Patents Examined by Eric W Shepperd
  • Patent number: 10938788
    Abstract: Some embodiments provide a method for configuring a gateway datapath that processes data messages between a logical network implemented in a datacenter and an external network. The method receives configuration data including security policy rules for a logical router implemented by the datapath that indicate whether to apply a security protocol to certain data messages transmitted from a particular interface of the logical router. The method identifies a particular security policy rule that applies to data messages that (i) have a destination address in a set of destination addresses and (ii) meet at least one additional criteria. The method generates a static route, for a routing table used by the datapath to implement the logical router, that routes data messages with destination addresses in the set of destination addresses to the particular interface. The datapath applies the security policy rules for data messages transmitted from the particular interface.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: March 2, 2021
    Assignee: VMWARE, INC.
    Inventors: Yong Wang, Xinhua Hong, David J. Leroy, Kai-Wei Fan
  • Patent number: 10938806
    Abstract: The present disclosure provides a communication method and device. The method includes that: when an instruction for instructing transmitting user data via a direct communication connection is received, user verification information is acquired, the user verification information including verification data input through a first terminal; the user verification information is sent to a second terminal; when verification success information is received from the second terminal, a first direct communication connection is established with the second terminal; and the user data is sent to the second terminal via the first direct communication connection.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: March 2, 2021
    Assignee: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventor: Haiquan Li
  • Patent number: 10931453
    Abstract: Authentication of tokens and associated are used to provide a just-in-time key synchronization for user access to a service in a cloud computing environment which includes a plurality of availability zones with an identity service, a storage system, and a keystore. The encryption keys are distributed by the storage system based on a user access request containing a token with a payload and a current user cryptographic key. The token is then sent to the keystore to authenticate the user. The keystore authenticates the user and sends the token with the current cryptographic key to the storage system. The storage system receives the token with the current cryptographic key and grants access to the user for the service.
    Type: Grant
    Filed: March 5, 2018
    Date of Patent: February 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Fernando J. Diaz, Shawn P. Mullen, Michael Perng, Karen Mariela Siles, Elvin Dalipe Tubillara
  • Patent number: 10924480
    Abstract: In one embodiment, an IoT server includes: processing circuitry, an I/O module operative to communicate with at least an IoT device and a vendor network server, and an onboarding application and operative to at least: receive an onboarding request from the IoT device via the I/O module, send a confirmation request to the vendor network server via the I/O module, where the confirmation request indicates a request to confirm an identity of the IoT device according to a connection to a network device authenticated by the vendor network server, receive a confirmation response from the vendor network server via the I/O module, where the confirmation response indicates whether the IoT device is connected to the network device, and if the confirmation response is a positive confirmation response that indicates that the IoT device is connected to the network device, onboard the IoT device for participation in an IoT-based system.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: February 16, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Santosh Ramrao Patil, Gangadharan Byju Pularikkal, Sourav Chakraborty, Madhusudan Nanjanagud
  • Patent number: 10911956
    Abstract: Methods, systems, and apparatuses are described for identifying unauthorized (e.g., rogue) access points. Authorized access points can detect the presence of rogue access points by determining signal strengths associated with other access points. A detected variance from an expected signal strength can indicate a presence of a rogue access point.
    Type: Grant
    Filed: November 10, 2017
    Date of Patent: February 2, 2021
    Assignee: COMCAST CABLE COMMUNICATIONS, LLC
    Inventors: Ryan Van Antwerp, James Bradley Hein
  • Patent number: 10902242
    Abstract: Methods and systems are described for creating irrefutable binding data for a data file. An input sequence of data elements is derived based on information from the data file. A graphical representation of input regions corresponding to the input sequence of data elements is output on a display, superimposed on captured image data including a visible feature of a user associated with the data file. User input of each data element of the input sequence is captured by tracking the visible feature through the corresponding input regions, and the binding data is created from the captured images as the visible feature is tracked through the input regions.
    Type: Grant
    Filed: October 11, 2019
    Date of Patent: January 26, 2021
    Assignee: PQ SOLUTIONS LIMITED
    Inventors: Martin Tomlinson, Cen Jung Tjhai, Andersen Cheng
  • Patent number: 10891360
    Abstract: Certain implementations include systems and methods for improving knowledge-based-authentication (KBA) identity authentication questions.
    Type: Grant
    Filed: November 6, 2019
    Date of Patent: January 12, 2021
    Assignee: LexisNexis Risk Solutions Inc.
    Inventors: Tamir Nygate, Benny Rotem, Elina Yaakobovich
  • Patent number: 10887099
    Abstract: A processor-based method for secret sharing in a computing system is provided. The method includes encrypting shares of a new secret, using a previous secret and distributing unencrypted shares of the new secret and the encrypted shares of the new secret, to members of the computing system. The method includes decrypting at least a subset of the encrypted shares of the new secret, using the previous secret and regenerating the new secret from at least a subset of a combination of the unencrypted shares of the new secret and the decrypted shares of the new secret.
    Type: Grant
    Filed: February 18, 2019
    Date of Patent: January 5, 2021
    Assignee: Pure Storage, Inc.
    Inventors: Ethan L. Miller, Andrew R. Bernat
  • Patent number: 10872042
    Abstract: Some embodiments provide, for a particular device in a set of related devices, a method for backing up data synchronized between the set of related devices. The method stores the backup data encrypted with a set of data encryption keys. The method also stores the set of data encryption keys encrypted with a master recovery key. The method also stores several copies of master recovery key data, each copy of the master recovery key data encrypted with a public key of a different one of the related devices. The backup data is only recoverable by accessing a private key of any one of the related devices.
    Type: Grant
    Filed: February 5, 2018
    Date of Patent: December 22, 2020
    Assignee: Apple Inc.
    Inventors: Michael D. Ford, Jerrold V. Hauck, Matthew G. Watson, Mitchell D. Adler, Dallas B. De Atley, James Wilson
  • Patent number: 10848507
    Abstract: Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: November 24, 2020
    Assignee: Rapid7, Inc.
    Inventors: Paul Deardorff, Derek Abdine, Andreas Galauner, Mark Momburg
  • Patent number: 10819683
    Abstract: A method, system, and computer-usable medium are disclosed for performing deep packet inspection of network traffic, comprising: receiving a unit of one or more network packets, calculating a calculated fingerprint for data within the unit, determining a current inspection context, determining whether the calculated fingerprint and the current inspection context matches an entry stored in a cache, wherein the entry includes a stored fingerprint and a cached inspection context, and performing operations associated with deep packet inspection of the unit based on whether the calculated fingerprint and the current inspection context match the entry.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: October 27, 2020
    Assignee: Forcepoint LLC
    Inventors: Valtteri Rahkonen, Kari Nurmela
  • Patent number: 10812516
    Abstract: A cyber security assessment platform is provided. The platform can assess the security posture of a network by deploying one or more scenarios to be executed on one or more assets on the network and analyzing the outcomes of the scenarios. A scenario can be configured to validate a device or network status, and/or mimic an unauthorized cyber-attack. Each scenario can include one or more phases defining an execution path. Related method, apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: October 20, 2020
    Assignee: AttackIQ, Inc.
    Inventors: Stephan Chenette, Rajesh Kumar Sharma
  • Patent number: 10791124
    Abstract: A method and device for securing data of a message is provided. A method for encrypting a message of a user terminal device includes: receiving a message via a message input window; displaying the received message; encrypting the message by using a key index and an encryption key corresponding to a chatting window for the message based on an instruction for transmitting the message to another chatting party being received; and transmitting the encrypted message to the other chatting party.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: September 29, 2020
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jun-bum Shin, Jin-su Kim, Kyoung-yong Lee, Sung-wook Kim, Hye-jin Shin
  • Patent number: 10776475
    Abstract: A method, computer system, and computer program product. Input element layout data based on a layout of input elements of an input device is retrieved in response to a received password input request. A positioning marker and a visualized overlay input device including an altered layout of input elements is generated based on the retrieved input element layout data. The visualized overlay input device and the positioning marker are rendered for display by a see-through display device for viewing of the visualized overlay input device in superposition with respect to the input device. An effective input configuration of the layout of input elements of the input device is generated to correspond to the altered layout of input elements for entry of the password input.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: September 15, 2020
    Assignee: International Business Machines Corporation
    Inventor: Akira Ohkado
  • Patent number: 10771482
    Abstract: The disclosed computer-implemented method for detecting geolocation-aware malware may include (1) receiving, by a computing device, trajectory information for network traffic carrying geolocation-aware malware, (2) identifying, from the trajectory information, a target geolocation characteristic required to activate the geolocation-aware malware, (3) establishing, on an image of a user machine, an execution environment having the target geolocation characteristic, (4) running, on the image of the user machine, the geolocation-aware malware, and (5) analyzing functioning of the geolocation-aware malware to identify malicious activity by the geolocation-aware malware. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: September 8, 2020
    Assignee: CA, Inc.
