Patents Examined by Eleni Shiferaw
  • Patent number: 9875362
    Abstract: For enabling improvement in throughput for generating a hash value, a hash value generation apparatus comprises: a ? operation unit configured to execute a ? operation included in a round process of a SHA-3 algorithm; a ? operation unit configured to execute a ? operation included in the round process; a ? operation unit configured to execute a ? operation included in the round process; a ? operation unit configured to execute a ? operation included in the round process; and an ? operation unit configured to execute an ? operation included in the round process, wherein the ? operation unit receives data for each sheet structure, and starts to execute the ? operation upon receiving data of three sheet structures.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: January 23, 2018
    Assignee: Canon Kabushiki Kaisha
    Inventor: Shinya Yamada
  • Patent number: 9860747
    Abstract: A system and method synchronizes network data for a device registered to a user. The network data includes a list of a plurality of known wireless networks and authentication data associated with each of the known wireless networks. The method includes establishing a connection to a server of a synchronization network. The method includes transmitting identification data to the server. The identification data indicates the network data corresponding to the user to which the device is registered. The method includes receiving the list of known wireless networks from the server via the synchronization network. The method includes receiving a secure file including the authentication data from the server via the synchronization network.
    Type: Grant
    Filed: June 7, 2013
    Date of Patent: January 2, 2018
    Assignee: APPLE INC.
    Inventors: Vinesh Pallen, Kapil Chhabra, Artiom Shamis, Tito Thomas
  • Patent number: 9853928
    Abstract: Disclosed are various examples for providing secure access to email resources. Email resources associated with client devices may be identified, and resource rules associated with the email resources may be identified. A determination of whether the email resources satisfy the resource rules may be made.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: December 26, 2017
    Assignee: AirWatch LLC
    Inventors: Alan Dabbiere, Erich Stuntebeck, Jonathan Blake Brannon
  • Patent number: 9852294
    Abstract: The disclosed computer-implemented method for detecting suspicious applications based on how entry-point functions are triggered may include (1) identifying an application that is capable of accessing a data-access Application Programming Interface (API) programmed to provide access to sensitive information located on a computing system and/or a data-transfer API programmed to send information outside of the computing system, (2) identifying an entry-point function of the application whose execution results in a call to the data-access API and/or the data-transfer API, (3) determining how the entry-point function is triggered, (4) determining whether the application is suspicious based on how the entry-point function is triggered, and (5) performing a security action based on whether the application is suspicious. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: December 26, 2017
    Assignee: Symantec Corporation
    Inventor: Xiaole Zhu
  • Patent number: 9853964
    Abstract: A method of authenticating the legitimacy of a request for a resource from a resource provider by a user, including providing an authentication process in which a resource provider message is received and de-assembled, the integrity of the user request message is confirmed, a result indicator as to the legitimacy of the resource provider message is created by performing two or more authenticity checks, and an authentication result is sent.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: December 26, 2017
    Assignee: Robojar Pty Ltd
    Inventor: Jacques Noel Marc Chester
  • Patent number: 9838363
    Abstract: A method comprising generating an updated security key upon expiration of a key exchange timer, transferring the updated security key to a Coaxial Network Unit (CNU), retaining an original key, wherein the updated security key comprises a different key identification number than the original key, accepting and decrypting upstream traffic that employs either the original key or the updated key, after transferring the updated security key to the CNU, creating a key switchover timer, before the key switchover timer expires, verify that upstream traffic transferred from the CNU on a logical link uses the updated security key, and when upstream traffic is encrypted using the updated security key, begin using the updated security key to encrypt downstream traffic and clear the key switchover timer.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: December 5, 2017
    Assignee: Futurewei Technologies, Inc.
    Inventors: Yanbin Sun, Guangsheng Wu, Li Zhang, Jim Chen
  • Patent number: 9830440
    Abstract: A computer-implemented biometric identity verification method including the steps of storing a database of registered users, including data identifying profile attributes of each registered user and a respective plurality of stored biometric signatures, each stored biometric signature associated with a corresponding one or more of the profile attributes. A predicted biometric signature is derived for a requesting user when it is determined that a period of time has elapsed since the requesting user's stored biometric signature was last updated, by adapting the stored biometric signature based on biometric variances derived from a biometric peer group of registered users with at least one profile attribute in common with the requesting user. The predicted biometric signature is used to verify the identity of the requesting user.
