Patents Examined by Devin Almeida
  • Patent number: 9935943
    Abstract: A non-transitory computer-readable storage medium stores instructions for execution by a first client device, including instructions for transmitting an indication of availability of a first media presentation system and for transmitting to a second device a first authentication token for allowing the second device to access the first media presentation system, in response to a request from the second client device. The instructions also include instructions for requesting access to a second media presentation system that a third client device has indicated as being available and for sending to a server system a media control request directed to the second media presentation system. The media control request includes a second authentication token received from the third client device to allow the first client device to access the second media presentation system.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: April 3, 2018
    Assignee: SPOTIFY AB
    Inventors: Oskar Werkelin Ahlin, Karl Sigfrids, Per Eckerdal, Richard Titmuss, Evan Shrubsole, Jamie Kirkpatrick
  • Patent number: 9888030
    Abstract: A computer system for distinguishing user-initiated network traffic from malware-initiated network traffic comprising at least one central processing unit (CPU) and a memory communicatively coupled to the CPU. The memory includes a program code executable by the CPU to monitor individual network events to determine for an individual network event whether the event has a legitimate root-trigger. Malware-initiated traffic is identified as an individual network event that does not have a legitimate root-trigger.
    Type: Grant
    Filed: May 1, 2014
    Date of Patent: February 6, 2018
    Assignee: Virginia Tech Intellectual Properties, Inc.
    Inventors: Danfeng Yao, Hao Zhang
  • Patent number: 9882922
    Abstract: Methods and systems for detecting an electronic intrusion are described. A user activity may be identified for a user account. A location of a user corresponding to the user account may be determined. It may be identified, based in part on the location of the user, whether to communicate a request to the user for instructions to respond to the user activity. A response may be received from the user in response to determining to communicate the request to the user for instructions. The response may include instructions to block access to the user account at a server. Command information may be communicated to the server. The command information may include a command to block access to the user account.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: January 30, 2018
    Assignee: eBay Inc.
    Inventor: Srinivasan Raman
  • Patent number: 9858435
    Abstract: A method of destroying file contents of a file includes storing the file in a predefined file format; integrating an algorithm that destroys file contents and has predefined trigger criteria into the file; checking the predefined trigger criteria when the file is opened; destroying file contents if at least one predefined trigger criterion is satisfied; and modifying the integrated algorithm if the predefined trigger criteria are not satisfied, wherein a first part of the algorithm is integrated into a first part of the file called by an executing program or an executing operating system when the file is opened, and modifying of the integrated algorithm includes modifying the storage structure of the algorithm so that it occurs in changed form after the opening of the file and cannot be recognized as before.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: January 2, 2018
    Assignee: Fujitsu Technology Solutions Intellectual Property GmbH
    Inventor: Thorsten Höhnke
  • Patent number: 9813903
    Abstract: The present invention relates to a communication system comprising a first node and second node adapted for communicating in a network, wherein the first node comprises a first list of keying materials including a plurality of keying materials, wherein the second node comprises a second list of keying materials including a plurality of keying materials, wherein the first node further comprises a receiver for receiving from the second node a second node identifier, a controller being arranged for determining from the second node identifier the position in the first list of at least one keying material having a common root with one keying material of the second list, and for generating an encryption key by means of the keying material having a common root and the second node identifier.
    Type: Grant
    Filed: September 8, 2009
    Date of Patent: November 7, 2017
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Martijn Maas, Oscar Garcia Morchon
  • Patent number: 9800579
    Abstract: A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.
    Type: Grant
    Filed: February 12, 2015
    Date of Patent: October 24, 2017
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Guanqun Bao, Manish Sharma, Devin Blong, Kevin Flores, Tushar Chaudhary, Gaurav Gupta
  • Patent number: 9792460
    Abstract: A method and apparatus for processing biometric information in an electronic device including a processor that operates at a normal mode or at a secure mode, the method comprising, detecting a biometric input event from a biometric sensor module at normal mode, creating biometric data based on sensed data from the biometric sensor module at the secure mode, performing biometric registration or biometric authentication based on the created biometric data at the secure mode, and providing result information of biometric registration or biometric authentication at the normal mode.
    Type: Grant
    Filed: February 11, 2015
    Date of Patent: October 17, 2017
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Teain An, Taeho Kim, Hyungjoon Kim, Seulhan Park, Jonghoon Park, Heejun You, Yangsoo Lee, Moonsu Chang, Jinho Hyeon
  • Patent number: 9794272
    Abstract: A method and apparatus for monitoring data traffic in a communication network are provided. A router connected to the communication network monitors information contained in the data traffic, and based on the information determines whether data in the traffic is indicative of a malicious threat to one or more resources connected to the network. Parameters which control monitoring of traffic at the router, such as the sampling rate and what information is to be extracted from the data is varied according to the condition of the network so that the monitoring can be adapted to focus on traffic which relates to a particular suspected or detected threat.
    Type: Grant
    Filed: January 3, 2006
    Date of Patent: October 17, 2017
    Assignee: Alcatel Lucent
    Inventors: Lyle Strub, Adrian Grah, Bashar Said Bou-Diab
  • Patent number: 9787640
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting suspicious user activities. One of the methods includes generating hypergraphs, wherein the hypergraphs include nodes corresponding to feature profiles and edges between particular nodes representing a measure of similarity between nodes; using the generated hypergraphs to detect suspicious graph nodes; and using the suspicious graph nodes to detect malicious user communities.
    Type: Grant
    Filed: February 11, 2015
    Date of Patent: October 10, 2017
    Assignee: DataVisor Inc.
    Inventors: Yinglian Xie, Fang Yu
  • Patent number: 9774608
    Abstract: A device control method used in a device control system in which an operation terminal is used to remotely operate a device with a server device mediating between the operation terminal and the device, the device control method including: acquiring, upon reception of an operation instruction for operation of the device from the operation terminal, environment information pertaining to at least one of the device and the operation terminal; performing a determination of whether or not to cause execution of processing corresponding to the operation instruction based on whether or not the environment information satisfies a predetermined condition; and causing the device to execute an execution command for execution of the processing when a result of the determination is affirmative, and not causing the device to execute the execution command when the result of the determination is negative.
    Type: Grant
    Filed: August 1, 2013
    Date of Patent: September 26, 2017
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventors: Toshihisa Nakano, Masayuki Kozuka, Masataka Minami, Motoji Ohmori, Takeshi Matsuo, Tsuyoshi Sakata, Fumiaki Suzuki
  • Patent number: 9767295
    Abstract: At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol.
    Type: Grant
    Filed: November 14, 2015
    Date of Patent: September 19, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Patent number: 9767293
    Abstract: At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol.
    Type: Grant
    Filed: February 13, 2015
    Date of Patent: September 19, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Patent number: 9762551
    Abstract: A cryptographic expansion device that can be attached to a communication component of a communication device to enable the communication device to perform cryptographic operations on communications sent to and from the communication device is described. The cryptographic expansion device can be a small-form factor cryptographic expansion device that can be used with a small-form factor communication component such as a micro-SIM (subscriber identity module) card. When used with a communication device, the cryptographic expansion device enables the communication device to send and received end-to-end secure encrypted communications. The end-to-end secure communications enabled by the cryptographic expansion device can be utilized by a user of the communication device to perform financial and/or banking transactions.
    Type: Grant
    Filed: July 21, 2016
    Date of Patent: September 12, 2017
    Assignee: Visa International Service Association
    Inventors: Horatio Nelson Huxham, Alan Joseph O'Regan
  • Patent number: 9749298
    Abstract: A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter value that is incremented independently by each of the transmitter and the receiver. Attempts are made to decrypt the data of a received packet multiple times using different, respective counter values, to produce multiple respective decrypted outputs. A decrypted output in which the data has been decrypted correctly is identified, the counter value is corrected, and the data of the received packet is recovered from the identified decrypted output.
    Type: Grant
    Filed: January 14, 2015
    Date of Patent: August 29, 2017
    Assignee: MARVELL WORLD TRADE LTD.
    Inventors: Danny Alexander, Amit Wix
  • Patent number: 9736847
    Abstract: It is provided a method, comprising assigning a first direct resource of a radio interface to a first vehicle-to-vehicle service based on a resource information received from a base station in a cellular mode via a cellular resource of the radio interface, wherein, in the resource information, the first direct resource and the first vehicle-to-vehicle service are indicated as being correlated, and the first vehicle-to-vehicle service is to be used or to be provided by at least a first one of one or more vehicle devices, and wherein, in the cellular mode, a communication of an apparatus performing the method with each of the one or more vehicle devices different from the apparatus is performed via the base station; performing the first vehicle-to-vehicle service via the first direct resource in a vehicle-to-vehicle mode, wherein, in the vehicle-to-vehicle mode, the communication of the apparatus with each of the one or more vehicle devices is performed directly with the respective vehicle device and does not i
    Type: Grant
    Filed: July 20, 2012
    Date of Patent: August 15, 2017
    Assignee: Avago Technologies General IP (Singapore) Pte. Ltd.
    Inventors: Xianjun Feng, Haifeng Wang, Zhenhong Li, Wei Zou, Kenan Xu
  • Patent number: 9729599
    Abstract: An example implementation may involve a computing system receiving a request from a first media playback system for access to a queue of media items, and a request from a second media playback system for access to the queue of media items. The computing system may grant a first type of access to the first media playback system and a second type of access to the second media playback system. The first type of access and the second type of access may authorize a first set of operations and a second set of operations on the queue of media items, respectively. The computing system may provide an indication that the first media playback system may access the queue as authorized by the first type of access, and an indication that the second media playback system may access the queue as authorized by the second type of access.
    Type: Grant
    Filed: February 6, 2015
    Date of Patent: August 8, 2017
    Assignee: Sonos, Inc.
    Inventors: Steven Beckhardt, Andrew J. Schulert, Gregory Ramsperger
  • Patent number: 9727744
    Abstract: Methods and systems are provided for decentralizing user data access rights control activities in networked organizations having diverse access control models and file server protocols. A folder management application enables end users of the file system to make requests for access to storage elements, either individually, or by becoming members of a user group having group access privileges. Responsibility for dealing with such requests is distributed to respective group owners and data owners, who may delegate responsibility to authorizers. The application may also consider automatically generated proposals for changes to access privileges. An automatic system continually monitors and analyzes access behavior by users who have been pre-classified into groups having common data access privileges. As the organizational structure changes, these groups are adaptively changed both in composition and in data access rights.
    Type: Grant
    Filed: August 4, 2016
    Date of Patent: August 8, 2017
    Assignee: VARONIS SYSTEMS, INC.
    Inventors: Yakov Faitelson, Ohad Korkus
  • Patent number: 9698975
    Abstract: There is provided a method and apparatus for resetting a password for a device or managing the device, the device having an encryption perimeter. A device shares a public/private key pair with a server, the public key being on the device and the private key being on the server. An intermediate value is encrypted on the mobile device using the public key. If the password is lost or the device needs to be managed, the server can request the encrypted intermediate value, decrypt it, and send the decrypted value to the mobile device which may then resume operations. A new password may be provided by the server or the user may set a new password once the encryption key is recreated from the decrypted intermediate value.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: July 4, 2017
    Assignees: BlackBerry Limited, 2236008 Ontario Inc.
    Inventors: Sivakumar Nagarajan, Srdan Dikic, Mark A. McConnaughay, Christopher Lyle Bender, Marius Bozsitz
  • Patent number: 9660961
    Abstract: In particular embodiments, a method includes receiving a request for a signature verification. In response to the request, signature data is encrypted. A first data size associated with the signature data is determined. A second data size associated with data of a data packet is determined. The method includes comparing the sum of the first data size and the second data size to a pre-determined data size. When the sum is less than or equal to the pre-determined data size, the encrypted signature data is included in the data packet; and the data packet is transmitted over a network.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: May 23, 2017
    Assignee: Dell Products L.P.
    Inventors: Raghunandan Hanumantharayappa, Khader Basha P.R., SAnthosh Krishnamurthy
  • Patent number: 9659157
    Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
    Type: Grant
    Filed: May 2, 2016
    Date of Patent: May 23, 2017
    Assignee: Intertrust Technologies Corporation
    Inventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki