Patents Examined by Harris C Wang
  • Patent number: 10255431
    Abstract: Disclosed are system and method for detecting one or more unwanted applications in a computing device. One exemplary method comprises: obtaining information relating to a first application installed on the computing device; detecting a first file associated with the first application; identifying a second file being related to the first file based at least upon selected conditions; identifying a second application installed on the computing device using at least one of the first and second files; determining a frequency of use for each of the first and second applications; and determining whether the first application is an unwanted application based on the frequency of use for each of the first and second applications.
    Type: Grant
    Filed: July 19, 2016
    Date of Patent: April 9, 2019
    Assignee: AO Kaspersky Lab
    Inventors: Alexander V. Amrilloev, Alexander A. Stroykov, Alexey S. Subbotin, Pavel V. Korzh, Mikhail A. Modin
  • Patent number: 10235528
    Abstract: A mechanism is provided for automatically determining an importance of vulnerabilities identified in an application. An identified application is scanned for a set of vulnerabilities with uncertain importance. For each vulnerability with uncertain importance in the set of vulnerabilities with uncertain importance, a set of characteristics is identified, a level of importance for the vulnerability with uncertain importance is determined utilizing the set of characteristics, and the level of importance is assigned to the vulnerability with uncertain importance thereby forming an identified vulnerability.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: March 19, 2019
    Assignee: International Business Machines Corporation
    Inventor: Wayne Diu
  • Patent number: 10230755
    Abstract: In some embodiments, techniques for displaying a URL comprise receiving a URL; normalizing the URL, wherein normalizing the URL includes standardizing an encoding of a character contained in the URL; determining a first element of the URL, wherein the first element of the URL includes a domain; determining a second element of the URL; displaying the URL, wherein displaying the URL includes emphasizing the first element of the URL, and wherein emphasizing the first element of the URL includes displaying the first element of the URL using a first font attribute; and wherein displaying the URL includes displaying a first portion of the second element of the URL using a second font attribute and eliding a second portion of the second element of the URL; and responsive to an interaction with a user interface element, providing a view of the URL in its entirety.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: March 12, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Aaron Emigh, James Roskind
  • Patent number: 10223516
    Abstract: Disclosed is a login method for controlling user access into a restricted access environment requiring a login device, which may be a wearable device, to effectuate a login process.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: March 5, 2019
    Assignee: LENOVO (SINGAPORE) PTE. LTD.
    Inventor: Masaharu Itoh
  • Patent number: 10205803
    Abstract: Described are techniques for determining causes of failed connections, such as a mismatch between a protocol associated with a request and the protocol associated with a port to which the request is provided. The port may be configured to process requests having a particular protocol, while monitoring and recognizing protocols used by other ports. If the request is determined to be associated with a different protocol supported by another port, a notification of the error may be provided to the client associated with the request. Based on characteristics of the request, the client, and the port, a control action may be taken, which may include rejecting the request or processing the request at the received port using a different protocol. Commonalities between failed requests may be analyzed to determine sources of error.
    Type: Grant
    Filed: August 27, 2015
    Date of Patent: February 12, 2019
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventor: Nima Sharifi Mehr
  • Patent number: 10193895
    Abstract: A method and apparatus for authenticating a user for access to a service provider over a network is disclosed. It includes a first device configured to receive a request for a ticket, generate the ticket, send the ticket to at least one additional device, generate a first partial signature of the ticket, receive additional partial signatures of the ticket, generate a complete signature of the ticket, encrypt the ticket and the complete signature of the ticket, send the encrypted ticket and encrypted complete signature of the ticket to the service provider, receive an encrypted verification code from the service provider, decrypt the encrypted verification code, and display the decrypted verification code.
    Type: Grant
    Filed: November 16, 2016
    Date of Patent: January 29, 2019
    Inventors: Abdulrahman Alhothaily, Arwa Alrawais
  • Patent number: 10152578
    Abstract: In accordance with one embodiment of the present invention, secure content objects are transcoded from an input format to an output format based upon identified capabilities of a receiving device. In one embodiment, a plurality of trusted processing components are identified to collectively transcode the secure content object from the identified input format to the determined output format. In one embodiment, each of the trusted processing components are authenticated prior to operating on the secure content object.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: December 11, 2018
    Assignee: Intel Corporation
    Inventors: Joshua D. Hug, Xiaodong Fu
  • Patent number: 10148422
    Abstract: Methods, systems, and computer programs for using an implicit certificate are described. In some aspects, an implicit certificate is accessed. The implicit certificate is associated with an entity and generated by a certificate authority. The implicit certificate includes a public key reconstruction value of the entity. Certificate authority public key information is accessed. The certificate authority public key information is associated with the certificate authority that issued the implicit certificate. A first value is generated based on evaluating a hash function. The hash function is evaluated based on the certificate authority public key information and the public key reconstruction value of the entity. A public key value of the entity can be generated or otherwise used based on the first value.
