Patents Examined by David Le
  • Patent number: 9781152
    Abstract: A method of verifying an account login request may include identifying one or more Internet Protocol (IP) addresses as potentially malicious and, for each identified IP address, determining a first value equal to a number of times over a period of time that the IP address was identified by the computing device as potentially malicious, determining a second value equal to a number of times over the period of time that the IP address was confirmed to be potentially malicious by one or more account users, determining a proportion value associated with the IP address by determining a ratio of the second value to the first value, labeling the IP address as safe or unsafe based on at least the proportion value associated with the IP address, and maintaining, by the computing device, a list of the IP addresses and corresponding labels.
    Type: Grant
    Filed: September 11, 2013
    Date of Patent: October 3, 2017
    Assignee: GOOGLE INC.
    Inventors: Aleksandr Mistratov, Daniel Margolis, Michael Christopher Hearn
  • Patent number: 9778642
    Abstract: A data-processing system having at least one operating memory holding operating data is provided with a protection unit having an execution environment protected from unauthorized access. At least one monitoring logic in the execution environment is connected to the operating memory for monitoring unauthorized modifications, access, or similar protection violations of the operating data stored in the operating memory and for generating an output on detection of such a protection violation. A protection logic in the execution environment holds replacement data capable of replacing the operating data and is connected to the monitoring logic for, on generation of the output, providing to the operating memory the replacement data for the operation or for a substitute operation of the data-processing system.
    Type: Grant
    Filed: March 11, 2008
    Date of Patent: October 3, 2017
    Assignee: secunet SECURITY NETWORKS AKTIENGESELLSCHAFT
    Inventors: Marco Hofmann, Harry Knechtel, Gunnar Hettstedt, Marc Lindlbauer
  • Patent number: 9729566
    Abstract: In a vehicle communication network, some vehicles may be used by attackers to send false information to other vehicles which may jeopardize the safety of other vehicles. Vehicles should be able to detect malicious communications activities and to mitigate the impact of malicious vehicles by evicting (eliminating) suspected malicious vehicles from the system. Evicting a vehicle is to ignore the messages sent from the vehicle for a specified time period. Voting and sacrifice principles are combined using a mathematical model based on the “Mafia Game”. The Mafia Game model focuses on the relative size of the group of attackers within a neighborhood necessary to dominate the entire network in the neighborhood (i.e., to eventually evict all the innocent vehicles).
    Type: Grant
    Filed: December 18, 2014
    Date of Patent: August 8, 2017
    Assignee: Vencore Labs, Inc.
    Inventors: Eric van den Berg, Tao Zhang
  • Patent number: 9698976
    Abstract: A pool of public keys, having a pool size, is received from a first device. The pool size reflects a target number of keys to be included in the pool. One of the received public keys included in the pool of keys is designated as a reserve key. A public key is selected from the pool of received public keys for use in conjunction with encrypting a communication to the first device. The selecting includes preferentially selecting a public key that is not designated as a reserve key, if at least one such key is present in the pool in addition to the reserve key. The size of the pool can be dynamically adjusted.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: July 4, 2017
    Assignee: Wickr Inc.
    Inventors: Robert Statica, Christopher A. Howell
  • Patent number: 9674180
    Abstract: Embodiments of the present invention provide methods, system and machine-readable media for dynamically providing identity management or other services. According to one embodiment, dynamically providing services can comprise receiving a request related to an unknown principal. A service to which the principal is known can be selected. Once a service to which the principal is known has been located, an identity management result can be obtained from the selected service. The method can further comprise determining based on the identity management result whether the principal is authorized to access a requested resource. In response to determining the principal is authorized, the requested resource can be accessed.
    Type: Grant
    Filed: November 15, 2013
    Date of Patent: June 6, 2017
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventor: Stephane H. Maes
  • Patent number: 9667413
    Abstract: An encryption realization method and system are disclosed. The method includes: a network-side device and a group call terminal maintaining the same list of push-to-talk (PTT) authentication key K values respectively; during each group call, the network-side device calculating an authentication vector (AV) according to a generated random number (RAND), an authentication sequence number (SQN), a PTT authentication key K value selected from the list of PTT authentication key K values and public network authentication functions; and according to the RAND and an authentication token (AUTN) in the AV acquired from the network-side device, the group call terminal performing authentication to generate an cipher key (CK).
    Type: Grant
    Filed: August 15, 2013
    Date of Patent: May 30, 2017
    Assignee: ZTE CORPORATION
    Inventor: Yan Lin
  • Patent number: 9641334
    Abstract: A method for ascertaining access permissions of users to computer resources on a storage unit, the method including grouping users into a plurality of user groups wherein all members of at least one of the user groups have at least nearly identical user/resource access permissions to the computer resources, grouping resources into a plurality of resource groups wherein all members of at least one of the resource groups have at least nearly identical resource/user access permissions, ascertaining whether a given user is a member of a user group, if the given user is a member of a user group, ascribing to the given user the user/resource access permissions of the user group, ascertaining whether a given resource is a member of a resource group, and if the given resource is a member of a resource group, ascribing to the given resource the resource/user access permissions of the resource group.