    Type: Grant
    Filed: September 26, 2013
    Date of Patent: November 28, 2017
    Assignee: Barclays Bank PLC
    Inventor: Lee Randall
  • Patent number: 9813449
    Abstract: A Distributed Security Information and Event Management System (DSIEMS) is a scalable, intelligent, security and fraud management platform that proactively collects information from a network's computer systems, applications, users, and external intelligence data feeds, and aggregates the information into a centralized repository where the information can then be analyzed and quickly acted upon when necessary. Further, according to one aspect, a DSIEMS analyzes aggregated information to discern patterns of potential attack, inappropriate data movement, and fraud from normal and legitimate network activity, account activity, user activity, and data access. According to one embodiment, aspects of the present disclosure are implemented in a distributed architecture. In particular, aspects of the present DSIEMS utilize an agent-based architecture in which intelligent software agents are deployed on each node (e.g., endpoint computing device) within the system.
    Type: Grant
    Filed: August 12, 2013
    Date of Patent: November 7, 2017
    Assignee: Lookwise S.L.
    Inventors: Igor Unanue Buenechea, Victor Jurado Martinez
  • Patent number: 9811547
    Abstract: The invention relates to a client computer for updating a database stored on a server via a network, the server being coupled to the client computer via the network, wherein the database comprises first data items and suffix items, wherein each suffix item describes a suffix of at least one first data item of the first data items, wherein for each suffix item a first referential connection exists in the database assigning said suffix item to the at least one first data item comprising the suffix of said suffix item, wherein each suffix item is encrypted with a suffix cryptographic key in the database, wherein each first data item is encrypted with a first cryptographic key in the database, wherein the client computer has installed thereon an application program, the application program being operational to: receiving a search request, the search request specifying a postfix search on a search criterion, determining the suffix item matching the search criterion, providing to the database a request for provi
    Type: Grant
    Filed: June 1, 2016
    Date of Patent: November 7, 2017
    Assignee: COMPUGROUP MEDICAL SE
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Patent number: 9807059
    Abstract: A telecommunication device for real-time communication at a border between a global transport network and a private domain of a communication network may include a proxy for a communication protocol, means for traffic using real-time communication protocols to traverse a firewall, means for real-time traffic initiated by the communication protocol to traverse a firewall, means for measuring and collecting value information about the real-time traffic over the global transport network, means for creating mutual trust between the telecommunication device and a second device with which it communicates; and means for authorizing usage of a feature for a mutually trusted communication participant.
    Type: Grant
    Filed: January 17, 2013
    Date of Patent: October 31, 2017
    Assignee: IPALIVE AB.
    Inventor: Karl Erik Ståhl
  • Patent number: 9805172
    Abstract: Generic rights expression language allowing interoperability across different computing environments including resource usage of different applications. A formal framework for usage management provides scaffolding upon which interoperable usage management systems can be built. Certain features of the framework are standardized, such as the operational semantics, including areas free of standards that necessitate choice and innovation to achieve a balance of flexibility and usability for interoperability in usage management systems.
    Type: Grant
    Filed: November 17, 2010
    Date of Patent: October 31, 2017
    Assignee: STC.UNM
    Inventors: Gregory L. Heileman, Pramod A. Jamkhedkar, Christopher C. Lamb
  • Patent number: 9807062
    Abstract: A method and apparatus for enabling a cloud server to provide screen information data indicating a screen to be displayed on a client device are provided. The method of enabling a cloud server to provide screen information data relating to a screen to be displayed on a client device includes: generating the screen information data; determining whether or not to protect the generated screen information data based on characteristics of an object configuring the screen; encrypting the provided screen information data based on the determining; and transmitting the encrypted the screen information data to the client device.
    Type: Grant
    Filed: September 26, 2013
    Date of Patent: October 31, 2017
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Sung-bum Park, Yong-je Kim, Myung-jin Eom, Dae-Sung Cho, Woong-il Choi
  • Patent number: 9800681
    Abstract: A network traffic monitoring system for redirecting network traffic between a client device and a cloud service includes a monitor proxy server configured as a network intermediary between the client device and the cloud service; and a published identity provider. The published identity provider is configured to receive a login request from a client device and to authenticate the client device at a federated identity provider. The published identity provider is configured to receive from the federated identity provider a redirect response including an identity assertion and a redirect web address to the cloud service. The published identity provider is configured to rewrite the redirect web address to the web address of the monitor proxy server. As a result, network traffic between the cloud service and the client device is routed through the monitor proxy server after user authentication using the published identity provider.
    Type: Grant
    Filed: August 12, 2015
    Date of Patent: October 24, 2017
    Assignee: Skyhigh Networks, Inc.
