Patents Examined by Gary S Gracia
  • Patent number: 10848472
    Abstract: A method includes determining, by a first wireless local area network (WLAN) controller, that a first access point (AP) is an edge AP when a first STA associates with the first AP, where the edge AP is an AP neighboring to another AP, and the other AP and the edge AP are respectively managed by different WLAN controllers, and sending, by the first WLAN controller, authentication data of the first STA to at least one WLAN controller.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: November 24, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Dongming Zhou
  • Patent number: 10846693
    Abstract: A method of facilitating the exchange of data between a user having a computing device, and a remote entity, where a first connection has been established between the user and the remote entity, and where the user has associated data exchange information with an application on the computing device, the data exchange information defining properties of the data to be exchanged between the user and the remote entity.
    Type: Grant
    Filed: January 2, 2018
    Date of Patent: November 24, 2020
    Assignee: Eckoh UK Limited
    Inventors: Cameron Peter Sutherland Ross, James Heath, Thomas Edward Briden, Ashley Burton, Paul Downs
  • Patent number: 10848322
    Abstract: A public key infrastructure (PKI) ecosystem includes a first organization computer system having a first processor, a first memory, and a first organization process including instructions that are (i) encoded in the first memory, and (ii) executable by the first processor. The ecosystem further includes a second organization computer system having a second processor and a second memory, a digital ledger, and domain name system security extensions (DNSSEC). When executed, the first instructions cause the first processor to create at least one public/private PKI keypair for a first domain name, in the DNSSEC, register the first domain name and create a certificate authority (CA), register the CA in the blockchain, using the CA, create a certificate for a first entity, register the certificate in the blockchain and/or the DNSSEC, and assert, to the second organization computer system, trust in the first entity based on the registered certificate.
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: November 24, 2020
    Assignee: Cable Television Laboratories, Inc
    Inventors: Darshak Thakore, Michael Glenn, Brian Alexander Scriber, Steven John Goeringer
  • Patent number: 10834090
    Abstract: Devices, systems, and methods of detecting whether an electronic device or computerized device or computer, is communicating with a computerized service or a trusted server directly and without an intermediary web-proxy, or indirectly by utilizing a proxy server or web-proxy. The system searches for particular characteristics or attributes, that characterize a proxy-based communication session or channel and that do not characterize a direct non-proxy-based communication session or channel; or conversely, the system searches for particular characteristics or attributes, that characterize a direct non-proxy-based communication session or channel and that do not characterize a proxy-based communication session or channel; and based on these characteristics, determines whether or not a proxy server exists and operates.
    Type: Grant
    Filed: November 6, 2019
    Date of Patent: November 10, 2020
    Assignee: BIOCATCH LTD.
    Inventors: Avi Turgeman, Yaron Lehmann, Yaron Azizi, Itai Novick
  • Patent number: 10834107
    Abstract: A system and method for automatically analyzing an object for malware is described. Operating one or more virtual machines, the system and method provide an analysis environment variation framework to provide a more robust analysis of an object for malware. The multi-application, multi-plugin processing framework is configured within a virtual machine, where the framework for configuring a plurality of processes for analyzing the object for malware and each of plurality of processes is configured with a different application and plug-in combination selected based in part on a type of object being analyzed and operating concurrently with each other.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: November 10, 2020
    Assignee: FireEye, Inc.
    Inventors: Sushant Paithane, Sai Omkar Vashisht, Yasir Khalid, Alexandre Pilipenko
  • Patent number: 10824742
    Abstract: Methods and systems are provided for moving customer data relating to a service from the service to a customer-controlled secure storage upon deletion of a customer account from the service. Exemplary methods and systems are provided for moving the customer data to a location which is under the control or under ownership of the customer in a secure and automated fashion. Additionally, methods and systems are provided for establishing a client/service to service relationship.
    Type: Grant
    Filed: March 28, 2018
    Date of Patent: November 3, 2020
    Assignee: Mitel Cloud Services, Inc.
    Inventor: Terry Tam
  • Patent number: 10812592
    Abstract: A system includes a processor configured to approve an application vehicular-system-access request based on a temporary key and device ID transmitted with the access request matching a stored temporary key and device ID pair previously stored by the processor. This can assist in ensuring that only validated devices and/or applications are requesting access to a vehicle system.
    Type: Grant
    Filed: April 11, 2019
    Date of Patent: October 20, 2020
    Assignee: Ford Global Technologies, LLC
    Inventors: Omar Makke, Oleg Yurievitch Gusikhin
  • Patent number: 10805090
    Abstract: Systems and methods are described for transferring and verifying the transfer of an asset from a limited-participant side chain back to a main blockchain. A public difference, associated with a secret difference, is determined as a difference between a main blockchain address and the public offline key of a transferring participant. The public difference is used, along with each participant public online key, to generate a ring signature key for each participant. A ring signature is then generated over the ring signature keys, based on the public online keys and a set of uniform random scalars (each associated with a participant public online key). The main blockchain address, a first coefficient from the ring signature, and the uniform random scalars are then published. When verified, the published ring signature shows that the transferring participant has control of the main blockchain address and the private offline key.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: October 13, 2020
    Assignee: Blockstream Corporation
    Inventors: Andrew Poelstra, Glenn Willen, Gregory Maxwell, Gregory Sanders, Jonas Nick, Matt Corollo
  • Patent number: 10798079
    Abstract: A vehicle that includes one or more controllers coupled to at least one and/or one or more wireless transceivers and antennas. The controllers are configured to enable enhanced, automated provisioning of network hardware of the vehicle with the settings and parameters of required wireless network credentials, by requesting, retrieving, receiving, and utilizing such credentials received from a mobile device. The mobile device includes one or more sets of credentials that are compatible for use with the network hardware configuration or configurations of the controllers, and communications, and network hardware of vehicle. The controller(s) are further configured to store such credentials locally in the vehicle, to request updates, to detect and identify wireless networks identified by such credentials when the wireless networks are in-range of the vehicle network hardware, and to automatically provision and connect the network hardware of vehicle to the detected and identified wireless networks.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: October 6, 2020
    Assignee: Ford Global Technologies, LLC
    Inventors: Allan Miramonti, Aziz Makkiya, Rajesh Balaji Vijayan, Basavaraj Tonshal, Panduranga Kondoju
  • Patent number: 10785545
    Abstract: Embodiments of reversible systems and methods for fast, secure and efficient transmission, storage, and protection of digital multimedia are disclosed. The embodiments may have the ability to simultaneously compress and encrypt digital data in order to concurrently reduce data size and prevent reconstruction without the proper encryption key. Embodiments of a method may include pre-processing data to optimize the size of data segments to be compressed, transforming the data for improving the compressibility of the before-mentioned data segments, processing the data sequentially to generate predictive statistical models, encoding the data for simultaneously encrypting and compressing data segments using a keystream, and increasing both the compression ratio and security of these encoding processes using a block cipher. Embodiments of these methods may be suitable for use on both encrypted and unencrypted media.
    Type: Grant
    Filed: April 22, 2013
    Date of Patent: September 22, 2020
    Assignee: The Board of Regents of The University of Texas System
    Inventors: Richard E. L. Metzler, Sos S. Agaian
  • Patent number: 10785218
    Abstract: The present disclosure provides an authorization authentication method, apparatus and system.
    Type: Grant
    Filed: March 6, 2017
    Date of Patent: September 22, 2020
    Assignee: TENDYRON CORPORATION
    Inventor: Ming Li
  • Patent number: 10778715
    Abstract: Disclosed are systems and methods for improving interactions with and between computers in content generating, searching, hosting and/or providing systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide systems and methods for automatic peer-to-peer level of activity information maintenance and sharing without centralization. The disclosed systems and methods a peer-to-peer level of activity sharing mechanism involving sharing level of activity counter update instructions for use in updating a number of level of activity counters maintained locally by a peer receiving the instruction(s). A peer can use its local level of activity counters in determining whether impose a throttling mechanism.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: September 15, 2020
    Assignee: OATH INC.
    Inventors: Matti Oikarinen, Mika Mannermaa, Atte Lahtiranta, Taneli Mielikainen
  • Patent number: 10778664
    Abstract: A software asset management service obtains software asset information from various computer systems of a service provided by a service provider and available to customers of the service provider. Based on the obtained software asset information from the computer systems, the service updates a database to specify this information. The service then receives a request to generate a report of software assets for computing resources associated with a customer of a service provider. This may cause the service to access the database to obtain the software asset information for the specified computing resources. Once the service has obtained the necessary information from the database, the service generates the requested report.
    Type: Grant
    Filed: May 14, 2015
    Date of Patent: September 15, 2020
    Assignee: Amazon Technologies, Inc.
    Inventor: Owen Seamus Sullivan
  • Patent number: 10762198
    Abstract: An artificial intelligence system and method securely stores all executable binary object code of a client/user's computer-based software applications in a separate and impenetrable Sealed-off Central Processing Unit (SCPU). The SCPU is shielded from any external communication interface by having no input ports or devices able to receive external transmissions. The SCPU executes four primary functions: 1. constantly reads all the primary object code in the client/user's application system; 2. simultaneously compares and matches the application system executable object code to the shielded executable object code copy stored in the SCPU; 3. permanently blocks the unmatched object code section(s) pending internal IT security team review of the unmatched object code; and, 4. notifies the client/user's authorized IT security authority of the blocked object code section(s) and submits to them a copy of the potentially invalid object code.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: September 1, 2020
    Inventor: Richard Dea
  • Patent number: 10762201
    Abstract: Provided is an intrusion detection technique configured to: obtain kernel-filter criteria indicative of which network traffic is to be deemed potentially malicious, determine that a network packet is resident in a networking stack, access at least part of the network packet, apply the kernel-filter criteria to the at least part of the network packet and, based on applying the kernel-filter criteria, determining that the network packet is potentially malicious, associate the network packet with an identifier of an application executing in userspace of the operating system and to which or from which the network packet is sent, and report the network packet in association with the identifier of the application to an intrusion-detection agent executing in userspace of the operating system of the host computing device, the intrusion-detection agent being different from the application to which or from which the network packet is sent.
