Patents Examined by Hadi Armouche
  • Patent number: 9787709
    Abstract: In one embodiment, a system for the realization of operational risk in a network includes an interface to receive a change request to update a network application, the network application utilizes a network device. The system may then use a processor communicatively coupled to the interface to generate a change risk score associated with the change request, wherein the change risk score includes a service tier risk score, a time risk score, a day risk score, a security risk score, and a mobile device risk score. The processor may determine whether the change risk score is within a high-risk level, and if so, implement a change counter measure.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: October 10, 2017
    Assignee: Bank of America Corporation
    Inventors: Jeffrey De Wayne Doubleday, Alberto Ramos, Darryl Alan Sansbury, Michael Werner Eagen Spalding, Steven Younger
  • Patent number: 9781147
    Abstract: Systems and methods for managing a data incident are provided herein. Exemplary methods may include providing an external entity interface that receives external entity information including a contract between a first party and at least one additional party, notification obligations that specify when the first party or the at least one additional party notifies entities that a data incident has occurred, and properties that trigger an assessment of the notification obligations. When an incident occurs, an assessment is completed and the results thereof are displayed on a risk assessment guidance interface.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: October 3, 2017
    Assignee: RADAR, Inc.
    Inventors: Mahmood Sher-Jan, Susan M. Rook, Greg L. Kotka, Andrew Migliore, Travis Cannon, Billie Cleek, Nicholas J Church, David J DeAngelis
  • Patent number: 9781140
    Abstract: Methods, systems, and computer program products for providing high-yielding detection of remote abusive content are disclosed. A computer-implemented method may include generating a graphical user interface allowing users to submit a web link for analysis to determine whether the web link is associated with malicious content, receiving the web link from the user via the graphical user interface, sending the web link to a plurality of distributed server machines to allow each of the distributed server machines to test the web link, generating a plurality of test user profiles to test the web link, testing the web link by each of the distributed server machines using one or more of the test user profiles, receiving a test result for the web link from each of the distributed server machines, and displaying a report comprising the test results for the web link to the user via the graphical user interface.
    Type: Grant
    Filed: August 17, 2015
    Date of Patent: October 3, 2017
    Assignee: PAYPAL, INC.
    Inventors: Bradley Wardman, Blake Butler
  • Patent number: 9781601
    Abstract: The disclosed computer-implemented method for detecting potentially illegitimate wireless access points may include (1) determining that a computing device has established a connection with a wireless access point that resembles a known wireless access point, (2) collecting a set of network details related to a route from the computing device to a network resource via the wireless access point, (3) identifying a previously collected set of network details related to a route from the computing device to the network resource via the known wireless access point, (4) determining that a portion of the set of network details related to the route via the wireless access point does not match the set of network details related to the route via the known wireless access point, and then (5) determining that the wireless access point is potentially illegitimate.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: October 3, 2017
    Assignee: Symantec Corporation
    Inventor: Ankit Kurani
  • Patent number: 9779264
    Abstract: Disclosed is a program for security management in a database, which is stored in a computer readable medium to allow a computer to perform steps including: reading one or more data encrypted at a column level from a persistent storage medium or a memory; decrypting one or more data encrypted at the column level to generate one or more decrypted data; generating an index table based on the one or more generated decrypted data; and performing an operation of encrypting the generated index table at a block level.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: October 3, 2017
    Assignee: TmaxData Co., Ltd.
    Inventors: Jeong Il Yoon, Sang Young Park
  • Patent number: 9774572
    Abstract: Techniques are disclosed relating to protecting sensitive data in references to network resources. In some embodiments, a host system receives a request for a stored resource, where a first portion of the request is encrypted by a client device using a particular encryption technique and a second portion of the request is not encrypted using the particular encryption technique and where the first portion of the request includes a reference to the resource. In some embodiments, the host decrypts the reference to the resource and provides the resource to the requesting device based on the decrypted reference.
    Type: Grant
    Filed: May 11, 2015
    Date of Patent: September 26, 2017
    Assignee: salesforce.com, inc.
    Inventors: Paul Anthony Mason, Harsimranjit Singh Chabbewal
  • Patent number: 9773117
    Abstract: Reducing risk of data loss by automatically background scanning data to detect a plurality of candidate sensitive data items. For at least some of those candidate sensitive data items that are deemed not to concretely classified as sensitive, a dissolvable encryption is applied to the data item to at least temporarily protect the data item. When the user requests access to the data item, the system determines that the data item has been dissolvably encrypted and that the user is authorized to define the sensitivity of the data item. In response, the user is allowed to direct the system as to whether the data item is to be concretely encrypted (such as if the user was to confirm the data item as sensitive), or whether the dissolvable encryption of the data item is to be dissolved (such as if the user was to confirm the data item as not sensitive).