    Inventor: Prashant Gupta
  • Patent number: 10764045
    Abstract: A system receives data of one or more types from one or more sources having distinct identities for storing the data in a distributed storage system. The system stores metadata associated with storing the data in data structures in the distributed storage system. The system selects a portion of the data and a portion of the metadata associated with storing the data in the distributed storage system. The system compresses the selected portions of the data and the metadata, encrypts the compressed data and metadata using a single key or using a separate key for each data type, and stores the encrypted compressed data and metadata in the distributed storage system. The system also encrypts unencrypted metadata and associated data during defragmentation procedure.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: September 1, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Rushi Srinivas Surla, Shane Kumar Mainali, Andrew Edwards, Maneesh Sah, Weiping Zhang
  • Patent number: 10754964
    Abstract: A building management system comprising an integrated sensor and control system integrated on a single application specific integrated circuit (ASIC). The ASIC combines sensor inputs necessary to monitor ambient light levels, light color, occupation/motion sensors, security sensors, temperature and humidity, barometric pressure, smoke and toxic substance sensors, and a processor to receive the sensor inputs and deliver control output signals to effect changes and make settings to each of the environmental systems that are monitored. The ASIC also provides communication and control security for the building management system, preventing hostile intrusions into the system. The storage, intelligence and processing all reside within the ASIC.
    Type: Grant
    Filed: November 10, 2017
    Date of Patent: August 25, 2020
    Inventor: Bruce A Pelton
  • Patent number: 10757111
    Abstract: A multilevel security fabric with address management units communicatively coupled to ports of a communication fabric and nodes of a multilevel security system are disclosed. The communication fabric facilitates communication between the nodes. An address management unit associated with a particular node extracts address maps contained in data requests associated with the particular node and regulates communication of that node any other nodes within the system across the communication fabric based on whether the extracted address maps are within an allowable address access range specified for the particular node. In the event that an extracted address map fails to fall within the allowable address access range, the address management unit may block the communication with the particular node. Accordingly, the address management unit may enforce multilevel communication across the communication fabric with high assurance.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: August 25, 2020
    Assignee: Rockwell Collins, Inc.
    Inventors: James A. Marek, Jonathon C. Skarphol, Adam W. Pfab, Edward C. Tubbs, John G. Bendickson
  • Patent number: 10686793
    Abstract: An attempt to authenticate to a system resource using a particular device and particular credentials is identified and an identity of a user associated with the particular credentials is determined. In association with the attempt to authenticate, a location associated with the particular device is determined and sensor data generated by a set of sensors deployed in an environment is accessed, at least some of the sensor data including biometric data. The sensor data is used to detect a location of the user, and a degree of proximity between the location associated with the particular device and the location of the user is determined. An authentication action is caused to be performed corresponding to the attempt to authenticate based on the degree of proximity.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: June 16, 2020
    Assignee: CA, Inc.
    Inventor: Vineet Verma
  • Patent number: 10686841
    Abstract: This disclosure provides an apparatus and method for dynamic customization of cyber-security risk item rules. A method includes interacting with a user, by a risk manager system, to define a plurality of rules for risk items to be monitored among a plurality of connected devices. The method also includes mapping each of the rules to a corresponding one or more of the connected devices by the risk manager system. The method further includes monitoring the connected devices according to the rules by the risk manager system. In addition, the method includes displaying an output based on the rules and a status of the connected devices by the risk manager system.
    Type: Grant
    Filed: May 24, 2018
    Date of Patent: June 16, 2020
    Assignee: Honeywell International Inc.
    Inventor: Seth G. Carpenter