    Type: Grant
    Filed: April 20, 2018
    Date of Patent: September 1, 2020
    Assignee: Level Effect LLC
    Inventors: Robert Julian Noeth, Ernest Gregory Ake
  • Patent number: 10754958
    Abstract: The VULNERABILITY RISK MITIGATION PLATFORM APPARATUSES, METHODS AND SYSTEMS (“VRMP”) transforms vulnerability risk info request, malware correlation analysis request, social media mentions analysis request, and, asset risk analysis request inputs via VRMP components into vulnerability risk info, CVE data, social media mentions risk score, and, asset risk score outputs. A vulnerability risk info request for a network environment may be obtained. A security vulnerability affecting assets associated with the network environment may be determined. A base vulnerability risk score for the security vulnerability may be determined and augmented based on calculated public exploits availability score, malware correlation score, social media mentions risk score, and overall asset risk score to determine an augmented vulnerability risk score. Vulnerability risk information regarding the security vulnerability may be provided in accordance with the augmented vulnerability risk score.
    Type: Grant
    Filed: September 19, 2017
    Date of Patent: August 25, 2020
    Assignee: NopSec Inc.
    Inventor: Michelangelo Sidagni
  • Patent number: 10747305
    Abstract: A method for confirming identity of a user of a mobile electronic device, the method including: receiving touch data from a touch-screen of the mobile electronic device; receiving acceleration data from an accelerometer of the mobile electronic device; correlating between the touch data and the acceleration data; based on the correlating, generating a user-specific trait indicative of said user. The method further includes storing a reference value of the user-specific trait, indicative of said user; in a subsequent usage session of the mobile electronic device, generating a current value of the user-specific trait correlating between touch data and acceleration data; and based on a comparison between the current value of the user-specific trait and the reference value of the user-specific trait, determining whether or not a current user of the mobile electronic device is an authorized user of the mobile electronic device.
    Type: Grant
    Filed: May 19, 2019
    Date of Patent: August 18, 2020
    Assignee: BIOCATCH LTD.
    Inventor: Avi Turgeman
  • Patent number: 10742408
    Abstract: Many-to-many cryptographic systems and methods are disclosed, including numerous industry applications. Embodiments of the present invention can generate and regenerate the same symmetric key from a random token. The many-to-many cryptographic systems and methods include two or more cryptographic modules being in communication with each other and may be located at different physical locations. The cryptographic modules are configured to encrypt and/or decrypt data received from other cryptographic modules and to provide encrypted and/or decrypted data to other cryptographic modules. Each cryptographic module includes a key generator configured to use two or more inputs to reproducibly generate the symmetric key and a cryptographic engine configured to use the symmetric key for encrypting and decrypting data. Corresponding methods are also provided.
    Type: Grant
    Filed: February 26, 2018
    Date of Patent: August 11, 2020
    Assignee: CORD3 INNOVATION INC.
    Inventors: Glen Arthur Henderson, Brent Eric Nordin, Daniel Marcel Joseph Seguin, Prateek Srivastava, Ian Hugh Curry
  • Patent number: 10740483
    Abstract: A data model is defined to describe objects. Attributes from the data model are associated with providing authorization right for executing actions on object instances of the objects. A hierarchy of object groups is declared. Objects group collections are defined on top of the hierarchy. A vocabulary including definitions of attributes of objects and including definitions of assignments of objects to object groups is created. The vocabulary is related to determining authorization rights for executing actions based on attributes and hierarchy organization of objects. A capability to determine authorization to perform an action by a user on a set of objects is defined based on the vocabulary. When a request for performing an action by a user on object instances is received, a filtering expression based on the capability is generated to be included in a where clause of a query.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: August 11, 2020
    Assignee: SAP SE
    Inventors: Michael Aakolk, Bernhard Drabant, Andrea Waldi
  • Patent number: 10742668
    Abstract: A network attack pattern determination apparatus, method, and non-transitory computer readable storage medium thereof are provided. The apparatus is stored with several attack patterns and access records. Each access record includes a network address, time stamp, and access content. Each attack pattern corresponds to at least one attack access relation. Each attack access relation is defined by a network address and access content. The apparatus retrieves several attack records according to at least one attack address. The network address of each attack record is one of the attack address(s). The apparatus divides the attack records into several groups according to the time stamps and performs the following operations for each group: (a) creating at least one access relation for each attack address included in the group and (b) determining that the group corresponds to one of the attack patterns according to the at least one access relation of the group.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: August 11, 2020
    Assignee: Institute For Information Industry
    Inventors: Chia-Min Lai, Ching-Hao Mao, Chih-Hung Hsieh, Te-En Wei, Chi-Ping Lai