    Type: Grant
    Filed: June 4, 2014
    Date of Patent: September 26, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Daniel Plastina
  • Patent number: 9774632
    Abstract: A system and method are provided for having a device in a communication system update an operational policy for the device by encoding a policy update in a virtual machine language used by a virtual machine on the device, having the policy update signed by a trusted entity, and sending a message comprising the signed policy update to the device to enable the device to implement the policy update using the virtual machine on the device. A system and method are also provided for updating an operational policy on a device in a communication system by receiving, at the device, a message comprising a signed policy update that has been signed by a trusted entity, the policy update being encoded in a virtual machine language used by a virtual machine on the device, verifying the signed policy update, and implementing the policy update using the virtual machine on the device when the policy update is verified.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: September 26, 2017
    Assignee: ETAS Embedded Systems Canada Inc.
    Inventors: Robert Philip Gallant, Robert John Lambert
  • Patent number: 9773112
    Abstract: According to one embodiment, a computerized method comprises, accessing information associated with one or more observed events, wherein one or more of the observed events constitutes an anomalous behavior; accessing a reference model based on a first plurality of events, the reference model comprises a first event of the first plurality of events, a second event of the first plurality of events and a relationship that identifies that the second event of the first plurality of events is based on the first event of the first plurality of events, wherein at least one of the first event and the second event constitutes an anomalous behavior; and comparing the information associated with the one or more observed events with the reference model to determine whether at least one observed event of the one or more observed events matches at least one of the first event of the first plurality of events or the second event of the first plurality of events that constitutes the anomalous behavior is provided.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: September 26, 2017
    Assignee: FireEye, Inc.
    Inventors: Hirendra Rathor, Kaushal Dalal
  • Patent number: 9775024
    Abstract: The present invention Includes using an embedded SIM (eSIM) associated with a newly-opened mobile network operator (MNO) system and a receiving MNO system, the method performs the steps of: generating a security domain (SD) for a receiving MNO on the basis of a request from the newly-opened MNO system; injecting a prior SD key value; installing a secure applet for key generation and secure arithmetic operations, injecting a new SD key value on the basis of a request from the receiving MNO, and transmitting only a public key to the receiving MNO system after generating key pairs for the receiving MNO; and decoding a receiving MNO profile with a private key corresponding to the public key after receiving the receiving MNO profile from the receiving MNO system or the newly-opened MNO system.
    Type: Grant
    Filed: July 6, 2012
    Date of Patent: September 26, 2017
    Assignee: KT Corporation
    Inventors: Jaemin Park, Jinhyoung Lee, Kwangwuk Lee
  • Patent number: 9768961
    Abstract: A method and apparatus including units configured to send a request from a first network entity to a user equipment for an identifier and receive a message indicating that a public key is required from the user equipment by the first network entity. The method and apparatus also includes units configured to send, by the first network entity, the public key to the user equipment and receive an encrypted identifier by the first network entity, wherein upon authenticating the public key, the user equipment encrypts at least part of the identifier using the public key, thereby enabling further processing between the network entity and the user equipment.
    Type: Grant
    Filed: November 20, 2012
    Date of Patent: September 19, 2017
    Assignee: Nokia Technologies Oy
    Inventors: Silke Holtmanns, Dan Forsberg
  • Patent number: 9769122
    Abstract: An online system receives from a third-party application on a client device, an anonymous login request to anonymously log a user of the online system into a third-party system associated with the third-party application. Responsive to receiving the anonymous login request, the online system generates a permissions user interface (UI) that provides an interface component including an option for the user to anonymously log into the third-party system using the user's login information for the online system. The online system provides the permissions UI to the client device, and receives permissions information from the client device. The online system generates an anonymous identifier that allows the user to login to the third-party system. The online system provides the anonymous identifier to the third-party application to allow anonymous login of the user into the third-party system in accordance with the permissions information.
    Type: Grant
    Filed: August 28, 2014
    Date of Patent: September 19, 2017
    Assignee: Facebook, Inc.
    Inventors: Caitlin Rothrock Winner, James J. Yu, Tirunelveli R. Vishwanath, Christophe Marcel Rene Tauziet, David Eitan Poll, Mark Ginga Misawa Duppenthaler, Ling Bao
  • Patent number: 9762616
    Abstract: This disclosure provides the ability for a cloud application to specify its security requirements, the ability to have those requirements evaluated, e.g., against a specific cloud deployment environment, and the ability to enable the application to control a cloud-based security assurance service to provision additional security technology in the cloud to support deployment (or re-deployment elsewhere) of the application if the environment does not have the necessary topology and security resources deployed. To this end, the application queries the service by passing a set of application-based security rights. If the security capabilities provided by the security assurance service are sufficient or better than the application's security rights, the application functions normally. If, however, the security environment established by the security assurance service is insufficient for the application, the application is afforded one or more remediation options, e.g.