    Type: Grant
    Filed: July 7, 2009
    Date of Patent: May 2, 2017
    Assignee: VARONIS SYSTEMS, INC.
    Inventors: Yakov Faitelson, Ohad Korkus, Yzhar Keysar
  • Patent number: 9576114
    Abstract: A system for securely downloading and playing coherent digital content such as music and preventing its play by unauthorized users. The system may include mass server/storage devices for receiving and storing digital content having predetermined gaps; and client devices communicating with the server/storage devices, and providing authorization to proceed. During playing of the digital content by the client devices, the missing gaps may be filled into the appropriate places, to allow the play of the coherent digital content.
    Type: Grant
    Filed: March 19, 2014
    Date of Patent: February 21, 2017
    Inventor: Marvin Marshall
  • Patent number: 9559907
    Abstract: In various embodiments, a control client is configured to determine whether or not the most current configuration profile has been installed within a corresponding mobile device. In particular embodiments, the client is configured to store its own copy of a configuration profile and to compare its copy with the most current configuration profile generated by a device management system as well as to the configuration profile currently installed and applied by a configuration manager within the mobile device. Each configuration profile includes an embedded verification token that facilitates this process. Furthermore, the client may be configured to inform the device management system as to whether or not the current configuration profile has been installed. The device management system may govern enterprise access by the mobile device based on whether or not the current configuration profile has been installed.
    Type: Grant
    Filed: October 26, 2015
    Date of Patent: January 31, 2017
    Assignee: MOBILE IRON, INC.
    Inventors: Timothy Michael Burks, Sandilya Garimella
  • Patent number: 9553868
    Abstract: Techniques are described for enabling administrators of teams that use a particular service to specify which sign-on options, of multiple possible sign-on options, are assigned to the members of the teams to which the administrators belong. For example, an administrator may assign a first sign-on option, which only allows users to use native authentication, to one set of members of the team. At the same time, the administrator may assign a second sign-on option, which only allows users to use third-party single-sign-on authentication, to another set of members of the same team.
    Type: Grant
    Filed: May 19, 2015
    Date of Patent: January 24, 2017
    Assignee: Dropbox, Inc.
    Inventors: Anand Subramani, Francois Alexander Allain
  • Patent number: 9547774
    Abstract: The present disclosure relates to an advantageous system and related methods for distributed deduplication of encrypted chunks. One embodiment relates to a method for storing encrypted chunks in which an encryption key is generated independently from a chunk payload. With this method, two encrypted chunks are identifiable as having identical chunk payloads even when the chunk payloads are encrypted with different encryption keys. Other embodiments, aspects and features are also disclosed.
    Type: Grant
    Filed: April 16, 2015
    Date of Patent: January 17, 2017
    Assignee: Nexenta Systems, Inc.
    Inventors: Caitlin Bestler, Alexander Aizman
  • Patent number: 9548986
    Abstract: A system and method for tracking sensitive data uses dynamic taint analysis to track sensitive data as the data flows through a target application running on a computer system. In general, the system and method for tracking sensitive data marks data as tainted when the data input to the target application is indicated as sensitive. The system and method may then track the propagation of the tainted data as the data is read from and written to memory by the target application to detect if the tainted data is output from the application (e.g., leaked). Dynamic binary translation may be used to provide binary instrumentation of the target application for dynamic taint analysis to track propagation of the tainted data at the instruction level and/or the function level. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: January 17, 2017
    Assignee: Intel Corporation
    Inventors: Jaeyeon Jung, Yu Zhu
  • Patent number: 9544142
    Abstract: A method for transmitting digital data to a recipient via a communications network includes providing digital data and digitally signing the digital data using N cryptographic keys. Each of the N cryptographic keys is associated with a same sender of the digital data, and N>1. The recipient receives the digital data and verifies the digital signature using N cryptographic keys associated with the N cryptographic keys used to sign the digital data. In dependence upon verifying the digital signature, the recipient accepts the digital data as being authentic.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: January 10, 2017
    Assignee: Kingston Digital, Inc.
    Inventor: Scott Newman Ashdown
  • Patent number: 9544151
    Abstract: A method for controlling access to data being processed by a remote computing resource includes issuing a public encryption key for a data creator from a public certificate authority, detecting an encounter with a data owner, creating private encryption keys for the data creator and the data owner in response to detecting the encounter, encrypting data being sent to the remote computing resource with the public encryption key, the data creator's private encryption key, and the data owner's private encryption key, decrypting the data based on public verification of the public encryption key and local verification of the data creator's private encryption key and the data owner's private encryption key at the remote computing resource, and controlling the data creator's access to the data by altering the permission of at least one of the public encryption key and data creator's private encryption key.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: January 10, 2017
    Assignee: Koninklijke Philips N.V.
