Patents Examined by Ellen Tran
  • Patent number: 10397784
    Abstract: Some embodiments relate to a method of authorizing the establishment of a peer-to-peer stream between two user terminals of a mobile telecommunications network. The method is implemented in a platform of the mobile telecommunications network and comprises receiving, from a server of a peer-to-peer service provider, a request to establish a peer-to-peer stream between a first user terminal and a second user terminal, the establishment request including a stream identifier, the stream identifier including at least an identifier of the first user terminal and an identifier of the second user terminal. The method also comprises deciding whether to authorize the establishment of the peer-to-peer stream between the first user terminal and the second user terminal and sending an authorization or rejection message for the peer-to-peer stream to a network gateway in charge of controlling the streams transiting on the mobile telecommunications network, the message including the stream identifier.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: August 27, 2019
    Assignee: ORANGE
    Inventors: Xavier Marjou, Gaƫl Fromentoux
  • Patent number: 10397206
    Abstract: Various examples are directed to systems and methods for exchanging encrypted information. A first computing device may select a first private key and generate a session key based at least in part on the first private key. The first computing device may receive from a second computing device a second public key and generate a first public key based at least in part on: the second public key, a shared secret integer, and the first private key. A second computing device may select a second private key and generate the second public key based at least in part on the second private key; a generator, a first group constant and the shared secret integer.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: August 27, 2019
    Assignee: Red Hat, Inc.
    Inventor: Nathaniel McCallum
  • Patent number: 10397203
    Abstract: A reception device includes: a receiver unit which receives a program that is encrypted, handles confidential information and includes identification information for identifying a target of use of the program, and a notification signal for notifying of delivery of the program and including delivery destination information for identifying a delivery destination of the program; a processor which determines whether the reception device is a delivery target of the program on the basis of the delivery destination information included in the notification signal, and prepares for receiving the program when the reception device is the delivery target of the program; and an information protection unit which determines whether the reception device is the target of use of the program with reference to the identification information included in the program, and decrypts the program when the reception device is the target of use of the program.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: August 27, 2019
    Assignee: FUJITSU LIMITED
    Inventor: Kiyoshi Kohiyama
  • Patent number: 10389687
    Abstract: Embodiments of the invention relate to a method and a system for safely transmitting a document from a first network to a second network, while obviating the risk of transferring malware contained within the document to the second network. Embodiments of the invention involve separating binary data elements from text based data elements in a document, preferably a document in digital form. The binary data is then converted into analog media using an analog convertor, and then received by an analog receiver associated with the second network. Text-based data elements may remain in digital form, be cleaned of scripts, and are transferred to the second network in digital form. The document may be reconstructed using a computing device of the second network by combining data received via the analog receiver and the digital data comprising text-based data.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: August 20, 2019
    Assignee: SOREQ NUCLEAR RESEARCH CENTER
    Inventors: Zvi Liberman, Bruno Sfez, Abraham Englander, Ohad Meshulam, Avraham Hermon
  • Patent number: 10389683
    Abstract: A method for execution by a security module operating in a device of a dispersed storage network (DSN). The method begins by identifying storage unit(s) having security risk(s) and determining the security risk(s). The method continues by determining a type of security response and a level of security response. When the security response is a storage unit security response and the level of the security response is a first local level, the method continues by instructing the identified storage unit to implement one or more of a read only mode, ceasing multiple phase write operations, and ceasing issuance of rebuild requests. When security response is a DSN security response and level of the security response is a first network level, the method continues by instructing devices to perform at least one of revoking digital certificates of the identified storage unit and deleting access permissions of the identified storage unit.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: August 20, 2019
    Assignee: International Business Machines Corporation
    Inventor: Bart R. Cilfone
  • Patent number: 10382213
    Abstract: A technology is provided for certificate authentication for registering a certificate in computing service environment. A request may be received to register a certificate authority (CA) certificate. A registration token associated with a customer account in a service provider environment may be generated to enable association of the customer account with the CA certificate and to authenticate a registration of the CA certificate. The registration token may be sent to a requester desiring to register the CA certificate. A verification certificate that contains the registration token and that is signed by a certificate authority (CA) of the CA certificate and the CA certificate that is signed by the CA may be received to register the CA certificate with the customer account within a service provider environment The CA certificate is persisted with the service provider environment after verifying the registration token is associated with the customer account and the CA certificate is signed by the CA.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: August 13, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Mark Edward Rafn, Ashutosh Thakur, Rameez Loladia, James Christopher Sorenson, III, Christoph Saalfeld
  • Patent number: 10375039
    Abstract: A method and system for transmission of digital content via e-mail with point of use digital rights management is disclosed. The secured access rights to the digital content may be customized for individual recipients by the sender, and may evolve over time. The access rights are enforced according to a time-dependent scheme. A key server is used to arbitrate session keys for the encrypted content, eliminating the requirement to exchange public keys prior to transmission of the digital content. During the entire process of transmitting and receiving e-mail messages and documents, the exchange of cryptographic keys remains totally transparent to the users of the system. Additionally, electronic documents may be digitally signed with authentication of the signature.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: August 6, 2019
    Assignee: Encryptics, LLC
    Inventors: Patrick Carson Meehan, Zachary Wisenbaker Price, Raymond Joseph Zambroski, Jr., William Henry Frenchu, Shawn Patrick Hickey, Jesse Lee White, Anthony Allen Mohr, Jeremy Wayne Gomsrud
  • Patent number: 10375109
    Abstract: Protecting personally identifiable information data collected and/or stored in physical objects with embedded electronic devices by performing at least the following: obtaining a plurality of personally identifiable information algorithms for a plurality of electronic user devices, determining a relevant personally identifiable information algorithm from the plurality of personally identifiable information algorithms, executing the relevant personally identifiable information algorithm over the relevant personally identifiable information from one of the electronic user devices to construct a personally identifiable information data result, and transmitting the personally identifiable information data result without transmitting the relevant personally identifiable information to a remote computing system.
    Type: Grant
    Filed: December 23, 2015
    Date of Patent: August 6, 2019
    Assignee: McAfee, LLC
    Inventors: Ryan M. Durand, Carl D. Woodward, Kunal Mehta, Lynda M. Grindstaff
  • Patent number: 10366252
    Abstract: A method for detecting a modification to stored data includes continuously creating a point-in-time copy of a storage level logical unit, the point-in-time copy comprising a volume copy of the storage level logical unit and a signature of the storage level logical unit, comparing at least a portion of the point-in-time copy with a previous copy of the storage level logical unit, and monitoring, based on the comparing, changes on certain logical blocks of the stored data, using the signature of the storage level logical unit.
    Type: Grant
    Filed: December 19, 2017
    Date of Patent: July 30, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bulent Abali, Mohammad Banikazemi, Dan Edward Poff
  • Patent number: 10366249
    Abstract: An apparatus, method, and computer readable medium for management of infinite data streams. The apparatus includes a memory that stores streaming data with a data set and a processor operably connected to the memory. The processor transforms the data set to a second data set. To transform the data set, the processor determines whether a difference level exceeds a threshold, and transforms the data set by adding a noise when the difference level exceeds the threshold. When the difference level does not exceed the threshold, the processor determines whether a retroactive count is greater than a threshold, transforms the data set by adding a second noise when the retroactive count is greater than the threshold, and transforms the data set by adding a third noise when the retroactive count is not greater than the threshold. The processor transmits the second data set to a data processing system for further processing.
    Type: Grant
    Filed: October 14, 2016
    Date of Patent: July 30, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Rui Chen, Yilin Shen, Hongxia Jin
  • Patent number: 10362024
    Abstract: Systems and methods for credential character selection are provided. The system includes one or more sensors configured to detect a character selection and generate a character selection signal, and detect a character selection completion and generate a character selection completion signal. The system also includes one or more processors coupled to the one or more sensors, the one or more processors configured to receive the character selection signal and the character selection completion signal, and generate an output signal based on the received character selection signal that includes components of a credential. The system also includes a network interface component configured to transmit the output signal. The credential characters may be components of a PIN or password. Moreover, the credential character selections may be made on one device, but displayed on a separate coupled device. The character selections may be a selection of a character or a modification of character.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: July 23, 2019
    Assignee: PAYPAL, INC.
    Inventors: Bjorn Markus Jakobsson, James Roy Palmer, William Leddy
  • Patent number: 10354080
    Abstract: Methods and systems are presented for identifying user accounts selectively authorized to modify at least respective first and second fields of a data table, obtaining field-dependent validation rules selectively applicable to the respective fields, transmitting spreadsheet files to devices associated with the respective user accounts, filtering user-modified spreadsheet files so that the first field is selectively accepted from the first device and the second field is selectively accepted from the second device, allowing the values of the first and second fields to be edited contemporaneously, and recording an edited version of the data table.
    Type: Grant
    Filed: May 13, 2016
    Date of Patent: July 16, 2019
    Assignee: WINSHUTTLE, LLC
    Inventors: Gary Clough, Paul W. Mott, Heather Oebel, Vikram Chalana
  • Patent number: 10346410
    Abstract: Various systems and methods are provided that retrieve raw data from issuers, reorganize the raw data, analyze the reorganized data to determine whether the risky or malicious activity is occurring, and generate alerts to notify users of possible malicious activity. For example, the raw data is included in a plurality of tables. The system joins one or more tables to reorganize the data using several filtering techniques to reduce the processor load required to perform the join operation. Once the data is reorganized, the system executes one or more rules to analyze the reorganized data. Each rule is associated with a malicious activity. If any of the rules indicate that malicious activity is occurring, the system generates an alert for display to a user in an interactive user interface.
    Type: Grant
    Filed: January 9, 2018
    Date of Patent: July 9, 2019
    Assignee: Palantir Technologies Inc.
    Inventors: Craig Saperstein, Eric Schwartz, Hongjai Cho
  • Patent number: 10341120
    Abstract: The object of the invention is a method for transmitting electronic mail messages securely encrypted to a recipient, to whom an unencrypted electronic mail to be delivered cannot be assured of its information security. In the method: the sender (C1) sends an electronic mail message (1) to an electronic mail server (M1) that is his own or that of a known organization using an encrypted electronic mail transmission protocol, and the electronic mail message is marked as secured mail by adding the domain identifier of the secured mail server to the end of the electronic mail address of the recipient, wherein the server M1 sends it as guided by the name service further, using an encrypted transmission protocol, to the secured mail server TP, which stores it. The secured mail server sends to the sender a dispatch acknowledgment request (2.1), to which the sender answers with a dispatch acknowledgment (2.
    Type: Grant
    Filed: January 5, 2016
    Date of Patent: July 2, 2019
    Assignee: INFO CENTER INTERNATIONAL ICF OY
    Inventor: Jussi Kallioniemi
  • Patent number: 10341104
    Abstract: An encryption apparatus includes a table generator configured to generate a key table based on each of a plurality of encryption keys, the plurality of encryption keys having different attributes, generate a key-independent table independent of the plurality of encryption keys, and generate an encryption algorithm based on the key table and the key-independent table; and a transmitter configured to transmit the key table and the key-independent table to a client terminal, wherein the table generator and the transmitter are implemented by using at least one hardware processor.
    Type: Grant
    Filed: January 13, 2016
    Date of Patent: July 2, 2019
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Duk-Jae Moon, Ji-Hoon Cho, Kyu-Young Choi
  • Patent number: 10341299
    Abstract: In a computer-implemented method for collecting firewall flow records, firewall flow records are received from a plurality of data end nodes of a virtualized infrastructure comprising a distributed firewall according to a collection schedule, wherein the collection schedule defines which data end nodes of the plurality of data end nodes from which firewall flow records are collected, a frequency of collection of firewall flow records from the data end nodes, and an amount of firewall flow records collected from the data end nodes. Firewall flow records received at a firewall flow record collection queue are processed, such that the received firewall flow records are prepared for storage at a flow record data store.
    Type: Grant
    Filed: December 15, 2016
    Date of Patent: July 2, 2019
    Assignee: Nicira, Inc.
    Inventors: Kaushal Bansal, Medhavi Dhawan, Jerry Pereira, Shadab Shah, Sameer Kurkure
  • Patent number: 10298571
    Abstract: Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating identifiers with individuals having previously verified personal identities, assigning verification addresses on a block chain to the individuals, and recording identifiers and biometric data associated with the individuals at corresponding verification addresses. Block chain-based multifactor personal identity verification using the verification addresses may be performed by: receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, extracting the biometric data associated with the one or more individuals from the corresponding verification addresses, and verifying the identity of the one or more individuals upon receiving matching biometric data and private keys.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: May 21, 2019
    Assignee: BLACK GOLD COIN, INC.
    Inventor: Marcus Andrade
  • Patent number: 10298590
    Abstract: The present disclosure discloses an application-based service providing method, apparatus, and system. The method includes: acquiring an application identifier of a currently running application; and searching a preset application-service relationship table for a service list corresponding to the application identifier, so as to provide a user of the application with a service in the service list, where the application-service relationship table includes a correspondence between an application identifier and a service list, and the service list includes at least one service. The service providing method in the embodiments decouples a third-party service from an application, and even if the application needs version update, the third-party service also does not need to depend on the version update of the application.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: May 21, 2019
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Jun Zhang
  • Patent number: 10270598
    Abstract: A processor of an aspect includes a decode unit to decode an elliptic curve cryptography (ECC) point-multiplication with obfuscated input information instruction. The ECC point-multiplication with obfuscated input information instruction is to indicate a plurality of source operands that are to store input information for an ECC point-multiplication operation. At least some of the input information that is to be stored in the plurality of source operands is to be obfuscated. An execution unit is coupled with the decode unit. The execution unit, in response to the ECC point-multiplication with obfuscated input information instruction, is to store an ECC point-multiplication result in a destination storage location that is to be indicated by the ECC point-multiplication with obfuscated input information instruction. Other processors, methods, systems, and instructions are disclosed.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: April 23, 2019
    Assignee: Intel Corporation
    Inventor: Vinodh Gopal
  • Patent number: 10248794
    Abstract: A compliance checker to verify that a device complies with a policy is described. In one embodiment, the compliance checker comprises a compliance checker agent, to initiate the compliance check, in response to receiving the request, and an encryption checker upper driver above a level of a disk encryption driver, and an encryption checker lower driver, below the level of the disk encryption driver with a comparator to determine whether known data read from the upper driver is identical to known data read from the lower driver. The compliance checker plug-in in one embodiment verifies the compliance status of the device, based on the data from the comparator.
    Type: Grant
    Filed: October 19, 2016
    Date of Patent: April 2, 2019
    Assignee: ALERTSEC, INC.
    Inventors: Ebba Ulrika Margareta Blitz, Leif Olov Billstrom, Kurt Uno Lennartsson, Hans Fredrik Loevstedt, Erik Magnus Ahlberg