Patents Examined by Ellen Tran
  • Patent number: 10225255
    Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: March 5, 2019
    Assignee: SHAPE SECURITY, INC.
    Inventors: Ganesh Jampani, Susanto Irwan
  • Patent number: 10218710
    Abstract: Obtaining information may be increasingly more challenging in modern times. The systems described herein enable a user to have access to one or more data streams. For example, the data stream may include messages from a famous person provided to an online social networking service, where the messages may be limited character messages. Yet, in some instances, the data stream may also include images posted on a blog, videos posted on a social networking service for connecting people, a list of searches and/or search strings by a famous person, and a number of purchase orders by an actress. The systems may also control the user's access to the one or more data streams, possibly limiting the access to portions of the one or more data streams.
    Type: Grant
    Filed: August 31, 2016
    Date of Patent: February 26, 2019
    Assignee: PayPal, Inc.
    Inventors: Akshay Sanjeevaiah Krishnaiah, Sandy Lynn Godsey, Michael Charles Todasco, Rohan Baddam, Cheng Tian, Philip Chuang, Srivathsan Narasimhan
  • Patent number: 10212180
    Abstract: Techniques for ascertaining legitimacy of communications received during a digital interaction with a client device. The techniques include: receiving a communication; identifying from the communication a first secured token; processing the first secured token by: obtaining, from the first secured token, information indicating a state of the digital interaction; and using the information indicating the state to determine whether the communication is from the client device; and when it is determined that the communication is from the client device, causing at least one action responsive to the communication to be performed; updating the information indicating the state of the digital interaction to obtain updated information indicating the state of the digital interaction; and providing a second secured token to the client device for use in a subsequent communication during the digital interaction, the second secured token comprising the updated information indicating the state of the digital interaction.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: February 19, 2019
    Assignee: MASTERCARD TECHNOLOGIES CANADA ULC
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 10200360
    Abstract: User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user.
    Type: Grant
    Filed: February 8, 2016
    Date of Patent: February 5, 2019
    Assignee: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Avery Audrey Kwan, Jan-Willem Maarse
  • Patent number: 10185840
    Abstract: Methods, apparatus, systems, and computer-readable media are provided for interactive assistant modules to safely access and provide restricted content in group contexts. In various implementations, a dialog between a first individual and an interactive assistant module may be determined to be sensorially perceivable by at least a second individual. Restricted content that is to be automatically incorporated into the dialog by the interactive assistant module may be identified. In various implementations, access to the restricted content may be controlled by the first individual. In various implementations, the restricted content may be conditionally incorporated into the dialog in response to a determination that the second individual is authorized to perceive the restricted content.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: January 22, 2019
    Assignee: GOOGLE LLC
    Inventors: Bryan Horling, Wan Fen Nicole Quah, Maryam Garrett, Ruijie He
  • Patent number: 10181951
    Abstract: A system and method for supporting encryption key retrieval. A first digital key is created. A first protected key is created by applying a first protection algorithm based on a first user provided password to the first digital key. A first unlock key is created that is separate from the first digital key. A second protected key is created by applying a second protection algorithm based on the first unlock key to the first digital key. The first protected key and the second protected key are stored. The first unlock key is sent to a remote storage and no copy of the unlock key is retained after the sending the first unlock key.
    Type: Grant
    Filed: May 13, 2016
    Date of Patent: January 15, 2019
    Assignee: BlackBerry Limited
    Inventors: Neil Patrick Adams, David Bajar
  • Patent number: 10169575
    Abstract: A computer-implemented method for preventing internal network attacks may include 1) identifying a host system that is within a subnet of a network, 2) detecting an intrusion on the host system, the intrusion on the host system being capable of facilitating an attack via the host system on at least one additional system of the network, 3) identifying at least one additional host system within the subnet of the network, and 4) implementing a security measure on the additional host system to prevent the attack based at least in part on detecting the intrusion and at least in part on the host system and additional host system being within the subnet. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 14, 2012
    Date of Patent: January 1, 2019
    Assignee: Symantec Corporation
    Inventor: Alexander Lototskiy
  • Patent number: 10148439
    Abstract: Various embodiments provide systems and methods for securely transferring data from a secured site to a medical device. Some embodiments provide systems and methods for securely uploading data from a medical device to a secured site. In some embodiments described herein, data can be downloaded from a secured site to a key and after severing communication with the secured site, key can be coupled to a device and download the data to the device, in some embodiments, a public and private key pair may be used to securely download data to a device.
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: December 4, 2018
    Assignee: ARDENT SOUND, INC.
    Inventor: Peter G. Barthe
  • Patent number: 10148441
    Abstract: Embodiments relate to systems, devices, and computer-implemented methods for detecting double signing in one-time use signature schemes by receiving a first message, where the first message includes a signature generated using a one-time use private key of a one-time use public/private key pair, determining a one-time use public key of the public/private key pair based on the first message, adding the one-time use public key to a list of public keys, receiving a second message, where the second message includes a signature generated using the one-time use private key of the one-time use public/private key pair, determining the one-time use public key of the public/private key pair based on the second message, determining that the one-time use public/private key pair was used more than once based on the list of public keys; and generating an alert based on determining that the one-time use public/private key pair was used more than once.
    Type: Grant
    Filed: September 11, 2015
    Date of Patent: December 4, 2018
    Assignee: VERISIGN, INC.
    Inventor: Burton S. Kaliski, Jr.
  • Patent number: 10140653
    Abstract: The invention is a system allowing for the commercial rental of physical assets that are locked and secured at specific locations, including, without limitation, bicycles, motorcycles, automobiles, tools, machines, computers, smart phones, or tablet computers.
    Type: Grant
    Filed: July 29, 2017
    Date of Patent: November 27, 2018
    Inventors: Vince Denais, Andre Denais
  • Patent number: 10129279
    Abstract: Techniques for detecting application program spoofing. The techniques include: receiving a communication from an application program executing on a client device different from the at least one computer; identifying from the communication an asserted identity of the application program; and verifying the asserted identity of the application program at least in part by: interacting with the client device to obtain additional information about the application program, and determining whether the additional information about the application program is consistent with the asserted identity of the application program.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: November 13, 2018
    Assignee: Mastercard Technologies Canada ULC
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 10116669
    Abstract: Determining the physical location of wirelessly connected devices within a network can provide a number of security benefits. However, manually determining and configuring the physical location of each device within a system can be burdensome. To ease this burden, devices within a network are equipped with a location detection sensor that is capable of automatically determining a device's location in relation to other devices within the network. A location detection sensor (“sensor”) may include a light source, a light direction sensor, a rangefinder, and a radio or wireless network interface. Two location detection sensors can perform a location detection process to determine their relative locations to each other, such as the distance between them. As more sensors are added to a network, a sensor management system uses the relative locations determined by the sensors to map the sensors to a physical space layout.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: October 30, 2018
    Assignee: CA, Inc.
    Inventors: Serguei Mankovskii, Steven L. Greenspan, Maria Cecilia Velez Rojas
  • Patent number: 10114938
    Abstract: Embodiments are directed to simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a lock, authenticating the credential, unlocking the lock to provide access to a resource protected by the lock based on having authenticated the credential, determining a security level associated with the lock, and conditionally capturing the credential based on the security level.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: October 30, 2018
    Assignee: UTC FIRE AND SECURITY AMERICAS CORPORATION, INC.
    Inventors: Alan Marchiori, Ulf J. Jonsson, Vijaya Ramaraju Lakamraju, Nicholas Charles Soldner, Ritesh Khire, Joseph Zacchio, Adam Kuenzi, Ron Chapin
  • Patent number: 10110385
    Abstract: A system and method for generating a signature for a document using credentials indicating an unsanctioned signing event. The system and method includes receiving a request to generate a signature of a signatory for a document, wherein the request includes a received set of credential data for a signatory, obtaining a token identifier for at least one computing device, and determining if the received set of credential data matches credentials indicating the unsanctioned signing event. The system and method further includes receiving the signature of the signatory, the document identifier, and the token identifier, and determining based at least in part on the signature, document identifier, and the token identifier, whether the received signature is associated with the unsanctioned signing event.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: October 23, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Dylan Harris Rush, Darren Ernest Canavor, Daniel Wade Hitchcock, Jesper Mikael Johansson, Jon Arron McClintock
  • Patent number: 10104132
    Abstract: Systems and methods for joining a device to a fabric using an assisting device include an indication to add a joining device to a fabric. If the joining device supports network-assisted fabric pairing, a first connection is established between a commissioning device and the assisting device. The assisting device also connects to a joining device. Through the assisting device, the commissioning device and the joining device establish a communication channel over which fabric credentials may be sent.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: October 16, 2018
    Assignee: Google LLC
    Inventors: Jay D. Logue, Andrew William Stebbins, Roger Loren Tinkoff
  • Patent number: 10091648
    Abstract: A novel key management approach is provided for securing communication handoffs between an access terminal and two access points. As an access terminal moves from a current access point to a new access point, the access terminal sends a short handoff request to the new access point. The short handoff request may include the access terminal ID; it does not include the access point ID. The new access point may then send its identifier and the access terminal's identifier to the authenticator. Using a previously generated master transient key, the access point identifier and the access terminal identifier, an authenticator may generate a master session key. The master session key may then be sent to the access point by the authenticator. The access terminal independently generates the same new security key with which it can securely communicate with the new access point.
    Type: Grant
    Filed: April 24, 2008
    Date of Patent: October 2, 2018
    Assignee: QUALCOMM Incorporated
    Inventor: Michaela Vanderveen
  • Patent number: 10085148
    Abstract: A novel key management approach is provided for securing communication handoffs between an access terminal and two access points. An access terminal establishes a secure communication session with a first access point based on a first master session key based on a master transient key. The access terminal obtains a second access point identifier associated with a second access point and sends a message associated with a handoff to either the first access point or the second access point. The access terminal generates a second master session key based on at least the master transient key and the second access point identifier. The second master session key is used for secure communications with the second access point in connection with an intra-authenticator handoff from the first access point to the second access point. The access terminal then moves the secure communication session to the second access point.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: September 25, 2018
    Assignee: QUALCOMM Incorporate
    Inventor: Michaela Vanderveen
  • Patent number: 10075464
    Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: September 11, 2018
    Assignee: PALANTIR TECHNOLOGIES INC.
    Inventors: Maxim Kesin, Samuel Jones
  • Patent number: 10063532
    Abstract: Provided is an authentication apparatus that performs user authentication, using a wearable terminal worn by a user, whereby allowing a high security to be achieved. It includes a storage part that stores a piece of authentication information in which a piece of terminal information that identifies the wearable terminal worn by the user is registered, a communication part that makes communication with the wearable terminal worn by the user to acquire a piece of terminal information, and an authenticating part that performs user authentication in the case where the same piece of terminal information as that registered in the authentication information has been acquired by the communication part.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: August 28, 2018
    Assignee: KYOCERA Document Solutions Inc.
    Inventor: Takanori Shiraishi
  • Patent number: 10049232
    Abstract: A rewrite detection system, a rewrite detection device and an information processing device can detect unauthorized rewrite to a program or data stored in a storage unit of the information processing device. A rewrite detection device generates a random seed and transmits it to an ECU and a server device. The ECU calculates a hash value using a predetermined hash function on the basis of the received random seed and the storage content of the storage unit, and transmits the hash value to the rewrite detection device. The server device transmits an expectation in response to an inquiry from the rewrite detection device. The rewrite detection device determines whether unauthorized rewrite to a program or data in the ECU has been performed or not in accordance with whether the expectation received from the server device and the hash value received from the ECU coincide with each other or not.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: August 14, 2018
    Assignees: NATIONAL UNIVERSITY CORPORATION NAGOYA UNIVERSITY, AUTONETWORKS TECHNOLOGIES LTD., SUMITOMO WIRING SYSTEMS, LTD., SUMITOMO ELECTRIC INDUSTRIES, LTD.
    Inventors: Hiroaki Takada, Hiroki Takakura, Yukihiro Miyashita, Satoshi Horihata, Hiroshi Okada, Naoki Adachi