    Inventors: Sekhar Sarukkai, Kaushik Narayan, Rajiv Gupta
  • Patent number: 9787682
    Abstract: In a method for securely connecting a controller for a machine or plant to a higher-level IT system, an integration layer is provided between the controller and the IT system, a controller image of the controller is generated in the integration layer, and the controller image is accessed from the IT system. The IT system thus always accesses the controller image rather than directly the controller. This prevents malware from gaining access to the controller e.g. via a network.
    Type: Grant
    Filed: September 26, 2013
    Date of Patent: October 10, 2017
    Assignee: Siemens Aktiengesellschaft
    Inventors: Johannes Birzer, Rainer Ordenewitz
  • Patent number: 9785790
    Abstract: Protecting a computer security application by executing the computer security application on a computer in a first namespace associated with an operating system of the computer, and creating a second namespace associated with the operating system of the computer, where the second namespace is accessible to the computer security application, and where the first namespace is inaccessible from the second namespace.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: October 10, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shmuel Regev, Shahar Kohanim, Shai Barlev
  • Patent number: 9787704
    Abstract: Systems and methods may include receiving first data of components, which may represent performance characteristics of the components at a first time. The systems and methods may include performing a first cluster analysis of the first data to identify clusters of the components with similar characteristics. The systems and methods may include receiving second data of the components, which may represent performance characteristics of the components at a second time. The systems and methods may include performing a second cluster analysis of the second data to identify clusters of the components with similar characteristics. The systems and methods may include determining whether a component transitioned from a cluster identified in the first cluster analysis to a different cluster identified in the second cluster analysis. The systems and methods may include determining that an anomaly occurred in response to determining that the component transitioned from the cluster to the different cluster.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: October 10, 2017
    Assignee: CA, Inc.
    Inventors: Debra J. Danielson, Steven L. Greenspan, James D. Reno, Prashant Parikh
  • Patent number: 9780946
    Abstract: A method in an elliptic curve cryptographic system, the method being executed by an electronic device and including a multiplication operation of multiplying a point of an elliptic curve by a scalar number, the point having affine coordinates belonging to a Galois field, the multiplication operation including steps of detecting the appearance of a point at infinity during intermediate calculations of the multiplication operation, and of activating an error signal if the point at infinity is detected and if the number of bits of the scalar number processed by the multiplication operation is lower than the rank of the most significant bit of an order of a base point of the cryptographic system.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: October 3, 2017
    Assignee: Inside Secure
    Inventor: Vincent Dupaquis
  • Patent number: 9773125
    Abstract: A tokenization system includes a vector table and one or more token tables. The tokenization system accesses sensitive data and a vector from a vector table column, and modifies the sensitive data based on the accessed vector. The tokenization system then queries the one or more token tables using a portion of the modified data to identify a token mapped to the portion of the modified data. The portion of the modified data is replaced with the token to create tokenized data. The vector table can be updated by replacing a vector table column with an updated vector table column. The tokenization system can modify subsequent data using the updated vector column prior to tokenization.
    Type: Grant
    Filed: December 3, 2015
    Date of Patent: September 26, 2017
    Assignee: Protegrity Corporation
    Inventors: Ulf Mattsson, Yigal Rozenberg, Vichai Levy
  • Patent number: 9769167
    Abstract: A method includes authenticating a user of a client device and sending a response to the client device. The response includes browser code configured to retrieve respective first values for a plurality of device properties from the client device. The method also includes storing session information for the user in a memory. The session information includes the first values and criteria for triggering validation of the client device. The method further includes receiving a request, sent from a requesting device, to access a protected resource and determining whether the request is authenticated by determining that the request is associated with the session information and determining that the criteria has been met. Determining whether the request is authenticated also includes retrieving respective second values for the plurality of device properties from the requesting device, and determining whether the second values match the first values to authenticate the request.
    Type: Grant
    Filed: June 18, 2014
    Date of Patent: September 19, 2017
    Assignee: CA, Inc.
    Inventors: David Arthur Mary, Herbert Paul Mehlhorn, Thomas E. Hamilton, III, Ganesh Gudaru, Rohit Ganda, Chavvakula Ravikanth
  • Patent number: 9768959
    Abstract: Static security credentials are replaced by pseudonyms and session-specific passwords to increase security associated with user login attempts, and specifically to defeat keylogging attacks. For each login event, the system generates unique, session-specific credentials by randomly replacing characters within a given username and password. The random character generation ensures that system login attempts use different combinations of characters, thereby producing a new username and password for every user session. The client side of the system requires only the capability to display an image file, with specialized software/hardware limited to the server side, thereby facilitating the use of the system by a wide range of client devices.
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: September 19, 2017
    Assignee: Acxiom Corporation
    Inventors: Gon Yi, William C. Smith, Connie Marie Ardwin