Patents Examined by Dereena T Cattungal
  • Patent number: 10229286
    Abstract: An online computer system including a database uses an encrypted table that allows for write protection its contents. Middleware logic operating on the system acts as an interface for access to the database, so that any business logic on the system accesses the database through simple procedural calls to the middleware rather than directly to the database itself. The middleware logic abstracts logic that helps implement write protection with the encrypted table. Data to be encrypted that has been traditionally written to other tables is migrated to the encrypted table, where the data encrypted using an authenticated encryption with additional data (AEAD) algorithm. To implement AEAD, the original table, column, and primary key indicating where the data would have otherwise been stored are together used as additional authenticated data (AAD). This tuple of information is also stored in the encrypted table.
    Type: Grant
    Filed: June 22, 2017
    Date of Patent: March 12, 2019
    Assignee: Airbnb, Inc.
    Inventors: Ismail Cem Paya, Nelson Aurel Gauthier, Kevin Nguyen
  • Patent number: 10223182
    Abstract: According to an embodiment, a communication device is connected with external devices by quantum communication channels and a classical communication channel, and generates an encryption key with photons exchanged over the quantum communication channel. The communication device includes an acquirer, a calculator, a selector, and a communicating unit. The acquirer is configured to acquire a quantum error rate for each quantum communication channel. The calculator is configured to calculate a metric of a first path to each external device based on the quantum error rate. The selector is configured to select a second path in the classical communication channel to a specific one of the external devices based on the metric. The communicating unit is configured to transmit an application key to the specific one of the external devices over the second path.
    Type: Grant
    Filed: October 16, 2015
    Date of Patent: March 5, 2019
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Ririka Takahashi
  • Patent number: 10223514
    Abstract: A method for improving unlocking speed and a mobile terminal are provided. The method is applicable to the mobile terminal in a screen-off state and includes the follows. An operation of entering an unlocking password by a user is received. Match the unlocking password entered and a preset password. A display screen of the mobile terminal is unlocked and lit up, at least after a successful match. The display screen of the mobile terminal is lit up by invoking light sensation data and color temperature data used when the display screen of the mobile terminal was lit up last time.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: March 5, 2019
    Assignee: Guangdong Oppo Mobile Telecommunications Corp., Ltd.
    Inventors: Haiping Zhang, Yibao Zhou
  • Patent number: 10216959
    Abstract: Methods and systems for transmitting user aggregate data to a third party, such that a privacy of the aggregated data is protected, while analytical usefulness of the aggregated data is preserved. The method including receiving, using a transceiver, aggregated data including time-series data collected over a period of time. Selecting, from a memory, a mapping for transforming a segment of the aggregated data of a predetermined size. Partitioning the aggregated data into a multiple data segments, each data segment is of the predetermined size. Transforming each data segment using the mapping to produce multiple transformed data segments, wherein each data segment is transformed by the mapping independently from other data segments. Finally, transmitting, using the transceiver, the multiple transformed data segments to a third party over a communication channel, wherein steps of the method are performed by a processor operatively connected with the memory and the transceiver.
    Type: Grant
    Filed: August 1, 2016
    Date of Patent: February 26, 2019
    Assignees: Mitsubishi Electric Research Laboratories, Inc, Mitsubishi Electric Corporation
    Inventors: Ye Wang, Mitsuhiro Hattori, Takato Hirano, Rina Shimizu, Nori Matsuda
  • Patent number: 10218508
    Abstract: Methods and apparatus to provide isolated execution environments are disclosed. An example apparatus includes a machine status register to determine whether excess micro operations are available during an instruction cycle to execute a pico-application in response to a request for computing provided by a host application. The pico-application is a fragment of microcode. The microcode comprises a plurality of micro operations. The machine status register is also to determine whether space is available in a memory to load the pico-application. The example apparatus also includes a loader to load a virtual machine and the pico-application into the memory in response to the excess micro operations and the space in the memory being available. The virtual machine validates the pico-application and loads the pico-application into the memory. The example apparatus also includes a processor to execute the pico-application via the excess micro operations.
    Type: Grant
    Filed: March 9, 2018
    Date of Patent: February 26, 2019
    Assignee: INTEL CORPORATION
    Inventors: Vincent J. Zimmer, Rajesh Poornachandran, Mingqiu Sun, Gopinatth Selvaraje
  • Patent number: 10201967
    Abstract: The present invention relates to a system and method of securing a printer. The system includes a printer, having a nontransitory storage medium, configured to: store a password encrypted with a first encryption scheme; re-encrypt the stored password with a second encryption scheme upon a predetermined interval/event; receive a data stream from a host computer; determine whether the received data stream contains the password encrypted with the second encryption scheme; and print a document upon determining that the data stream contains the password encrypted with the second encryption scheme.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: February 12, 2019
    Assignee: CTPG OPERATING, LLC
    Inventors: Robert Delaney, Kyle Turner
  • Patent number: 10193889
    Abstract: In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to cause the processing circuit to collect all data socket descriptor databases from individual servers operating in a data center, each data socket descriptor database storing attributes of a base socket and one or more data socket descriptors used by an application or application instance operating on an individual server. The logic is also configured to cause the processing circuit to store data from the data socket descriptor databases for all applications and application instances operating in the data center in a central data socket descriptor database, the central data socket descriptor database being configured to store attributes of all data socket descriptors used by all applications or application instances operating in the data center.
    Type: Grant
    Filed: June 14, 2016
    Date of Patent: January 29, 2019
    Assignee: Avocado Systems Inc.
    Inventor: Keshav Govind Kamble
  • Patent number: 10187379
    Abstract: Unauthorized installation of software is prevented even at a production site at which software cannot be installed through a communication line. The memory card stores: additional software including a software ID; a recording medium ID; and encrypted information generated by encrypting the software ID, using the recording medium ID as a key. The controller performs the steps of: obtaining the encrypted information from the memory card; obtaining the recording medium ID from the memory card; obtaining the software ID by decrypting the encrypted information, using the recording medium ID as a key; obtaining the software ID from the additional software, comparing the decrypted software ID and the software ID obtained from the additional software; and storing the additional software in the storage when the comparison is successful.
    Type: Grant
    Filed: January 15, 2015
    Date of Patent: January 22, 2019
    Assignee: OMRON Corporation
    Inventors: Shinsuke Kawanoue, Takehiko Hioka, Yutaka Abe
  • Patent number: 10185830
    Abstract: A method, a computer program product, a system for analyzing data in a converged infrastructure system, comprising capturing metadata associated with a network path via a port on a network switch enabled to collect metadata; capturing content data associated with the metadata via the port on the network switch enabled to collect metadata; and performing data analytics on the metadata and the content data.
    Type: Grant
    Filed: December 31, 2014
    Date of Patent: January 22, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Xiaohong Qin, Kenneth Durazzo, Suresh B. Kumar, Nalinkumar N. Mistry
  • Patent number: 10164971
    Abstract: Techniques are disclosed for enabling a user to validate the authenticity of a computing system (e.g., an access management system) such as one which controls access to one or more resources. A user can determine the authenticity of an access management system before the user provides credential information to the access management system. A user can be presented at a client system with an interface to request authentication of an access management system. The access management system may provide the user at the client system with temporary access information to submit back to the access management system. The access management system may provide recent personal information to the user at the client system to verify the access management system. Upon verification of the personal information, the access management system may prompt the user for credential information to establish a session.
    Type: Grant
    Filed: October 22, 2015
    Date of Patent: December 25, 2018
    Assignee: Oracle International Corporation
    Inventors: Stephen Mathew, Ramya Subramanya, Vipin Anaparakkal Koottayi
  • Patent number: 10164992
    Abstract: Systems and arrangements for performing a textual analysis to identify incidents likely to cause a significant business impact are provided. Historical data related to previously occurring incidents may be analyzed to determine a magnitude of impact of the incident. The magnitude may be compared to a predetermined threshold and, if above the threshold, the incident may be flagged as having a significant business impact. If the magnitude is below the threshold, the incident may be flagged as not having a significant business impact. The incidents in each group may then be analyzed to identify keywords, combinations, and/or sequences having a strong correlation to incidents having a significant business impact and incidents not having a significant business impact, which may form inclusion and exclusion criteria. Data from newly received incidents may be compared to the inclusion and exclusion criteria to determine whether the incident is likely to have a significant business impact.
    Type: Grant
    Filed: January 13, 2017
    Date of Patent: December 25, 2018
    Assignee: Bank of America Corporation
    Inventors: Charles C. Howie, DeAundra K. Glover, Jesse Price, Aaron Kephart
  • Patent number: 10165445
    Abstract: Systems and methods for transmitting AT commands indicating whether Evolved Packet System (EPS) Session Management (ESM) information should be transmitted securely are disclosed herein. A Terminal Equipment (TE) may transmit an AT command to a Mobile Termination (MT). The AT command may indicate whether protocol configuration options (PCO) should be ciphered and/or whether an access point name (APN) is provided. In some embodiments, the AT command may be a dedicated command and may only include a <securePCO> parameter and an <APNprovided> parameter. Alternatively, or in addition, the AT command may include a <securePCO> parameter, an <APN> parameter, and/or additional parameters serving additional functions. Whether the APN is provided may be determined based on whether the <APN> parameter is present and includes a non-null value. The AT command may be related to a single packet data network (PDN) connection or may relate to a plurality of PDN connections.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: December 25, 2018
    Assignee: INTEL IP CORPORATION
    Inventors: Kiran Kumar Addepalli, Robert Zaus, Vivek Gupta
  • Patent number: 10157269
    Abstract: A verification system, includes: an arithmetic/logic unit (“ALU”) to perform one or more mathematical operations and compare selected variables; a register to hold a value from a comparison of selected variables performed by the ALU; an instruction decoder to provide read and write commands to memory; an address bus to provide an address to memory for a read or write operation; and a data bus to provide or access data for a write or read operation to or from memory, wherein the ALU generates and provides a recipient identifier to a target computational device, the recipient identifier being related to an identity of the target computational device and/or a target device human operator, and write the recipient identifier to memory in response to a write command issued by the instruction decoder and, as a part of a transaction, the ALU receives, from a user computational device of a first user, the recipient identifier and a credential of the first user and/or user computational device, compares each of the rec
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: December 18, 2018
    Inventor: John K. Thomas
  • Patent number: 10129026
    Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q?1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd?48.
