Patents Examined by Eleni Shiferaw
  • Patent number: 10291620
    Abstract: An information processing apparatus issuing qualification information that is used by a terminal apparatus in using a service includes an authenticating unit configured to receive an authentication request, which includes organization information, domain information, and account information in an on-premises environment, from the terminal apparatus, and search for a user belonging to an organization identified by the organization information from user administration information based on the account information in the on-premises environment in response to a correspondence between the organization information and the domain information inside organization administration information, which causes the organization information and the domain information to correspond; and a qualification information issuing unit configured to issue the qualification information to the searched user.
    Type: Grant
    Filed: November 16, 2016
    Date of Patent: May 14, 2019
    Assignee: Ricoh Company, Ltd.
    Inventors: Hiroki Ohzaki, Yasuharu Fukuda, Seiichi Kondo, Kohsuke Namihira, Hikaru Kominami
  • Patent number: 10282455
    Abstract: A data intake and query system measures an amount of raw data ingested by the system during defined periods of time. As used herein, ingesting raw data generally refers to receiving the raw data from one or more computing devices and processing the data for storage and searchability. Processing the data may include, for example, parsing the raw data into “events,” where each event includes a portion of the received data and is associated with a timestamp. Based on a calculated number of events generated by the system during one or more defined time periods, the system may calculate various metrics including, but not limited to, a number of events generated during a particular day, a number of events generated per day over a period of time, a maximum number of events generated in a day over a period of time, an average number of events generated per day, etc.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: May 7, 2019
    Assignee: SPLUNK INC.
    Inventors: Vijay Chauhan, Banipal Shahbaz, David Hazekamp
  • Patent number: 10284370
    Abstract: Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. In a elliptic curve group, verification that a value representative of a point R corresponds the sum of two other points uG and vG is obtained by deriving integers w,z of reduced bit length and that v=w/z. The verification equality R=uG+vQ may then be computed as ?zR+(uz mod n)G+wQ=O with z and w of reduced bit length. This is beneficial in digital signature verification where increased verification can be attained.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: May 7, 2019
    Assignee: Certicom Corp.
    Inventors: Marinus Struik, Daniel Richard L. Brown, Scott Alexander Vanstone, Robert Philip Gallant, Adrian Antipa, Robert John Lambert
  • Patent number: 10277613
    Abstract: A URL matching apparatus generates partial character string information storing therein, as keys of an associative array, partial character strings obtained by connecting stepwise in order from a character string of an upper layer of a hierarchical structure of one or more reference URLs. The URL matching apparatus generates partial character strings obtained by connecting stepwise in order from a character string of an upper layer of a hierarchical structure, also for a URL to be matched, and for each of these partial character strings of the URL to be matched, searches the partial character string information with that partial character string being a key. Thereby, even if a URL is partially changed, matching is able to be performed at high speed.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: April 30, 2019
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Mitsuaki Akiyama, Takeshi Yagi
  • Patent number: 10271208
    Abstract: The present disclosure relates to security schemes for device-to-device (hereinafter referred to as “D2D”) discovery and D2D group communication in performing proximity based service (hereinafter referred to as “prose”), prose discovery, prose communication, and D2D group communication in a mobile communication network.
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: April 23, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Kyungjoo Suh
  • Patent number: 10268838
    Abstract: The described technologies can be used for consent handling during data harvesting. In one example, a method can include receiving social media data associated with a user identifier and a first country code. A stored consent configuration rule can specify whether to store the social media data anonymously or non-anonymously. The consent configuration rule can be associated with a second country code. It can be determined whether the second country code associated with the consent configuration rule matches the first country code associated with the social media data. When the second country code associated with the consent configuration rule does not match the first country code associated with the social media data, the social media data can be stored in a quarantine.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: April 23, 2019
    Assignee: SAP SE
    Inventors: Ashwin S. Yadgiri, Ranjit Alapati
  • Patent number: 10270806
    Abstract: Various techniques for providing defense against NXDOMAIN hijacking in domain name systems are disclosed herein. In one embodiment, a method includes receiving a user input from a user to a search box in an application executing on a computing device connected to the Internet via a facility provided by an internal service provider (“ISP”) and resolving the received user input to the search box as a DNS query without using a caching server provided by the ISP. The method can then include determining whether the DNS query causes an NXDOMAIN condition and in response to determining that the DNS query causes an NXDOMAIN condition, indicating that the received user input does not have a corresponding IP address in the domain name system.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: April 23, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Mehmet Akcin
  • Patent number: 10270780
    Abstract: Techniques are described for an access management system to manage access to a service (e.g., a message management service). A client can receive a message including an electronic image from a messaging service. The electronic image can include access information for obtaining access to a message management service. Input is received that indicates interaction with the electronic image in an interface. The client can send, to the access management system, the electronic image to request access to the message management service based on the access information. Authorization is received from the access management system indicating that the account can access the message management service. The client displays an interface to provide access to the message management service. The access to the message management service can be based on the authorization.
    Type: Grant
    Filed: December 29, 2014
    Date of Patent: April 23, 2019
    Assignee: Dropbox, Inc.
    Inventors: David Barshow, Belinda Preno, George Milton Underwood, IV, Linda Eliasen, Anthony DeVincenzi
  • Patent number: 10264004
    Abstract: The method for tracking a cyber hacking is provided. The method of connection fingerprint generation and stepping-stone traceback based on NetFlow includes receiving a traceback request including IP packet attribute information of a victim and an attacker which corresponds to a target connection that is the last connection on a connection chain, generating a fingerprint for an associated connection based on the IP packet attribute information and requesting a NetFlow collector for relevant information, detecting a stepping-stone connection to the target connection which is generated at the time of generation of the fingerprint and instructing to check whether sorted candidate connections are present on the same connection chain as the target connection, and determining an order of the candidate connections based on an attacker host when the candidate connections are determined to be present on the same connection chain as the target connection.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: April 16, 2019
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Jung Tae Kim, Koo Hong Kang, Ik Kyun Kim
  • Patent number: 10262119
    Abstract: An authenticating service of a chip having an intrinsic identifier (ID) is provided. The authenticating device includes an identification (ID) engine, a self-test engine, and an intrinsic component. The intrinsic component is associated with a chip and includes an intrinsic feature. The self-test engine retrieves the intrinsic feature and communicates it to the identification engine. The identification engine receives the intrinsic feature, generates a first authentication value using the intrinsic feature, and stores the authentication value in memory. The self-test engine generates a second authentication value using an authentication challenge. The identification engine includes a compare circuitry that compares the first authentication value and the second authentication value and generates an authentication output value based on the results of the compare of the two values.
    Type: Grant
    Filed: April 17, 2017
    Date of Patent: April 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Srivatsan Chellappa, Subramanian S. Iyer, Toshiaki Kirihata, Sami Rosenblatt
  • Patent number: 10263780
    Abstract: The invention discloses a method for encrypting and/authenticating, comprising the following steps: Sending a request for a first bit combination or character combination as a first sub key (102); storing said first bit combination or character combination in the memory (104); generating a second bit combination or character combination as a second sub key (106), wherein the second bit combination or character combination is a random or pseudo random pattern; and combining said first sub key and second sub key to a key (108); further comprising at least one of the following steps: encrypting the data with the key (110); using the key as an authentication password (112); and a method of decrypting and/or authenticating, comprising the following steps: sending a request for a first bit combination or character combination as a first sub key (202); storing said first bit combination or character combination in the memory (204); repeating the following steps until a key has been verified as valid: generating o
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: April 16, 2019
    Inventor: Thomas Wolf
  • Patent number: 10263976
    Abstract: A method for excluding a participant from a group of multiple participants, in which certificates are used for an authorized communication of the participants among each other, a withdrawal request being received by one participant of the group, the withdrawal request making an identification of the participant to be excluded possible by the participant to be excluded itself, and the authorized communication being terminated by the participant when it is identifiable as the participant to be excluded based on the withdrawal request, as well as a communication system for carrying it out.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: April 16, 2019
    Assignee: ROBERT BOSCH GMBH
    Inventors: Hans Loehr, Jan Zibuschka, David Foerster
  • Patent number: 10257229
    Abstract: The disclosed computer-implemented method for verifying users based on user motion may include (1) instructing a user of a mobile device to physically move in a prescribed manner, (2) receiving information, collected by one or more sensors associated with the mobile device, describing physical movement performed by the user after the user receives the instruction, (3) determining, upon receiving the information, that the user's physical movement matches the prescribed movement, and (4) verifying the user in response to determining that the user's physical movement matches the prescribed movement. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 17, 2016
    Date of Patent: April 9, 2019
    Assignee: Symantec Corporation
    Inventors: Chengi Kuo, Petrus J. Viljoen
  • Patent number: 10257207
    Abstract: Disclosed are various embodiments relating to managed clones of applications. In one embodiment, an application is received. If it is determined that the application should be managed, a managed clone of the application is generated. The managed clone of the application is configured for coexistence along with the application upon a client device under management. The managed clone of the application may then be deployed to the client device under management.
