Patents Examined by Forrest L Carey
  • Patent number: 10728248
    Abstract: A device may determine a resource identifier for accessing a segment of streaming media content. The device may determine that a signature associated with the resource identifier is not stored in memory. The signature may be generated based on a character string of the resource identifier. The device may request validation of the resource identifier based on determining that the signature is not in memory. The device may receive the signature associated with the resource identifier based on requesting validation. The device may store the signature based on receiving the signature. The device may request the segment of streaming media content using the resource identifier and the signature, stored in memory, to receive toll-free access to the segment of streaming media content.
    Type: Grant
    Filed: July 30, 2015
    Date of Patent: July 28, 2020
    Assignee: Verizon Patent and Licensing, Inc.
    Inventors: Jian Huang, Susan Kelly, Fred Scheer, Chunyan Du, Gong Zhang, Fnu Bongu Huma Shankar Rao
  • Patent number: 10700849
    Abstract: A method of implementing a keyed cryptographic operation using a plurality of basic blocks, includes: generating a balanced encoding function; applying the balanced encoding function to the output of a first basic block; and applying an inverse of the encoding function to the input of a second basic block, wherein the second basic block receives the encoded output of first basic block as an input.
    Type: Grant
    Filed: July 30, 2015
    Date of Patent: June 30, 2020
    Assignee: NXP B.V.
    Inventors: Wil Michiels, Philippe Teuwen
  • Patent number: 10671724
    Abstract: Encryption operations may be performed by a computer system for various reasons. It is often unclear, however, whether one of the many processes executing on a system is performing encryption. Encryption can be computationally expensive, and a process that engages in a large amount of encryption may represent a performance bottleneck for the system, limiting the ability of the system to do additional work (or weakening it to a Denial of Service attack). Further, while encryption is used in many legitimate contexts, it is also used by malware in certain scenarios to communicate with a remote attacker (e.g. command and control software) or used as part of ransomware. Thus, detecting whether a process is performing encryption can be important to identifying a performance bottleneck or uncovering malware. By monitoring a process and examining certain aspects of its activity, however, encryption operations can be detected and further remedial actions can be taken if needed.
    Type: Grant
    Filed: October 4, 2016
    Date of Patent: June 2, 2020
    Assignee: PAYPAL, INC.
    Inventor: Shlomi Boutnaru
  • Patent number: 10642962
    Abstract: For securing content accessed from storage device, the storage device is associated with a licensee identifier. The licensee identifier is provided as input to an algorithm that generates, based on the identifier, a determinate set of instructions for a computer, for example, source code in a coding language, compiled binary code, or pseudo code that is capable of being translated into source code. The code, once compiled to machine-usable form, can be executed by a processor to perform a permutation operation that is unique to the licensee identifier. The output of the permutation operation can be used for protecting data provided by the storage device.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: May 5, 2020
    Assignee: Western Digital Technologies, Inc.
    Inventors: Carlos Frederico Amaral Cid, Matthew Warren Dodd, David L. Blankenbeckler, Joseph Edward Halpern, III, Ian E. Harvey, Christopher R. Odgers
  • Patent number: 10621340
    Abstract: A technique allows for a hybrid hypervisor-assisted security model that monitors and protects an operating system from rootkits or other malware through use of monitoring policies for the operating system (OS). The OS monitoring policies may be separated into rules that can be enforced using an in-guest agent running in a monitored guest OS domain and an out-of-guest agent running in a privileged/monitoring guest OS domain. Embodiments may use virtualization technologies including permissions and policies in one or more page tables (and virtualization exceptions (# VE) to avoid virtual machine (VM) exits during runtime events and thereby, avoid context switching into a hypervisor. An embodiment includes configuring the in-guest agent in a monitored OS such that hardware events can be switched to lightweight events and can be dynamically switched to complex processing in the privileged OS domain only when requested.
    Type: Grant
    Filed: September 1, 2016
    Date of Patent: April 14, 2020
    Assignee: Intel Corporation
    Inventors: Edmund H. White, Ravi L. Sahita
  • Patent number: 10616205
    Abstract: A mobile computing device of a user transmits a digital certificate to a server computing device over a non-networking connection established with the server computing device. The digital certificate identifies the user, a particular server computing device, a validity period in which the digital certificate is valid, and a list of actions that the user is permitted to perform on the particular server computing device during the validity period. The server computing device authenticates the digital certificate, such as by determining whether a current time is within the validity period and whether the particular server computing device is the server computing device. When authentication is successful, the user can perform any action of the list of actions, including an action to power off the service computing device. The non-networking connection is such that the user is not provided a user account and a password to access the server computing device.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: April 7, 2020
    Assignee: LENOVO Enterprise Solutions (Singapore) PTE. LTD
    Inventors: Antonio Abbondanzio, Gregory B. Pruett
  • Patent number: 10599587
    Abstract: Various embodiments are described that relate to data set communication. Security information, such as a key list, can be generated and transmitted from a first node to a second node by way of a secure high throughput communication channel with high latency. The key list can be used to encrypt the data set and the encrypted data set can be sent to the second node by way of low latency signaling. The second node can decrypt the encrypted data set with the key list and perform a function that is indicated by the data set.
    Type: Grant
    Filed: November 29, 2016
    Date of Patent: March 24, 2020
    Assignee: The Government of the United States, as represented by the Secretary of the Army
    Inventors: Jason Dirner, Benjamin Peddicord
  • Patent number: 10567183
    Abstract: A system and method of conference messaging between Universal Plug and Play (UPnP) telephony devices and Wide Area Network (WAN) devices is where a conference messaging session with WAN devices is initiated by at least one Telephony Control Point (TCP) via a session request which includes session information, media capabilities of at least one TCP, a list of WAN devices, and a subject of the conference messaging session. The conference messaging session is then established between the at least one TCP and the WAN devices by a Telephony Server (TS) in an UPnP telephony based home network based on the session request.
    Type: Grant
    Filed: January 31, 2011
    Date of Patent: February 18, 2020
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Mayuresh Madhukar Patil, Je-Young Maeng, Mahfuzur Rahman
  • Patent number: 10547647
    Abstract: A system and method for identifying distributed attacks, such as, but not limited to, distributed denial of service attacks and botnet attacks, in a first network serviced by a first carrier and configured to alert a second network serviced by a second carrier that is different from the first carrier is disclosed. Once an attack has been identified, an attack alert is generated and provided to the second network or other aspects of the first network, or both. The attack alerts may be distributed dynamically with the second network via diameter based security protocol Rs. Such system and method may mitigate distributed malicious attacks by sharing destination internet protocol and bad international mobile subscriber identity information across carriers.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: January 28, 2020
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Gokul Singaraju, Ashutosh Dutta, Thusitha Jayawardena, Christopher Van Wart
  • Patent number: 10523435
    Abstract: By implementing a mutable certificates approach, a server to which a digital certificate has been issued may update one or more certificate fields without the need for a new certificate or other intervention from the issuing certificate authority. A certificate authority uses extensions to identify fields that a server may update, and to identify a set or range of allowable values for those fields. A server may use the extensions to identify one or more fields to be updated, and the values to which those fields should be updated. The server may sign those field values with its private key. A client, upon receiving a digital certificate from a server with fields for updating, validates the field values using the server's public key, and then proceeds to update the certificate field values.
    Type: Grant
    Filed: July 1, 2016
    Date of Patent: December 31, 2019
    Assignee: DigiCert, Inc.
    Inventor: Jared Pilcher
  • Patent number: 10521614
    Abstract: An electronic circuit is disclosed which has a process subsystem including a compliance circuit, a microprocessor, an interrupt controller, and a bridge. The electronic circuit also has a control block including a clock manager, a reset manager, a power manager, and a system control. The electronic circuit includes a crypto-block including a master sub-block, a slave sub-block, a direct memory access circuit, a packet buffer, and a crypto-engine. An interconnect communicatively connects the process subsystem to the control block and the crypto-block. A communications system is disclosed in which the electronic circuit is housed in one or more personal computing devices. A remote disablement system may be communicatively connected to the electronic circuit and configured to disable the electronic circuit. An emergency communications system may be communicatively connected to the electronic circuit to track and identify the location of each personal computing device.
    Type: Grant
    Filed: February 4, 2016
    Date of Patent: December 31, 2019
    Assignee: GBT Technologies, Inc.
    Inventors: Danny Rittman, Aliza Schnapp
  • Patent number: 10515192
    Abstract: Processing in an asymmetrically distributed file system may include storing first data representative of the content of the files in a file system volume among a plurality of storage nodes. Second data representative of attributes of the files in the file system volume may be stored in only one of the storage nodes. Time-limited leases allow clients direct access to the plurality of storage node in order to access portions of the file system volume. The time-limited leases may be provided to client lessors. Snapshots of the file system volume may be generated after sending a revocation to the client lessors to revoke time-limited leases provided to the client lessors and having received the acknowledgements of the revocations or after the leases have expired for non-responding lessors, to ensure that changes are not made to the file system volume during snapshot processing.
    Type: Grant
    Filed: February 2, 2016
    Date of Patent: December 24, 2019
    Assignee: VMware, Inc.
    Inventors: Wenguang Wang, Luke Lu
  • Patent number: 10484345
    Abstract: Embodiments are directed to methods, apparatuses, computer readable media and systems for authenticating a user on a user device across multiple mobile applications. The identity of the user is validated by encoding and subsequently validating cryptographically encrypted data in a shared data store accessible by the mobile applications tied to the same entity. Specifically, the application leverages the authentication process of a trusted mobile application (e.g. a banking mobile application) to authenticate the same user on a untrusted mobile application (e.g. a merchant mobile application).
    Type: Grant
    Filed: July 30, 2015
    Date of Patent: November 19, 2019
    Assignee: Visa International Service Association
    Inventors: Vishwanath Shastry, Shalini Mayor
  • Patent number: 10467096
    Abstract: A first encoded data slice is received for storage by a DST execution unit from a first vault. A first encryption key corresponding to the first encoded data slice is generated, and a first encrypted data slice is generated by utilizing the first encryption key. A second encoded data slice for second storage by the DST execution unit from a second vault, a second encryption key corresponding the second encoded data slice is generated, and a second encrypted data slice is generated by utilizing the second encryption key. The first encrypted data slice and the second encrypted data slice are stored in a file of a memory of the DST execution unit, where the file and the memory are common to the first encrypted data slice and the second encrypted data slice.
    Type: Grant
    Filed: May 2, 2016
    Date of Patent: November 5, 2019
    Assignee: PURE STORAGE, INC.
    Inventor: Jason K. Resch
  • Patent number: 10462137
    Abstract: In one embodiment, a system and method are disclosed for receiving a request for authorization to commission a target device based, at least in part, on a plurality of requested commissioning actions; determining whether each of the requested commissioning actions is authorized; sending a commissioning authorization, which includes information identifying the one or more authorized commissioning actions; receiving a commissioning complete confirmation message, which includes information identifying one or more completed commissioning actions; validating the commissioning complete confirmation message, in order to ensure that each of the completed actions had been previously authorized; and if all of the completed commissioning actions were previously authorized, sending an acknowledgement message.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: October 29, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Xuechen Yang, Nancy Cam-Winget
  • Patent number: 10425432
    Abstract: Methods and apparatus are provided for detecting suspicious network activity, such as in an enterprise network. An exemplary method comprises obtaining network event data for a plurality of user-server communications for a given user, determining a number of distinct servers the user communicated with during a predefined time window; determining a number of distinct servers the user failed in authenticating to during the predefined time window; and assigning a risk score to the user based on the number of distinct servers the user communicated with and the number of distinct servers the user failed in authenticating to during the predefined time window. Generally, the risk score provides a measure of an anomalousness of the user communicating with the number of servers during the predefined time window. An absolute score is optionally assigned based on an evaluation of the number of distinct servers the user communicated with during the predefined time window relative to a predefined threshold number.
    Type: Grant
    Filed: June 24, 2016
    Date of Patent: September 24, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Kineret Raviv, Uri Fleyder, Eyal Kolman, Ofri Mann
  • Patent number: 10409982
    Abstract: According to some embodiments, a proxy server comprises one or more processors operable to establish communication with a secure client application of a device. The client is configured with a partition that contains data received from the proxy server within the secure application. If the client passes authentication, the server communicates preview information to the client previewing files that the server received from a business server on behalf of the client. The client requests a selected file. The server renders the selected file into a first portion and a second portion based on the immediate display capabilities of the client. The server communicates the first portion, determines that a trigger point was reached, and then communicates the second portion in response to the trigger point being reached. The client is configured to delete the first portion and the second portion in response to a completion event.
    Type: Grant
    Filed: July 18, 2012
    Date of Patent: September 10, 2019
    Assignee: ZixCorp Systems, Inc.
    Inventors: Nigel Paul Johnson, Dorwin T. Shields, Jr., Bryan Adam Joyner
  • Patent number: 10387668
    Abstract: Embodiments provided in this disclosure include a method, computer program product, and system for protecting sensitive data in a processing system comprising a plurality of processor cores. The method includes designating at least one processor core for processing sensitive data, and during a dump event, capturing data from each of the plurality of processor cores except the designated processor core to prevent unauthorized access to sensitive data.
    Type: Grant
    Filed: July 8, 2014
    Date of Patent: August 20, 2019
    Assignee: International Business Machines Corporation
    Inventors: Corville O. Allen, Lee N. Helgeson, Russel L. Young
  • Patent number: 10372925
    Abstract: Embodiments provided in this disclosure include a method, computer program product, and system for protecting sensitive data in a processing system comprising a plurality of processor cores. The method includes designating at least one processor core for processing sensitive data, and during a dump event, capturing data from each of the plurality of processor cores except the designated processor core to prevent unauthorized access to sensitive data.
    Type: Grant
    Filed: December 11, 2014
    Date of Patent: August 6, 2019
    Assignee: International Business Machines Corporation
    Inventors: Corville O. Allen, Lee N. Helgeson, Russel L. Young
  • Patent number: 10362033
    Abstract: An application executed on a first device presents a user interface on a device display. The application is associated with a validation system used by the device. Based on receiving a first user input, the application controls the first device to scan, using a first communication protocol, for other devices that are located within a first communication range of the first device. Based on the scan, the application discovers a second device that is located within the first communication range of the first device. The application receives, from the second device, an identification information that uniquely identifies a user associated with the second device on the validation system. The application validates the identification information by communicating with a validation server. Based on validating the identification information, the application displays an indication that the second device associated with the user is located within the first communication range of the first device.
    Type: Grant
    Filed: January 27, 2015
    Date of Patent: July 23, 2019
    Assignee: MicroStrategy Incorporated
    Inventors: Michael J. Saylor, Peng Xiao, Siamak Ziraknejad, Diego Valenzuela, Feng Xia