Patents Examined by Hadi S Armouche
  • Patent number: 9961132
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for placing a user account in escrow to remove it from an administered account. An employee and/or an employer can select to remove a user account from an administered account associated with the employer. To ensure that the each party, the employer and employee, has an opportunity to retain their content stored in the removed user account, the user account can be placed into escrow, requiring login credentials of both the user and the administrator (employer) to access the user account. The user account can therefore not be accessed unless both the employer and employee each login to the account at the same time. By placing the user account in escrow, both parties can be assured that they can access the content items in the user account, and that the other party cannot access the content without their knowledge.
    Type: Grant
    Filed: July 30, 2014
    Date of Patent: May 1, 2018
    Assignee: DROPBOX, INC.
    Inventor: Anton Mityagin
  • Patent number: 9961077
    Abstract: A system, apparatus, method, and machine readable medium are described for biometric device attestation. For example, one embodiment of an apparatus includes: a biometric device to read biometric authentication data from a user and determine whether to successfully authenticate the user based on a comparison with biometric reference data; and a cryptographic engine to establish communication with a relying party and to attest to the model and/or integrity of the biometric device to the relying party.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: May 1, 2018
    Assignee: NOK NOK LABS, INC.
    Inventor: Rolf Lindemann
  • Patent number: 9959411
    Abstract: Identifying security vulnerabilities on computing devices by detecting an inter-process communication on a computing device, determining whether the inter-process communication is consistent with a predefined specification of a security vulnerability, and causing a predefined action to be performed on the computing device responsive to determining that the inter-process communication is consistent with a predefined specification of a security vulnerability.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: May 1, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Roee Hay, Daniel Kalman, Roi Saltzman, Omer Tripp
  • Patent number: 9959409
    Abstract: A processor of an aspect includes a decode unit to decode a user-level instruction. The user-level instruction is to indicate a page of a secure enclave and is to indicate a linear address. An execution logic is coupled with the decode unit. The execution logic is operable, in response to the user-level instruction, to change an initial linear address of the page of the secure enclave. The initial linear address is to be stored in an enclave page storage metadata unit. The initial linear address is to be changed by the execution logic to the linear address that is to be indicated by the user-level instruction. The change to the linear address is performed without contents of the page of the secure enclave being lost.
    Type: Grant
    Filed: March 9, 2016
    Date of Patent: May 1, 2018
    Assignee: Intel Corporation
    Inventors: Rebekah M. Leslie-Hurd, Carlos V. Rozas
  • Patent number: 9954887
    Abstract: A device may receive usage information, associated with a group of client networks, including particular usage information associated with a particular client network. The device may receive threat information, associated with the group of client networks, including particular threat information associated with the particular client network. The device may determine a baseline based on the usage information. The device may determine a normalization function, associated with the particular client network, based on the baseline and the particular usage information. The device may determine normalized threat information, associated with the particular client network, based on the normalization function and the particular threat information. The device may determine overall normalized threat information associated with the group of client networks. The device may compare the normalized threat information and the overall normalized threat information.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: April 24, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Kyle Adams, Declan Conlon
  • Patent number: 9948630
    Abstract: A system and method of validating an upgrade of authentication credentials includes authenticating a first user being associated with a first entity, receiving input identifying a customer name for the online account, receiving input indicating a type of identification to be presented at the validation event, receiving input indicating a transaction code associated with the validation event, and receiving input indicating a location of the validation event, and further includes authenticating a second user being associated with a second entity, providing to the second user a list of validation events for a location, receiving input selecting a validation event in the list of validation events, presenting one or more of the customer name, transaction code, and type of identification associated with the selected validation event, and receiving input indicating a result of the validation event, where a credential or token is created and assigned based on the validation event.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: April 17, 2018
    Assignee: United States Postal Service
    Inventors: Timothy M. Moran, Jane E. Quenk, Douglas Paul Glair, Charles P. McLellan
  • Patent number: 9930061
    Abstract: A method for cyber attack risk assessment is disclosed. The method uses at least one hardware processor for: continuously collecting, from a networked resource, cyber attack data having multiple attack methods directed at multiple objectives. The method also collects organizational profile data, having: assets, each relevant to at least one of the objectives, and defensive controls, each configured to protect at least one of the assets by resisting one or more of the attack methods. The method continuously computes: an enterprise risk score, and an asset risk score for each of the assets. Each asset risk score is computed with respect to: the attack methods directed at the objectives relevant to the asset, the defensive controls provided to protect the asset, and a maturity score representing the capability of the defensive controls to protect the asset. The method also continuously displays a dynamic rendition of the risk scores.
    Type: Grant
    Filed: August 22, 2016
    Date of Patent: March 27, 2018
    Assignee: Cytegic Ltd.
    Inventor: Shay Zandani
  • Patent number: 9894090
    Abstract: Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving goal data and start-up information, the goal data indicating a goal to be achieved during a penetration test, the start-up information indicating initial data for beginning the penetration test, receiving tool data from a register of tools, the tool data including one or more tools that can be used during the penetration test, and, for each tool, input data required to execute the tool and output data provided by the tool, processing the goal data, the start-up information and the tool data to automatically generate attack tree data, the attack tree data including a plurality of data sets and links between data sets, and providing the attack tree data to display a graphical representation of an attack tree on a display.
    Type: Grant
    Filed: July 14, 2015
    Date of Patent: February 13, 2018
    Assignee: SAP SE
    Inventors: Cedric Hebert, Laurent Gomez
  • Patent number: 9876778
    Abstract: A method for providing secure remote access by a controller is described. The method includes establishing a link through a security service to a client device via a cloud server based on a security token from the client device. The method also includes receiving a command message from the client device for an application program interface (API) located within the controller. The command message is forwarded by the cloud server. The method further includes producing an automation command based on the command message. The API interprets the command message.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: January 23, 2018
    Assignee: Control4 Corporation
    Inventors: Wallace Eric Smith, David Paul Fay, Erik Frederick, William Richard Clark
  • Patent number: 7388867
    Abstract: A data network in which at least one switch is provided with the facility for estimating current network demands using a polygonal approximation to scaled cumulant generating function. The approximation is iteratively refined in accordance with sampled data passing through the switch. The switch estimates the demand associated with a new data processing request as it is received by the switch and decides whether to accept the request based on available resources.
    Type: Grant
    Filed: June 18, 2004
    Date of Patent: June 17, 2008
    Assignee: Corvil Limited
    Inventors: Nils Bjoerkman, Simon Andrew Crosby, Alexander Latour-Henner, Ian Malcolm Leslie, John Trevor Lewis, Fergal William Toomey, Raymond Philip Russell
  • Patent number: 7343496
    Abstract: A high security microcontroller (such as in a point of sale terminal) includes tamper control circuitry for detecting vulnerability conditions: a write to program memory before the sensitive financial information has been erased, a tamper detect condition, the enabling of a debugger, a power-up condition, an illegal temperature condition, an illegal supply voltage condition, an oscillator fail condition, and a battery removal condition. If the tamper control circuitry detects a vulnerability condition, then the memory where the sensitive financial information could be stored is erased before boot loader operation or debugger operation can be enabled. Upon power-up if a valid image is detected in program memory, then the boot loader is not executed and secure memory is not erased but rather the image is executed. The tamper control circuitry is a hardware state machine that is outside control of user-loaded software and is outside control of the debugger.
    Type: Grant
    Filed: August 13, 2004
    Date of Patent: March 11, 2008
    Assignee: ZiLOG, Inc.
    Inventors: Peter C. Hsiang, Raymond O. Chock, Mark Hess