    Inventor: Brian David Gross
  • Patent number: 9538375
    Abstract: Provided is a method for configuring wireless connection settings, a wireless communications apparatus, and a display method, the method being executed by the wireless communications apparatus and including: (a) receiving a first radio signal which includes second configuration information; (b) receiving authentication information for use in authenticating a first device from a second device, the authentication information being uniquely associated with the first device; (c) retaining the authentication information; (d) establishing the wireless connection with the first device, using the second configuration information; (e) transmitting a second radio signal which includes the authentication information, to the first device through the wireless connection established; (f) receiving a third radio signal which includes response information to the authentication information; and (g) transmitting the first configuration information to the first device if the response information indicates that the first device
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: January 3, 2017
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Masafumi Okubo, Hidetaka Oto, Keiichi Tanaka, Hiroo Ishikawa, Takao Adachi, Kohei Yamaguchi, Yuji Kunitake, Tomonori Nakamura
  • Patent number: 9514288
    Abstract: The present invention is to ensure information safety of a user of service using API. An information processing device issues a service code in response to an API use request. The API use request relates to service using an application program that uses API and is transmitted from an application provider device. The information processing device makes service identification information and use API information correspond to the service code and registers the service identification information, the use API information, and the service code. According to user-specific information from the application provider, unapproved license information is issued for each application user. Approval of this license information by the application user side registers the license approval information. At service execution, authentication is performed based on the service code and the license information. When the authentication is passed, API use is permitted.
    Type: Grant
    Filed: August 22, 2013
    Date of Patent: December 6, 2016
    Assignee: Rakuten, Inc.
    Inventor: Tatsuya Yoshinari
  • Patent number: 9489500
    Abstract: A remote manipulation apparatus includes a touch sensor and a manipulation control circuit to detect manipulation on a manipulation surface using a manipulator's finger. The touch sensor and the manipulation control circuit can acquire a manipulation entity distance between the manipulation surface and the finger. When the manipulation entity distance is shorter than a first threshold distance, the manipulation control circuit associates the finger manipulation with a pointer control to move a pointer on a display screen. When the distance exceeds the first threshold distance, the manipulation control circuit associates the finger manipulation with a map control to move a map on the display screen. The manipulation control circuit stores a specified finger manipulation as an authorization manipulation. The association between the finger manipulation and the map control is inhibited until the authorization manipulation using the finger is performed.
    Type: Grant
    Filed: August 21, 2013
    Date of Patent: November 8, 2016
    Assignee: DENSO CORPORATION
    Inventors: Kenichi Takenaka, Kazunori Takemura
  • Patent number: 9473647
    Abstract: Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one telephone communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one telephone communication.
    Type: Grant
    Filed: December 2, 2011
    Date of Patent: October 18, 2016
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K. Y. Jung, Jordin T. Kare, Royce A. Levien, Richard T. Lord, Robert W. Lord, Qi Lu, Mark A. Malamud, Nathan P. Myhrvold, Satya Nadella, Daniel Reed, Harry Shum, Clarence T. Tegreene, Lowell L. Wood, Jr.
  • Patent number: 9467454
    Abstract: Described are systems and methods for managing network packet traffic between a client device and an enterprise server. A list of enterprise-authorized applications is maintained. Data packets, such as TCP and UDP data packets, communicated from applications running on the device are analyzed to determine an originating application corresponding to each packet. The originating application is compared to the list of authorized applications, and a VPN tunnel is created for the packet to access the enterprise server if the corresponding originating application is an authorized application.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: October 11, 2016
    Assignee: Citrix Systems, Inc.
    Inventors: Vipin Aravindakshan, Krishna Kumar, Anand Kummur
  • Patent number: 9448859
    Abstract: Methods and devices for detecting suspicious or performance-degrading mobile device behaviors may include performing behavior monitoring and analysis operations to intelligently, dynamically, and/or adaptively determine the mobile device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the behaviors are to be observed. Such behavior monitoring and analysis operations may be performed continuously (or near continuously) in a mobile device without consuming an excessive amount of processing, memory, or energy resources of the mobile device by identifying hot application programming interfaces (APIs) and hot action patterns that are invoked or used most frequently by software applications of the mobile device and storing information regarding these hot APIs and hot action patterns separately and more efficiently.
    Type: Grant
    Filed: September 17, 2013
    Date of Patent: September 20, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Sudha Anil Kumar Gathala, Vinay Sridhara, Rajarshi Gupta