    Type: Grant
    Filed: May 3, 2016
    Date of Patent: November 13, 2018
    Assignee: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Patent number: 10129219
    Abstract: Methods and systems for securing data are provided. For example, one method includes providing context information for an input/output (I/O) operation to a security module by an adapter communicating with a computing device and a storage device via a network; storing encryption parameters associated to a security association handle by the security module; using a workflow handle by the security module to obtain the security association handle for retrieving stored encryption parameters for encrypting payload transmitted by the adapter and for decrypting payload received by the adapter; predicting a first frame header for encrypting the payload transmitted by the adapter and a second frame header for decrypting payload received by the adapter; providing the encrypted payload for transmission to the adapter by the security module, after discarding the first predicted header; and providing the decrypted payload to the computing device by the security module, after discarding the second predicted header.
    Type: Grant
    Filed: May 31, 2016
    Date of Patent: November 13, 2018
    Assignee: Cavium, LLC
    Inventors: Somnath Paul, Bruce A. Klemin, Muralidhar Jammula
  • Patent number: 10114945
    Abstract: Methods and systems for preventing clock rollback attacks are described herein. A rollback attack may occur when a user manually sets a system clock to a date/time earlier than the actual present day date and time, thereby tricking any software relying on the system clock to believe it is in fact the earlier date and time rather than the current date and time. According to aspects described herein, a particular application may check and store a record of the system time when an application goes inactive (or at intervals) and again when the application subsequently is activated again. When the application determines that the time has gone backward, the application (or system) may take some remedial measure(s) to prevent further use of the application (or system) until the user reestablishes trust (e.g., by reauthenticating or reestablishing a connection with a trusted time server).
    Type: Grant
    Filed: May 1, 2015
    Date of Patent: October 30, 2018
    Assignee: Citrix Systems, Inc.
    Inventors: Gary Barton, Brandon Olekas
  • Patent number: 10103877
    Abstract: A processing system includes a memory and a processing logic operatively coupled to the memory. The processing logic identifies one or more constant bits of an output bit sequence. The processing logic generates a plurality of variable bits of the output bit sequence. The processing logic produces the output bit sequence including the identified constant bits and the generated plurality of variable bits.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: October 16, 2018
    Assignee: Intel Corporation
    Inventors: Sudhir K. Satpathy, Sanu K. Mathew, Kirk S. Yap, Vinodh Gopal
  • Patent number: 10091244
    Abstract: A method of providing security for data using a loopback interface, the method includes setting a security policy on a host device and a client device, the security policy configuration including a first loopback interface and an IP address for the host device and a second loopback interface and an IP address for the client device; sending an IP packet to the first loopback interface on the host device, wherein the first loopback interface configures the packet to be routed to the second loopback interface; sending the IP packet from the first loopback interface to a security module on the host device for encryption pursuant to a security protocol; filtering the encrypted packet received from first loopback interface and configuring the encrypted packet be sent to the client device; and sending the encrypted packet from the host device to the client device.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: October 2, 2018
    Assignee: Konica Minolta Laboratory U.S.A., Inc.
    Inventor: Maria Perez
  • Patent number: 10084820
    Abstract: A method of providing security for data being transferred over a Universal Serial Bus (USB) connection, the method comprising: setting an IPsec policy configuration on a host device hand a client device; sending a packet to a first loopback interface on the host device, wherein the first loopback interface configures the packet to be routed to a second loopback interface on the client device; sending the packet from the first loopback interface to an IPsec module for encryption; filtering the packet received from first loopback interface; sending the packet to the client device over the USB connection; injecting the packet into the second loopback interface; sending the packet from the second loopback interface on the client device to the IPsec module on the client device for decryption; and sending the decrypted packet to the second loopback interface on the device application, wherein the packet is received on the client device.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: September 25, 2018
    Assignee: Konica Minolta Laboratory U.S.A., Inc.
    Inventor: Maria Perez
  • Patent number: 10079833
    Abstract: A digital rights management (DRM) method for protecting digital documents, implemented in a DRM system. When an operator (document publisher) scans a document on a scanner to generates a digital document and specifies a list of users who will be granted access rights to the document, the DRM system applies digital rights protection to the document according to the specified access rights, and distributes the document to the specified users; the system also sends a confirmation notification such as an email to the document publisher, which contains a list of the receiving users, a copy of the protected digital document, and a link to a web-based tool that will allow the publisher to modify the access rights granted to the users. In addition, when applying digital rights protection, the DRM system specifies the publisher as a user who will have access rights to the document.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: September 18, 2018
    Assignee: KONICA MINOLTA LABORATORY U.S.A., INC.
    Inventors: Rabindra Pathak, Kyohei Shiraishi