jürgen Pulkus, Lars Hoffmann
-
Patent number: 11388002Abstract: A method is provided for conducting an operation, the method including: determining a first result based on combining a first input with a first mask; determining a second result based on combining a second input with a second mask, the first mask and the second mask fulfilling a precondition; and conducting the operation based on the first result and the second result. A corresponding device is also provided.Type: GrantFiled: March 25, 2019Date of Patent: July 12, 2022Assignee: Infineon Technologies AGInventors: Markus Rau, Stefan Heiss
-
Patent number: 11379560Abstract: In accordance with the present approach, a license analysis system may receive user activity data for a software program from an enterprise or client, including a client-specific association between license types and user assignments. The user assignments may include roles, profiles, and/or authorization objects assigned to each user within the software program. The license analysis system may analyze the user activity data to generate one or more 1:m relationships of each license type to a number of user assignments within the enterprise. The license analysis system may then compare the 1:m relationships to the user activity data to identify an acceptable license type assignment for each user that provides appropriate software authorizations according to their historic software usage.Type: GrantFiled: March 18, 2019Date of Patent: July 5, 2022Assignee: ServiceNow Inc.Inventor: Samyuktha Reddy Gopireddy
-
Patent number: 11379561Abstract: A method may include obtaining a state diagram of a software management system, wherein the software management system manages at least a first software and configuring a license usage management system based on the state diagram.Type: GrantFiled: July 15, 2019Date of Patent: July 5, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Alexander Shatov, Christopher Rath, John Murray, Michelle Martens
-
Patent number: 11372951Abstract: An apparatus includes a first host device comprising a first multi-path input-output (MPIO) driver configured to discover additional MPIO drivers of additional host devices of an enterprise system that utilize a given piece of software for controlling delivery of input-output operations to a storage system over selected ones of a plurality of paths through a network, the given software being licensed by a license server external to the enterprise system. The first MPIO driver is also configured to obtain a pool of licenses for the given software from the license server and to receive from a given one of the additional MPIO drivers a request for a license to utilize the given software. The first MPIO driver is further configured to check out one of the pool of licenses and enable use of the given software by the given additional MPIO based at least in part on the checked-out license.Type: GrantFiled: December 12, 2019Date of Patent: June 28, 2022Assignee: EMC IP Holding Company LLCInventors: Mahalakshmi Sokkalal, Maneesh Pusalkar, Vigneshwaran Rajasekaran, Surendra Singh Chauhan, Udit Tyagi, Nagaveni Bhavi, Gopinath Marappan
-
Patent number: 11366879Abstract: A content server system is provided that includes at least one processor configured to store a user account for a user at a content server of the content server system that is configured to serve server-side rendered content to a client computing device of the user. Audio is played out via a sound output device associated with the client computing device. The at least one processor is further configured to determine a licensing identifier associated with a device of the user or the user account of the user, send the licensing identifier to a third-party licensing server device, receive an indication that an active license is associated with the licensing identifier, determine that the user is authorized to access a digital rights managed audio rendering software, and cause audio of the server-side rendered content to be rendered using audio rendering algorithms of the digital rights managed audio rendering software.Type: GrantFiled: July 8, 2019Date of Patent: June 21, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventor: Steven Wilssens
-
Patent number: 11362824Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.Type: GrantFiled: May 23, 2019Date of Patent: June 14, 2022Assignee: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, David P. Maher
-
Patent number: 11356478Abstract: Techniques for phishing protection using cloning detection are described herein. The techniques described herein can include a server which hosts a website detecting that a fetcher is a cloning toolkit or an entity known for using a cloning toolkit. The techniques can also include a server which hosts a downloadable application (such as a mobile application) detecting that a fetcher for the application is a cloning toolkit or an entity known for using a cloning toolkit. The detection can be done in several ways, such as by analyzing data logs for patterns associated with cloning toolkits or entities known for using cloning toolkits. The techniques described herein can also include a part of an end user device (such as a part of a mobile device) detecting a clone (such as a clone website or application) that was cloned by a cloning toolkit. Then, upon detection, security actions can be taken.Type: GrantFiled: November 19, 2019Date of Patent: June 7, 2022Assignee: Lookout, Inc.Inventors: Jeremy Boyd Richards, Brian James Buck
-
Patent number: 11354406Abstract: Methods and apparatus relating to a physics-based approach for attack detection and/or localization in closed-loop controls for autonomous vehicles are described. In an embodiment, multiple state estimators are used to compute a set of residuals to detect, classify, and/or localize attacks. This allows for determination of an attacker's location and the kind of attack being perpetrated. Other embodiments are also disclosed and claimed.Type: GrantFiled: June 28, 2018Date of Patent: June 7, 2022Assignee: INTEL CORPORATIONInventors: Marcio Juliato, Shabbir Ahmed, Manoj Sastry, Liuyang L. Yang, Vuk Lesi, Li Zhao
-
Patent number: 11341269Abstract: Methods for secure random selection of t client devices from a set of N client devices and methods for secure computation of inputs of t client devices randomly selected from N client devices are described. Such random selection method may include determining an initial binary vector b of weight t by setting the first t bits to one: bi=1, 1?i?t, and all further bits to zero: bi=0, t<i?N; each client device i (i=1, . . . , N) of the set of N client devices jointly generating a random binary vector b of weight t in an obfuscated domain on the basis of the initial binary vector b including: determining a position n in the binary vector; determining a random number r in {n, n+1, . . . N}; and, using the random number to swap binary values at positions n and r of the binary vector b.Type: GrantFiled: December 28, 2018Date of Patent: May 24, 2022Assignee: FLYTXT B.V.Inventor: Thijs Veugen
-
Patent number: 11334547Abstract: Some embodiments are directed to a data retrieval device 210 for data-obliviously copying a subarray of a first array to a second array. The length of the second array is more than one and less than the length of the first array. The length of the subarray is at most the length of the second array. For each first element at a first index in the first array, the data retrieval device selects a second index in the second array for the first index in the first array; data-obliviously computes a choice bit indicative of whether to copy the first element to the second index in the second array; and replaces a second element at the second index in the second array by a replacement element, the replacement element being data-obliviously set to the first element or the second element based on the choice bit.Type: GrantFiled: August 9, 2019Date of Patent: May 17, 2022Assignee: KONINKLIJKE PHILIPS N.V.Inventor: Meilof Geert Veeningen
-
Patent number: 11328039Abstract: An electronic apparatus includes: an input module configured to input an export instruction and an electronic apparatus identifier, the export instruction instructing to export an application, the electronic apparatus identifier corresponding to one different electronic apparatus; a controller module configured to generate an activation key on a basis of the electronic apparatus identifier where the export instruction is input, the activation key being for activating the application only in the one different electronic apparatus, control to output a package file including the application and the activation key, and inactivate the application after a certain replacement transition time period passes, the certain replacement transition time period starting from an output time point of the package file; and an output module configured to output the package file controlled by the controller module.Type: GrantFiled: March 2, 2020Date of Patent: May 10, 2022Assignee: KYOCERA DOCUMENT SOLUTIONS INC.Inventors: Hiroshi Nakamura, Satoshi Imai, Aya Kamakura, Hiroshi Yoshimoto
-
Patent number: 11310043Abstract: A receiver in a communication system may include a buffer and hardware. The buffer may be configured to store a communication signal comprising one or more pulses representative of data. The hardware may be configured to determine whether a data authentication pulse has been superimposed over at least one of the one or more pulses, and authenticate, based on the determination of whether the data authentication pulse has been superimposed over at least one of the one or more pulses, the one or more pulses as a valid representation of the data.Type: GrantFiled: January 3, 2019Date of Patent: April 19, 2022Assignees: Rolls-Royce Corporation, Rolls-Royce North American Technologies, Inc.Inventors: John Joseph Costello, Richard Joseph Skertic, Wayne Thomas Padgett, Sr.
-
Patent number: 11301592Abstract: A processing module of a dispersed storage network determines an obfuscation method is determined from a plurality of obfuscation methods for a data segment. The method continues with the processing module obfuscating the data segment according to the obfuscation method to produce an obfuscated data segment. The obfuscated data segment is encrypted and dispersed storage error encoded to produce a set of encoded data slices. The set of encoded data slices is then transmitted for storage in the dispersed storage network.Type: GrantFiled: November 6, 2017Date of Patent: April 12, 2022Assignee: PURE STORAGE, INC.Inventors: S. Christopher Gladwin, Jason K. Resch, Thomas F. Shirley, Jr.
-
Patent number: 11288397Abstract: Textual masking for multiparty computation is provided. The method comprises receiving masked input data from a number of contributors, wherein the input data from each contributor has a unique contributor mask value. A unique analyst mask factor is received for each contributor, computed by an analyst as a difference between a uniform analyst mask value and the contributor mask value. An API call is received from the analyst to aggregate the input data from the contributors. The respective analyst mask factors are added to the input data from the contributors, and the data is aggregated and shuffled. Computational results received from the analyst based on the aggregated input data are published. In response to API calls from the contributors, the analyst mask factors are removed from the computational results, wherein computational results received by each contributor are masked only by the respective contributor mask value.Type: GrantFiled: September 3, 2019Date of Patent: March 29, 2022Assignee: International Business Machines CorporationInventors: Padmanabhan Krishnan, Vaibhav Murlidhar Kulkarni, Gopikrishnan Varadarajulu, Rakhi S. Arora, Samir Katti
-
Patent number: 11288347Abstract: Systems and techniques for providing login from an alternate electronic device are presented. A system can receive hash data associated with first fingerprint data and a timestamp from a first electronic device in response to a determination that the first electronic device satisfies a defined criterion associated with a terminal computing request. The system can also form a correlation between the first electronic device and a second electronic device within a geographic area associated with the first electronic device based on the timestamp, first location data associated with the first electronic device, and second location data associated with the second electronic device. Furthermore, the system can initiate display of a graphical user interface on the second electronic device in response to a determination that second fingerprint data provided to the second electronic device within a timeframe associated with the timestamp matches the first fingerprint data associated with the hash data.Type: GrantFiled: March 7, 2019Date of Patent: March 29, 2022Assignee: PayPal, Inc.Inventor: Jigar Gosalia
-
Patent number: 11281790Abstract: A method and system for encrypting and reconstructing data files, including related metadata, is disclosed. The method involves separately encrypting data and metadata as chaining processes and integrating a plurality of encryption/encoding techniques together with strategic storage distribution techniques and parsing techniques which results in the integrated benefits of the collection of techniques. As disclosed, the content data is separated from its metadata, encryption keys may be embedded in the metadata, and in a content data encryption chaining process, the method chunks, encrypts, shards, and stores content data and separately shards and stores metadata, and stored in a flexible, distributed, and efficient manner, at least in part to assure improved resiliency In addition, the processes are preferably implemented locally, including at the site of the content data or a proxy server.Type: GrantFiled: May 14, 2020Date of Patent: March 22, 2022Assignee: Myota, Inc.Inventor: Jaeyoon Chung