    Type: Grant
    Filed: August 8, 2015
    Date of Patent: September 12, 2017
    Assignee: International Business Machines Corporation
    Inventors: Nataraj Nagaratnam, Jeffrey Robert Hoy, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer
  • Patent number: 9760736
    Abstract: A cloud deployment system is used for obfuscating CPU operation codes in a set of machines operating in a distributed computing environment. A reprogrammable microcode replaces a hardware instruction set, the microcode layer containing a set of original operation codes. A first transform of the set of original operation codes produces a first set of transformed operation codes. A first transformed microcode is created which incorporates the first set of transformed operation codes instead of the original operation codes. An operating system and an application is compiled using the first set of transformed operation codes to produce a first cross compiled operating system and application. The first transformed microcode, the first cross compiled operating system and application are deployed to a respective first one of the set of machines, the first one of the machines equipped with a softcore processor.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: September 12, 2017
    Assignee: International Business Machines Corporation
    Inventor: Michael Paul Clarke
  • Patent number: 9756058
    Abstract: Techniques for analyzing access to a network-based document may be provided. For example, the network-based document may be configured for direct access from client device. Based on an access of a client device to the network-based document, information associated with this access may be recorded. The information may be analyzed to determine whether a condition associated with the direct access may be violated. An issue may be detected with the client device access based on a determination that the condition may be violated.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: September 5, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Matthew Ryan Jezorek, Maarten Van Horenbeeck, Richie Lai
  • Patent number: 9756060
    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: September 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9756505
    Abstract: The disclosed computer-implemented method for on-demand provisioning of access-point accounts may include receiving, at an access point, a first request from an unknown guest to access a secured network. The guest may not yet have an account with the access point that allows the guest to access the secured network, and the first request may include authentication information that was generated from a credential of the unknown guest that is required by the access point to provision the account for the guest. The computer-implemented method may further include (1) receiving a second request that includes the credential from an administrator of the secured network to provision the account for the guest using the credential, (2) provisioning the account for the guest using the credential, and (3) enabling the guest to access the secured network using the account for the guest. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: September 5, 2017
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Michael Shavell
  • Patent number: 9756034
    Abstract: Implementations of the present disclosure involve a system and/or method for providing account information for a telephone number. All users are authenticated to ensure they may access the account information. Once authenticated, the user provides one or more telephone numbers that they would like to retrieve account information for. The system searches for the telephone number and if found, checks to ensure that the telecommunications provider services the phone number. When the telecommunications provider is the provider for the phone number, the record is retrieved and sent to the user.
    Type: Grant
    Filed: April 18, 2016
    Date of Patent: September 5, 2017
    Assignee: Level 3 Communications, LLC
    Inventors: Brett Wentworth, Taylor Fraley, Mike Keating, Dale Drew, John Fable
  • Patent number: 9754091
    Abstract: Systems and techniques are provided for restricted accounts on a mobile platform. A request to create a restricted account may be received. The restricted account may be a user account with a restriction. Credentials for the restricted account may be received. A restriction for the restricted account may be received. The restriction may include an access restriction or a lifetime restriction. An access restriction may prevent an application from accessing the restricted account and a lifetime restriction may limit the lifetime of the restricted account. The restricted account may be stored with the credentials and the restriction. A request may be received for a list of user accounts from an application. The restricted account may be determined to include an access restriction that prevents the application from accessing the restricted account. The list of user accounts may be sent to the application and without an identifier for the restricted account.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: September 5, 2017
    Assignee: Google Inc.
    Inventors: Ushasree Kode, Carlos Valdivia
  • Patent number: 9756020
    Abstract: Techniques to provide persistent uniform resource locators (URLs) for client applications acting as web services are described herein. In one or more implementations, the techniques utilize standard protocols and libraries (e.g., standard HTTP) without relying upon custom/propriety plug-ins. An intermediary server functions as a tunnel service is configured to provide functionality for handling communications between endpoints on behalf of client applications. Additionally, the tunnel service provides a mechanism to generate and assign persistent URLs (or comparable addresses) to client applications. Entities seeking to interact with the client applications use corresponding URLs to direct requests via the tunnel service and down to the appropriate client application.
    Type: Grant
    Filed: April 27, 2015
    Date of Patent: September 5, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Matthew T. Kaufman