Patents Examined by Ellen Tran
  • Patent number: 9794237
    Abstract: A method of managing secure communications states in an endpoint within a secure network is disclosed. The method includes, in a disconnected state, transmitting from a first endpoint to a second endpoint a first message including an authorization token. The method further includes, in the pending state, receiving from the second endpoint a second message including a second authorization token at the first endpoint. The method includes, based on the receipt of the second message, entering an open state and initializing a tunnel between the first and second endpoints using an IPsec-based secured connection. The method also includes, upon termination of the tunnel due to a termination or timeout message issued by at least one of the first and second endpoints, entering a closed state.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: October 17, 2017
    Assignee: Unisys Corporation
    Inventors: Robert A Johnson, Sarah K Inforzato
  • Patent number: 9794286
    Abstract: In order to detect and prevent attacks in which the network is infested with unauthorized data to cause malfunction, the invention aims, on the basis of network cycle information, to detect errors and to prevent unauthorized data forwarding in a network system such as a vehicle-mounted network. This network device is provided with a communication unit which receives data, a time management unit which manages the reception time at which data is received, and a control unit which processes data.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: October 17, 2017
    Assignee: HITACHI AUTOMOTIVE SYSTEMS, LTD.
    Inventors: Satoshi Otsuka, Tasuku Ishigooka, Fumio Narisawa, Kazuyoshi Sasazawa
  • Patent number: 9785792
    Abstract: Methods and systems disclosed herein relate generally to processing data requests from external assessment systems. More specifically, an interface is availed to external assessment systems that accepts an identification of one or more genes. Upon receiving a request identifying one or more genes, a type of access authorized for the requesting external assessment system is assessed. When it is determined that the type of data access indicates that the external assessment system is authorized to access data for the one or more genes, a data repository is queried to identify client data that corresponds to the one or more genes and that indicates or can be used to detect a presence of client-associated variants. A response data set that includes at least some of the client data is transmitted to the external assessment system.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: October 10, 2017
    Assignee: COLOR GENOMICS, INC.
    Inventors: Ryan Barrett, Othman Laraki, Wendy McKennon, Katsuya Noguchi, Huy Hong
  • Patent number: 9785759
    Abstract: A method, apparatus, and manufacture for configuring multiple content protection systems is provided. A client media player is employed to determine whether media content is protected. The client media player includes an application, and further includes a media engine that is a distinct program from the application. At least one type of content protection system supported by the media engine is determined. The application is employed to get a key and/or a license for the protected media content in accordance with the determined type of content protection system. The application is employed to instruct the media engine to play the media content. The key and/or the license for the determined type of content protection system is sent from the application to the media engine.
    Type: Grant
    Filed: June 25, 2012
    Date of Patent: October 10, 2017
    Assignee: Google Inc.
    Inventors: David Kimbal Dorwin, Andrew Scherkus, Christian Kaiser, Stephen John Lacey, Nabila Lacey
  • Patent number: 9772821
    Abstract: A cryptographic data processing method, implemented in an electronic device including a processor, the method including steps of providing a point of an elliptic curve in a Galois field, and a whole number, and of calculating a scalar product of the point by the number, the coordinates of the point and the number having a size greater than the size of words that may be processed directly by the processor, the scalar multiplication of the point by the number including steps of: storing scalar multiples of the point multiplied-by the number 2 raised to a power belonging to a series of whole numbers, setting a resulting point for each non-zero bit of the first number, adding the resulting point and one of the stored multiple points, and providing at the output of the processor the resulting point as result of the scalar product.
    Type: Grant
    Filed: January 13, 2014
    Date of Patent: September 26, 2017
    Assignee: Inside Secure
    Inventors: Benoît Feix, Vincent Verneuil, Christophe Clavier
  • Patent number: 9769655
    Abstract: Systems and methods for provisioned configuration of wireless devices to allow access to restricted wireless networks are provided. Using an open wireless or wired network, a user of a wireless device may be authenticated. A configuration application, which includes the parameters and policies of the provisioned configuration, is generated, transferred to, and executed on the wireless device. Following configuration by the application, the wireless device is allowed to access the restricted wireless network within the parameters and policies of the provisioned configuration.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: September 19, 2017
    Assignee: RUCKUS WIRELESS, INC.
    Inventor: Ming-Jye Sheu
  • Patent number: 9760719
    Abstract: An electronic system includes: a control unit configured to: generate an encrypted information based on encrypting an information type, generate a mapping table including the encrypted information, the information type, or a combination thereof, generate a restored information based on mapping a decomposed information of the encrypted information, categorized according to a decomposition rule, to a corresponding instance of the information type in the mapping table, and a user interface, coupled to the control unit, configure to display the restored information on an activity dashboard for receiving a user entry to calibrate the decomposition rule.
    Type: Grant
    Filed: July 3, 2014
    Date of Patent: September 12, 2017
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Xuan Bao, Lu Luo, Emmanuel Munguia Tapia, Evan Welbourne, Jun Yang
  • Patent number: 9749357
    Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: detecting a plurality of digital interactions at different points in time; for each digital interaction of the plurality of digital interactions: identifying from the digital interaction an anchor value X of an anchor type T; and updating a profile of the anchor value X.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: August 29, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 9749358
    Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: identifying an anchor value X from the first digital interaction; identifying a first plurality of past digital interactions from which the anchor value X was previously observed, wherein each past digital interaction of the first plurality of past digital interactions has associated therewith a respective sameness score; select a second plurality of past digital interactions from the first plurality of past digital interactions based at least in part on the respective sameness scores; generating a profile for the anchor value X based on the second plurality of past digital interactions; and determining a biometric score for the first digital interaction.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: August 29, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 9749356
    Abstract: Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: identifying a plurality of attributes from a profile; for each attribute of the plurality of attributes, determining whether the digital interaction matches the profile with respect to the attribute, comprising: identifying, from the profile, at least one bucket of possible values of the attribute, the at least one bucket being indicative of anomalous behavior; identifying, from the digital interaction, a value of the attribute; and determining whether the value identified from the digital interaction falls into the at least one bucket, wherein the digital interaction is determined to match the profile with respect to the attribute if it is determined that the value identified from the digital interaction falls into the at least one bucket; and determining a penalty score.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: August 29, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 9736156
    Abstract: A method for a Wireless Local Area Network (WLAN) user to access a fixed network is disclosed, which includes: after the WLAN user is authenticated successfully, a Broadband Network Gateway (BNG) sends obtained user subscription information to a WLAN device; and after the WLAN device performs related configuration according to the user subscription information, a WLAN user terminal accesses a network. A system for a WLAN user to access a fixed network is also disclosed. The present disclosure can solve the problem that a WLAN network cannot perceive the user subscription information and further cannot provide differentiated services based on different users and different subscription information because a WLAN user passes through BNG authentication.
    Type: Grant
    Filed: August 14, 2013
    Date of Patent: August 15, 2017
    Assignee: ZTE CORPORATION
    Inventors: Liang Fan, Yong Chen, Qiandeng Liang, Bo Yuan
  • Patent number: 9735969
    Abstract: The invention concerns a method for generating an electronic signature key and an associated public key certificate, implemented by a client unit and a server unit, the method comprising a step during which the client unit and/or the server unit generate(s) a signature key comprising a private key and a public key, and a public key certificate comprising said public key, the method being characterized in that the client unit acquires an item of biometric data of an individual, and in that the signature key and/or the public key certificate are generated from at least a portion of said biometric data, and in that the portion of biometric metric data from which the signature key and/or the public key certificate have been generated is ephemeral and is not memorized after the signature key and the public key certificate have been generated. The invention also concerns a method for transferring a message and a system designed to implement the method for generating a signature key.
    Type: Grant
    Filed: October 11, 2013
    Date of Patent: August 15, 2017
    Assignee: MORPHO
    Inventors: Alexandre Martins, Hervé Chabanne, Julien Bringer, Olivier Cipière, Rodolphe Hugel
  • Patent number: 9729523
    Abstract: A method, network element, and mobile station (MS) are disclosed. The method includes: obtaining information that a plug-in card of the MS does not support a first encryption algorithm; deleting the first encryption algorithm from an encryption algorithm list permitted by a core network element according to the information that the plug-in card of the MS does not support the first encryption algorithm; sending the encryption algorithm list excluding the first encryption algorithm to an access network element, so that the access network element selects an encryption algorithm according to the encryption algorithm list excluding the first encryption algorithm and the MS capability information sent from the MS and sends the selected encryption algorithm to the MS. By using the method, network element, and MS, errors due to the fact that the plug-in card of the MS does not support an encryption algorithm may be avoided during the encryption process.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: August 8, 2017
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Jing Chen, Yongfeng Deng, Aiqin Zhang, Jun Qin
  • Patent number: 9722800
    Abstract: There is provided a method for creating an authentication entity derived from an original data carrier, wherein the original data carrier has a key pair that is individual to the original data carrier and comprises a public key and a secret key of the original data carrier, and a certificate for the public key of the original data carrier. The method comprises the following steps: deriving a secret key for the derived authentication entity from the secret key of the original data carrier by the original data carrier; forming derivation data for the derived authentication entity; transferring authentication data to the derived authentication entity, wherein the authentication data have the derivation data, the certificate of the public key of the original data carrier as well as a derived key pair which comprises the derived secret key and the public key of the original data carrier.
    Type: Grant
    Filed: July 22, 2013
    Date of Patent: August 1, 2017
    Assignee: Giesecke & Devrient GmbH
    Inventors: Gisela Meister, Jens Urmann
  • Patent number: 9722971
    Abstract: The present invention concerns the field of the emulation of contactless payment cards and more particularly the routing of the contactless communication within a device comprising several contactless payment card emulation circuits. The invention proposes a method for routing messages within an NFC controller. This controller has a table of the various applications hosted by the various secure elements. When the controller receives a request for the list of applications contained in the virtual payment card, it intercepts this request and responds with the list of the various applications accessible on the various secure elements. When a request aimed at selecting an application is received, the controller stores the secure element concerned and redirects all the messages to this element as long as it does not receive any new selection request.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: August 1, 2017
    Assignee: MORPHO
    Inventors: Louis-Philippe Goncalves, Sebastien Poly
  • Patent number: 9706410
    Abstract: A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.
    Type: Grant
    Filed: March 7, 2012
    Date of Patent: July 11, 2017
    Assignee: Rapid 7, Inc.
    Inventors: Giridhar Sreenivas, Derek Sigurdson
  • Patent number: 9697502
    Abstract: A method, computer program product, and system for enforcing eMeeting guidelines is described. An indication of one or more use restriction guidelines is received. The one or more use restriction guidelines is associated with an electronic communication session. The one or more use restriction guidelines is provided to a computing device associated with an invitee associated with the electronic communication session. An indication is received that the invitee has accepted a portion of the one or more use restriction guidelines. The portion of the one or more use restriction guidelines is enforced with respect to one or more devices associated with the invitee.
    Type: Grant
    Filed: June 27, 2012
    Date of Patent: July 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Judith Helen Bank, Liam Harpur, Ruthie D. Lyle, Patrick Joseph O'Sullivan, Lin Sun
  • Patent number: 9686315
    Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: identifying an anchor value X from the first digital interaction; identifying a first plurality of past digital interactions from which the anchor value X was previously observed, wherein each past digital interaction of the first plurality of past digital interactions has associated therewith a respective sameness score; select a second plurality of past digital interactions from the first plurality of past digital interactions based at least in part on the respective sameness scores; generating a profile for the anchor value X based on the second plurality of past digital interactions; and determining a biometric score for the first digital interaction.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: June 20, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 9686314
    Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: detecting a plurality of digital interactions at different points in time; for each digital interaction of the plurality of digital interactions: identifying from the digital interaction an anchor value X of an anchor type T; and updating a profile of the anchor value X.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: June 20, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 9680868
    Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: identifying an anchor value X from the digital interaction; identifying, in a record of the digital interaction, a data structure associated with an anchor type T of the anchor value, wherein a plurality of anchor values of the anchor type T are divided into a plurality of buckets of anchor values; identifying a bucket B of the plurality of buckets of anchor values, wherein the anchor value X falls into the bucket B; and operating on the data structure associated with the anchor type T to indicate that at least one anchor value from the bucket B has been observed in connection with the digital interaction.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: June 13, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson