Patents Examined by Hadi S Armouche
-
Patent number: 9961132Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for placing a user account in escrow to remove it from an administered account. An employee and/or an employer can select to remove a user account from an administered account associated with the employer. To ensure that the each party, the employer and employee, has an opportunity to retain their content stored in the removed user account, the user account can be placed into escrow, requiring login credentials of both the user and the administrator (employer) to access the user account. The user account can therefore not be accessed unless both the employer and employee each login to the account at the same time. By placing the user account in escrow, both parties can be assured that they can access the content items in the user account, and that the other party cannot access the content without their knowledge.Type: GrantFiled: July 30, 2014Date of Patent: May 1, 2018Assignee: DROPBOX, INC.Inventor: Anton Mityagin
-
Patent number: 9961077Abstract: A system, apparatus, method, and machine readable medium are described for biometric device attestation. For example, one embodiment of an apparatus includes: a biometric device to read biometric authentication data from a user and determine whether to successfully authenticate the user based on a comparison with biometric reference data; and a cryptographic engine to establish communication with a relying party and to attest to the model and/or integrity of the biometric device to the relying party.Type: GrantFiled: October 29, 2013Date of Patent: May 1, 2018Assignee: NOK NOK LABS, INC.Inventor: Rolf Lindemann
-
Patent number: 9959411Abstract: Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability.Type: GrantFiled: September 13, 2013Date of Patent: May 1, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
-
Patent number: 9959409Abstract: A processor of an aspect includes a decode unit to decode a user-level instruction. The user-level instruction is to indicate a page of a secure enclave and is to indicate a linear address. An execution logic is coupled with the decode unit. The execution logic is operable, in response to the user-level instruction, to change an initial linear address of the page of the secure enclave. The initial linear address is to be stored in an enclave page storage metadata unit. The initial linear address is to be changed by the execution logic to the linear address that is to be indicated by the user-level instruction. The change to the linear address is performed without contents of the page of the secure enclave being lost.Type: GrantFiled: March 9, 2016Date of Patent: May 1, 2018Assignee: Intel CorporationInventors: Rebekah M. Leslie-Hurd, Carlos V. Rozas
-
Patent number: 9954887Abstract: A device may receive usage information, associated with a group of client networks, including particular usage information associated with a particular client network. The device may receive threat information, associated with the group of client networks, including particular threat information associated with the particular client network. The device may determine a baseline based on the usage information. The device may determine a normalization function, associated with the particular client network, based on the baseline and the particular usage information. The device may determine normalized threat information, associated with the particular client network, based on the normalization function and the particular threat information. The device may determine overall normalized threat information associated with the group of client networks. The device may compare the normalized threat information and the overall normalized threat information.Type: GrantFiled: December 30, 2016Date of Patent: April 24, 2018Assignee: Juniper Networks, Inc.Inventors: Kyle Adams, Declan Conlon
-
Patent number: 9948630Abstract: A system and method of validating an upgrade of authentication credentials includes authenticating a first user being associated with a first entity, receiving input identifying a customer name for the online account, receiving input indicating a type of identification to be presented at the validation event, receiving input indicating a transaction code associated with the validation event, and receiving input indicating a location of the validation event, and further includes authenticating a second user being associated with a second entity, providing to the second user a list of validation events for a location, receiving input selecting a validation event in the list of validation events, presenting one or more of the customer name, transaction code, and type of identification associated with the selected validation event, and receiving input indicating a result of the validation event, where a credential or token is created and assigned based on the validation event.Type: GrantFiled: June 28, 2016Date of Patent: April 17, 2018Assignee: United States Postal ServiceInventors: Timothy M. Moran, Jane E. Quenk, Douglas Paul Glair, Charles P. McLellan
-
Patent number: 9930061Abstract: A method for cyber attack risk assessment is disclosed. The method uses at least one hardware processor for: continuously collecting, from a networked resource, cyber attack data having multiple attack methods directed at multiple objectives. The method also collects organizational profile data, having: assets, each relevant to at least one of the objectives, and defensive controls, each configured to protect at least one of the assets by resisting one or more of the attack methods. The method continuously computes: an enterprise risk score, and an asset risk score for each of the assets. Each asset risk score is computed with respect to: the attack methods directed at the objectives relevant to the asset, the defensive controls provided to protect the asset, and a maturity score representing the capability of the defensive controls to protect the asset. The method also continuously displays a dynamic rendition of the risk scores.Type: GrantFiled: August 22, 2016Date of Patent: March 27, 2018Assignee: Cytegic Ltd.Inventor: Shay Zandani
-
Patent number: 9894090Abstract: Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving goal data and start-up information, the goal data indicating a goal to be achieved during a penetration test, the start-up information indicating initial data for beginning the penetration test, receiving tool data from a register of tools, the tool data including one or more tools that can be used during the penetration test, and, for each tool, input data required to execute the tool and output data provided by the tool, processing the goal data, the start-up information and the tool data to automatically generate attack tree data, the attack tree data including a plurality of data sets and links between data sets, and providing the attack tree data to display a graphical representation of an attack tree on a display.Type: GrantFiled: July 14, 2015Date of Patent: February 13, 2018Assignee: SAP SEInventors: Cedric Hebert, Laurent Gomez
-
Patent number: 9876778Abstract: A method for providing secure remote access by a controller is described. The method includes establishing a link through a security service to a client device via a cloud server based on a security token from the client device. The method also includes receiving a command message from the client device for an application program interface (API) located within the controller. The command message is forwarded by the cloud server. The method further includes producing an automation command based on the command message. The API interprets the command message.Type: GrantFiled: March 23, 2015Date of Patent: January 23, 2018Assignee: Control4 CorporationInventors: Wallace Eric Smith, David Paul Fay, Erik Frederick, William Richard Clark
-
Patent number: 7388867Abstract: A data network in which at least one switch is provided with the facility for estimating current network demands using a polygonal approximation to scaled cumulant generating function. The approximation is iteratively refined in accordance with sampled data passing through the switch. The switch estimates the demand associated with a new data processing request as it is received by the switch and decides whether to accept the request based on available resources.Type: GrantFiled: June 18, 2004Date of Patent: June 17, 2008Assignee: Corvil LimitedInventors: Nils Bjoerkman, Simon Andrew Crosby, Alexander Latour-Henner, Ian Malcolm Leslie, John Trevor Lewis, Fergal William Toomey, Raymond Philip Russell
-
Patent number: 7343496Abstract: A high security microcontroller (such as in a point of sale terminal) includes tamper control circuitry for detecting vulnerability conditions: a write to program memory before the sensitive financial information has been erased, a tamper detect condition, the enabling of a debugger, a power-up condition, an illegal temperature condition, an illegal supply voltage condition, an oscillator fail condition, and a battery removal condition. If the tamper control circuitry detects a vulnerability condition, then the memory where the sensitive financial information could be stored is erased before boot loader operation or debugger operation can be enabled. Upon power-up if a valid image is detected in program memory, then the boot loader is not executed and secure memory is not erased but rather the image is executed. The tamper control circuitry is a hardware state machine that is outside control of user-loaded software and is outside control of the debugger.Type: GrantFiled: August 13, 2004Date of Patent: March 11, 2008Assignee: ZiLOG, Inc.Inventors: Peter C. Hsiang, Raymond O. Chock, Mark Hess