Patents Examined by Evans Desrosiers
  • Patent number: 10298604
    Abstract: In one embodiment, a system is described, the system including a network gateway in communication with a plurality of original equipment manufacturer (OEM) servers, a household behavior model processor which models a household behavior model based at least on expected usage of each of a plurality of OEM network appliances, wherein each one appliance of the plurality of OEM network appliances is associated with one of the plurality of OEM servers, and behavior of users associated with the network gateway, an anomaly detector which determines, on the basis of the household behavior model, if an anomalous control message which has been sent to one of the plurality of OEM network appliances from one of the OEM servers has been received at the network gateway, and a notification server which sends a notification to an application on an administrator's device upon receipt of the anomalous control message at the network gateway. Related systems, apparatus, and methods are also described.
    Type: Grant
    Filed: September 5, 2016
    Date of Patent: May 21, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Steve Epstein, Avi Fruchter, Moshe Kravchik, Yaron Sella, Itay Harush
  • Patent number: 10291400
    Abstract: A communication device in embodiments is a quantum key distribution device connectable to another quantum key distribution device through a quantum communication channel to share an encryption key therebetween, and includes a common processing unit, one or more individual processing units, and a distribution unit. The common processing unit outputs intermediate data based on bit information obtained by transmitting or receiving sequence of photons with the another quantum key distribution device through the quantum communication channel. Each individual processing unit generates or provides the encryption key in accordance with the intermediate data. The distribution unit distributes the intermediate data that is output from the common processing unit to two or more distribution destination that include the individual processing units.
    Type: Grant
    Filed: September 16, 2016
    Date of Patent: May 14, 2019
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Yoshimichi Tanizawa
  • Patent number: 10291596
    Abstract: A system comprising a terminal and a server, wherein the terminal is installed in the system by the server being configured to: identify the terminal; generate key generation data, comprising at least one data seed; distribute the at least one seed to the terminal; generate key data and meta data based on said at least one seed and a function; store an identifier for the terminal along with the key data and the meta data for the terminal, wherein the terminal is arranged to receive the at least one seed from the server; generate key data and meta data based on said at least one seed and the same function; store the key data and the meta data, wherein the key data and the meta data stored in the terminal are the same as the key data and the meta data stored in the server.
    Type: Grant
    Filed: October 8, 2015
    Date of Patent: May 14, 2019
    Assignee: KELISEC AB
    Inventor: Elise Revell
  • Patent number: 10282534
    Abstract: A system for enabling data syncing between a host device and an electronic device includes a first port configured to be coupled to a first electronic device, a second port configured to be coupled to the host device, and a data sync switch coupled to the first port and the second port. The data sync switch is switchable between a first state, in which data communication between the electronic device and the host device is enabled, and a second state, in which data communication between the electronic device and the host device is disabled. The system also includes an authorization device configured to couple to an authorizing physical object and generate an output signal. The data sync switch is in one of the first state and the second state based on the output signal from the authorization device.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: May 7, 2019
    Assignee: ACCO Brands Corporation
    Inventors: Qiumin Li, Samson Lee
  • Patent number: 10277670
    Abstract: A transcoding service is described that is capable of transcoding or otherwise processing content, such as video, audio or multimedia content, by utilizing one or more pipelines. A pipeline can enable a user to submit transcoding jobs (or other processing jobs) into an available pipeline, where a transcoding service (or other such service) assigns one or more computing resources to process the jobs received to each pipeline. The transcoding service and the pipelines can be provided by at least one service provider (e.g., a cloud computing provider) or other such entity to a plurality of customers. A service provider can also provide the computing resources (e.g., servers, virtual machines, etc.) used to process the transcoding jobs from the pipelines.
    Type: Grant
    Filed: October 13, 2017
    Date of Patent: April 30, 2019
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Jonathan B. Corley, David Idris Alexander Sayed, Christopher Neil Hawes, Bradley Eugene Marshall, James J. Carrig, Jeffrey Paul Ramsden
  • Patent number: 10257185
    Abstract: A method is disclosed. The method includes transmitting by a computing device, an account creation request to a remote server computer. The method further includes automatically provisioning the computing device with an access token in response to receiving a request to create the account.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: April 9, 2019
    Assignee: Visa International Service Association
    Inventors: Erick Wong, Ansar Ansari, Parveen Bansal, William Thaw
  • Patent number: 10256978
    Abstract: Techniques and mechanisms described herein facilitate the encryption of content using content-based encryption keys. According to various embodiments, data stream may include one or more data chunks. A client machine may apply a hash function to a data chunk to determine a fingerprint value. A cryptographic protocol shared with a remote server may be applied to the fingerprint value to determine a data chunk encryption key. The data chunk encryption key may be used to encrypt the data chunk, and the encrypted data chunk may be sent to the remote server for storage.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: April 9, 2019
    Assignee: QUEST SOFTWARE INC.
    Inventors: Murali Bashyam, Tarun K. Tripathy
  • Patent number: 10256974
    Abstract: A cryptographic ASIC and method for enforcing a derivative key hierarchy for managing an information stream. A programming user provides a user passphrase that is used to generate a transform key and is then deleted. The transform key is inaccessibly, invisibly, and indelibly generated and stored in a one-time programmable memory with externally generated programming pulses during or after manufacture, without being reported out to the user who provided the user passphrase. A transform-enabled cryptographic circuit or method customized with the transform key processes a predetermined input message to obtain a predetermined output message indicating an identity of a particular information stream. Other input messages may also be processed, such as for verifying a blockchain, but replication requires knowledge of the transform key. Only a programming user with knowledge of the user passphrase is capable of creating an information stream, such as a blockchain.
    Type: Grant
    Filed: May 9, 2018
    Date of Patent: April 9, 2019
    Assignee: Blockchain ASICs LLC
    Inventor: Edward L. Rodriguez De Castro
  • Patent number: 10257189
    Abstract: System and methods for using secure isolated technology to prevent piracy and cheating on electronic devices. In some examples, an electronic device can use hardware based secure isolated technology to store a first portion of an application in computer memory, and store a second portion of the application in a hardware based secure isolated region of the computer memory, the second portion of the application including an encrypted portion and a plaintext portion The electronic device can further use the hardware based secure isolated technology to establish a secure encrypted communication channel with a server, send data to the server via the secure encrypted communication channel, receive a decryption key from the server via the secure encrypted communication channel, and decrypt encrypted portion using the decryption key. The electronic device can then execute the application using the first portion of the application and the second portion of the application.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: April 9, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Ling Tony Chen
  • Patent number: 10255135
    Abstract: Methods and apparatus for use in a dispersed storage network (DSN) to enable non-interactive information dispersal. In various examples, a computing device dispersed storage error encodes a data segment of a data object to produce a set of encoded data slices. Utilizing a secret key, the computing device encrypts an encoded data slice of the set of encoded data slices to produce an encrypted data slice. The computing device also encrypts the secret key, utilizing a public key of a storage unit of the DSN. The encrypted data slice and the encrypted secret key are combined by the computing device to create a package. A signature operation is performed on the package to generate a signed package, which is sent to the DSN storage unit. The signature operation can include generating a hash digest of the package and encrypting the hash digest utilizing a private key of the computing device.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jason K. Resch, Ramin Rouzbeh
  • Patent number: 10250561
    Abstract: A transmission apparatus transmits a plurality of second packets obtained from a plurality of first packets, wherein each of the plurality of first packets includes a header including a first field, and a payload, and includes first information stored in the first field, and wherein each of the plurality of second packets includes second information in the first field instead of the first information, and includes the first information inserted in the payload. A reception apparatus receives the plurality of second packets, deletes the first information from the payload of the received second packet and obtains data included in the payload of the received packet when third information stored in a memory is stored in the second field of a packet received by the reception unit.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: April 2, 2019
    Assignee: FUJITSU LIMITED
    Inventors: Yu Minakuchi, Hideyuki Matsuda
  • Patent number: 10237247
    Abstract: A convenient, easy to use ubiquitous secure communications capability can automatically encrypt and decrypt messages without requiring any special intermediating security component such as gateways, proxy servers or the like. Trusted/secure applications for the mobile workforce can significantly improve productivity and effectiveness while enhancing personal and organizational security and safety.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: March 19, 2019
    Assignee: Protected Mobility, LLC
    Inventors: William J. Marlow, Robert Cichielo, Emil Sturniolo, Paul Benware
  • Patent number: 10237352
    Abstract: Aspects of the subject matter described herein relate to selecting a source interface with which to establish a connection. In aspects, a profile for each network location a host has seen is maintained in a data store. The profile includes information about the network interfaces available to a source host at the network location. This information indicates, among other things, the reliability of each interface of the source host. Based on the profile, an interface is selected with which to establish a connection. If the interface is unsuccessful in establishing the connection, the interface is de-prioritized and another interface may be selected.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: March 19, 2019
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Deepak Bansal, Murari Sridharan, Narasimhan Agrahara Venkataramaiah
  • Patent number: 10237066
    Abstract: A scalable and efficient cryptographic architecture is provided for processing data using deeply-pipelined algorithms and circuitries. The architecture can be implemented as circuitry in a fixed logic device, or can be configured into a programmable integrated circuit device. The same top-level design may be used for different choices of data channels, processing depth, parallelism level, and/or system throughput. An encryption pipeline processing block performs rounds of processing upon a block of said data using an encryption process and receives a respective round encryption key for each round of processing. An encryption key pipeline block provides the respective round encryption key for each round of processing by selecting, for each round of processing, the respective round encryption key from at least a first round encryption key corresponding to a first channel and a second round encryption key corresponding to a second channel.
    Type: Grant
    Filed: April 8, 2014
    Date of Patent: March 19, 2019
    Assignee: ALTERA CORPORATION
    Inventors: Martin Langhammer, Shawn Nicholl, Cheng Wang
  • Patent number: 10225269
    Abstract: There are provided a method and an apparatus for detecting attacks and automatically generating attack signatures based on signature merging. A method for detecting attacks and automatically generating attack signatures based on signature merging includes detecting a character string matched to at least one previously stored compressed attack signature in an input packet received from a network, determining whether the character string detected in the primary attack detection is matched to at least one previously stored individual attack signature, and, if the detected character string is matched to the at least one previously stored individual attack signature, determining the input packet as an attack packet, and, if the detected character string is not matched, determining the input packet as a new attack signature.
    Type: Grant
    Filed: August 1, 2016
    Date of Patent: March 5, 2019
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventor: Sungwon Yi
  • Patent number: 10223524
    Abstract: Techniques for maintaining potentially compromised authentication information for a plurality of accounts may be provided. An individual piece of authentication information may be associated with one or more tags that indicate access rights with respect to requestors that also provide and maintain other potentially compromised authentication information. A subset of the potentially compromised authentication information may be determined based on the one or more tags in response to a request from a requestor for the potentially compromised authentication information. In an embodiment, the subset of the potentially compromised authentication information may be provided to the requestor.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: March 5, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: David James Kane-Parry, Darren Ernest Canavor, Jesper Mikael Johansson
  • Patent number: 10225262
    Abstract: Access level and security group information can be updated for a data instance without having to take down or recycle the instance. A data instance created in a data environment will have at least one default security group. Permissions can be applied to the default security group to limit access via the data environment. A control security group can be created in a control environment and associated with the default security group. Permissions can be applied and updated with respect to the control security group without modifying the default security group, such that the data instance does not need to be recycled or otherwise made unavailable. Requests to perform actions with respect to the control security groups are made via the control environment, while allowing native access to the data via the data environment.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: March 5, 2019
    Assignee: Amazon Technologies, Inc.
    Inventor: Grant Alexander MacDonald McAlister
  • Patent number: 10225077
    Abstract: A symmetric data encryption system configured to receive a data stream to be encoded; to relate segments of the data stream with a predetermined distortion-inducing amplitude of light to encrypt the data stream; to transmit the data stream; to decrypt the data stream by compensating for the value induced by the distortion-inducing amplitude of light; wherein the distortion-inducing amplitude of light relates to different wavelengths of light emitted by one or more of a plurality of light sources in a non-uniform manner so the effect of the distortion-inducing amplitude of light is difficult to predict, thereby providing obfuscation and encryption of the data stream.
    Type: Grant
    Filed: January 29, 2018
    Date of Patent: March 5, 2019
    Assignee: OPEN PORTAL ENTERPRISES (OPE)
    Inventors: Joshua Norman Smith, Robert Chad McCollum
  • Patent number: 10218731
    Abstract: Detecting cyber threat and malware, particularly zero-day malware is a major challenge for the security community. Signature-based methods of cyber threat and malware detection are unable to detect zero-day malware. In order to detect zero-day malware and cyber threat which may have more severe impacts, a system called Compromised Detection System (CDS) and a method thereof is disclosed. The CDS uses a sophisticated approach and method based on Machine Learning to detect anomalies on the network behavior. By such approach, CDS is able to detect unknown cyber threat and malware (aka zero day)since they will present a deviation from the normal behavior in the network.
    Type: Grant
    Filed: October 5, 2016
    Date of Patent: February 26, 2019
    Assignee: EFFICIENT PROTECTION INC.
    Inventors: Karim Ganame, Ahmed Techini
  • Patent number: 10210336
    Abstract: Preliminary program analysis of an executable may be performed. A security vulnerability level of a portion of the executable may be determined based on the preliminary program analysis. The security vulnerability level of the portion may be compared to a security vulnerability threshold. The precision of runtime monitoring of the portion may be tuned based on the comparison.
    Type: Grant
    Filed: March 29, 2016
    Date of Patent: February 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Paul Ionescu, Iosif V. Onut, Omer Tripp