    Type: Grant
    Filed: May 4, 2012
    Date of Patent: December 4, 2018
    Assignee: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, David William Kravitz, Daniel Richard L. Brown
  • Patent number: 10140457
    Abstract: Embodiments of apparatus and methods for secure I/O device management are disclosed. In an embodiment, an apparatus includes a processor and an I/O controller. The processor has secure execution environment support, wherein the processor is to establish a secure execution environment using the secure execution environment support.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: November 27, 2018
    Assignee: Intel Corporation
    Inventor: Steven B. McGowan
  • Patent number: 10142325
    Abstract: A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request includes a public key of the requesting management node. The method also includes determining whether the management server has credentials encrypted for the requesting management node in a local cache. The credentials are encrypted using the public key of the requesting management node and cannot be decrypted by the management server. The method further includes sending the encrypted credentials to the requesting management node when the management server has the encrypted credentials. The requesting management node can decrypt the encrypted credentials using a private key.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: November 27, 2018
    Assignee: Ivanti, Inc.
    Inventors: Mark Tempel, Andrew Moravec
  • Patent number: 10102404
    Abstract: An electronic device is provided. The electronic device includes a processor configured to execute an application, and a display configured to display a first window corresponding to the application, wherein, in response to a specified event, the processor is further configured to adjust a transparency of the first window and to output, to a lower layer than a layer of the first window, a second window overlapping at least a part of an area of the first window.
    Type: Grant
    Filed: December 8, 2015
    Date of Patent: October 16, 2018
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Hwi Woong Kim, Dae Hwan Kim, Hyun Ho Kim, Go Un Lee
  • Patent number: 10089245
    Abstract: One method for managing encryption includes identifying an available or a secure mode. During restarts a passphrase must be entered in secure mode but not in available mode. Further, a master key is created for encrypting volume keys, where master and volume encryption keys are not stored in non-volatile memory (NVRAM) nor in disk storage. A half-key is created by encrypting the master key with a secure key, the secure key and the encrypted volume encryption keys being stored in disk storage. The half-key is stored in NVRAM only in available mode but not in secure mode. The master key is recreated during a restart when operating in the available mode by decrypting the NVRAM half-key with the secure key from disk storage. Further, the passphrase must be entered by an operator to recreate the half-key and the master key during a restart in the secure mode.
    Type: Grant
    Filed: May 12, 2016
    Date of Patent: October 2, 2018
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: John Kent Peacock, Tomasz Barszczak, Brian Rowe
  • Patent number: 10057298
    Abstract: This disclosure provides example techniques to invoke one or more tools, with an investigative tool. The investigative tool provides a common framework that allows investigators to invoke their own trusted tools or third-party generated tools. The investigative tool described herein seamlessly and transparently invokes the tools in accordance with an investigative profile created by the investigator.
    Type: Grant
    Filed: February 10, 2011
    Date of Patent: August 21, 2018
    Assignee: Architecture Technology Corporation
    Inventors: Derek P. Bronner, Robert A. Joyce, Matthew P. Donovan, Julia A. Baker
  • Patent number: 10050968
    Abstract: A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer, obtaining a cipher text of the shared data, a cipher text of an encryption key, an access strategy, and a cipher text attribute component from the data storage dealer, and transmitting a request for obtaining the user attribute component of the data access requester respectively to the attribute authorizers. The attribute authorizers generate the user attribute components of the data access requester respectively and transmit the user attribute components of the data access requester to the data access requester. The data access requester restores the encryption key, and decrypts the cipher text of the shared data according to the encryption key for obtaining the shared data requested to be accessed.
    Type: Grant
    Filed: December 31, 2014
    Date of Patent: August 14, 2018
    Assignee: Shenzhen University
    Inventors: Bo Wang, Jianyong Chen, Jianping Yu
  • Patent number: 10044522
    Abstract: Methods and apparatus for a tree-oriented configuration service are disclosed. A system includes computing devices that generate a tree-structured representation of a plurality of configuration elements of a distributed application. The devices implement a programmatic interface allowing a client to request an operation on a configuration element via a network request that indicates a path from a root node of the tree to one or more nodes corresponding to the configuration element. In response to (a) a network request received via the programmatic interface to perform a particular operation on a configuration element associated with a specified node and (b) a determination that authorization information associated with the specified node permits the requested operation, the operation is performed.
    Type: Grant
    Filed: August 21, 2012
    Date of Patent: August 7, 2018
    Assignee: Amazon Technologies Inc.
    Inventors: Mark Shamis, David Emory Watson
  • Patent number: 10038722
    Abstract: In an example, a method of managing access to resources managed by heterogeneous resource servers having different policy document formats in a cloud services environment includes obtaining, at an identity and access management (IAM) service, a policy document describing privileges of an end user with respect to accessing at least one resource of the resources managed by a resource server of the heterogeneous resource servers; sending the policy document from the IAM service to an resource server endpoint designated by the resource server for validation; storing, by the IAM service, the policy document in a datastore in response to a determination by the resource server endpoint that the policy document is valid; and generating, by the IAM service, an indication that the policy document is invalid in response to a determination by the resource server endpoint that the policy document is invalid.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: July 31, 2018
    Assignee: VMware, Inc.
    Inventors: Viswanathan Ramachandran, Jonathan Cook
  • Patent number: 10033533
    Abstract: Techniques for signer-initiated electronic document signing via an electronic signature service using a mobile or other client device are described. Example embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of documents and corresponding electronic signatures. In some embodiments, when a signer user receives an electronic signature document on a mobile device, the signer may use a client module executing on the mobile device to import the document into the ESS. Once the document is imported into the ESS, the signer can access, review, and sign the document at the ESS via the mobile device. After signing the document, the signer can use the mobile device to cause the ESS to provide the signed document to one or more recipients.
    Type: Grant
    Filed: June 20, 2014
    Date of Patent: July 24, 2018
    Assignee: DocuSign, Inc.
    Inventors: Thomas H. Gonser, Donald G. Peterson
  • Patent number: 10015171
    Abstract: Improved techniques of performing authentication involve extracting metadata from posts made by legitimate users on a social networking website and generating authentication results based in part on the extracted metadata. For example, in response to an authentication request being made from a device of a legitimate user, an authentication server obtains metadata describing one or more posts made by the legitimate user on the social networking website. The authentication server may then input the metadata to a risk engine, along with information gathered from the user's device. The risk engine then generates a risk score that indicates a likelihood that the request is fraudulent, based at least in part of whether the metadata obtained from the social networking website is consistent with the information obtained from the user's device.
    Type: Grant
    Filed: March 12, 2015
    Date of Patent: July 3, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Tamar Vardy, Simon D. Samra
  • Patent number: 10015018
    Abstract: Cryptographic keys can include logging properties that enable those keys to be used only if the properties can be enforced by the cryptographic system requested to perform one or more actions using the keys. The logging property can specify how to log use of a respective key. A key can also include a mutability property for specifying whether the logging property can be changed, and if so under what circumstances or in which way(s). The ability to specify and automatically enforce logging can be important for environments where audit logs are essential. These can include, for example, public certificate authorities that must provide accurate and complete audit trails. In cases where the data is not to be provided outside a determined secure environment, the key can be generated with a property indicating not to log any of the usage.
    Type: Grant
    Filed: July 21, 2017
    Date of Patent: July 3, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Alan Rubin, Gregory Branchek Roth
  • Patent number: 10002262
    Abstract: Provided are a device and a method for generating an identification key by using a process variation in a semiconductor process. A semiconductor is manufactured by adjusting a gate side edge position of a contact such that a difference between a probability that a gate of a transistor is shorted from a drain or a source by the contact and a probability that the gate is not shorted is less than or equal to a predetermined threshold. When the manufactured semiconductor does not have a separate process, whether there is a short circuit between the gate and the drain or the source is stochastically generated by the process variation, whether there is a short circuit is detected through a reader, and an identification key is provided.
    Type: Grant
    Filed: February 19, 2014
    Date of Patent: June 19, 2018
    Assignee: ICTK CO., LTD.
    Inventors: Byong Deok Choi, Dong Kyue Kim