    Type: Grant
    Filed: September 25, 2017
    Date of Patent: April 9, 2019
    Assignee: AirWatch LLC
    Inventors: Alan Dabbiere, Erich Stuntebeck, Kar Fai Tse
  • Patent number: 10255450
    Abstract: Customer content is securely loaded on a field programmable gate array (FPGA) located on a secure cryptography card. The customer content is loaded such that it may not be extracted. A customer obtains a secure cryptography card that includes a field programmable gate array and a master key generated by the secure cryptography card. The customer loads customer specific content on the field programmable gate array, wherein, based on the loading, the customer specific content is secure from extraction via the master key by at least entities other than the customer.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: April 9, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd W. Arnold, Mark A. Check, Vincenzo Condorelli
  • Patent number: 10242207
    Abstract: For preventing unwanted information disclosure in a current electronic communication from a sender to a receiver of the current electronic communication, a risk score is assigned for the current electronic communication by a computer system applying an access control model based on historical electronic communications. The model generates the risk score responsive to identities of the sender and receiver and responsive to access control level and hierarchal position of at least one of the sender and receiver. The computer system blocks transmission of the current electronic communication from the sender to the receiver responsive to whether the risk score for the sender and receiver exceeds a predetermined threshold.
    Type: Grant
    Filed: September 17, 2016
    Date of Patent: March 26, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hernan A. Cunico, Jonathan Dunne, Jeremiah O'Connor, Asima Silva
  • Patent number: 10242203
    Abstract: A computer implement format preservation based masking system and method is provided. The system obtains a first set of letters and a private key, and encrypts the first set of letters to obtain an encrypted letters list using the first set and private key. The encrypted letters list comprises a set of encrypted letters. A dynamic map is generated based on the encrypted letters, which includes one or more keys, each key being specific to a letter in the first set letters. A position of each of maskable letters in a second set of letters is calculated using the dynamic map, and performs masking of the maskable letters based on the position of each of the maskable letters to obtain masked data using the dynamic map.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: March 26, 2019
    Assignee: Tata Consultancy Services Limited
    Inventors: Nisha Ravindra Shetty, Ashim Roy, Rahul Krushna Ghodeswar, Ashvini Sakharam Mandpe
  • Patent number: 10244392
    Abstract: Embodiments of the present invention may provide the capability to personalize end devices over-the-air (OTA) without the involvement of device manufacturers, for example, in a federated large scale wireless IoT network, such as LoRaWAN. Preset with factory settings, end devices may securely connect to the network before they are finally personalized for their target service. Security sensitive personalization information may only be exchanged between device and service provider. The process may require relatively little effort by the network operator and end customers, may lower personalization costs, and may provide a security model that is attractive for a wide range of IoT applications.
    Type: Grant
    Filed: May 23, 2016
    Date of Patent: March 26, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alexandru Caracas, Frank Hoering, Marcus B. Oestreicher
  • Patent number: 10243969
    Abstract: Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address; within a time period after the determining of the first data packet, identifying a plurality of second data packets that are to be transmitted to the destination IP address; and determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: March 26, 2019
    Assignee: Alibaba Group Holding Limited
    Inventors: Yangyang Song, Lele Ma, Min Hu
  • Patent number: 10235520
    Abstract: A system and method for analyzing a patch file determine the similarity between a patch file of an application program and an existing file in terms of an operation pattern and a file type and also determine whether risky behavior is performed by the patch file, thereby detecting a file disguised as a patch file. The system for analyzing a patch file includes: a program analysis module configured to collect setup information configured in an application program and generate the collected information as reference information; a reference information database (DB) configured to store the reference information; a patch file analysis module configured to generate setup information configured in a patch file of the application program as patch information by analyzing the patch file; and a comparison module configured to search for reference information and compare the patch information with the reference information.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: March 19, 2019
    Assignee: SOFTCAMP CO., LTD.
    Inventor: Steve Bae