Patents Examined by Hee K Song
-
Patent number: 10938860Abstract: Preserving privacy related to networked media consumption activity. Privacy zones are defined and associated with privacy standards. Privacy standards include frequency criteria governing the storage of datasets including information associated with networked media consumption activity collected from the privacy zone. Transaction requests are received over a network from a client device at a location by a networked privacy system. The privacy zone associated with the client device is identified. A dataset can be created including information associating the networked media consumption activity. The dataset is processed to comply with the privacy standards. The processed dataset can be stored in a database on a physical storage device at a storage location coupled to the networked privacy system.Type: GrantFiled: October 4, 2019Date of Patent: March 2, 2021Assignee: Quantcast CorporationInventor: Damian John Reeves
-
Patent number: 10924498Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for registering subscribable states in blockchain are provided. One of the methods includes: obtaining a request for registering a workflow comprising one or more states; generating a blockchain contract comprising the workflow; and deploying the blockchain contract in a blockchain, wherein the deployed blockchain contract is executable to update a current state of the workflow among the one or more states.Type: GrantFiled: July 30, 2020Date of Patent: February 16, 2021Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventors: Yayang Guan, Rubing Shi
-
Patent number: 10917422Abstract: An auditing system (10) is provided for detecting at least one unauthorized operational activity in at least one website, and includes a processor coupled to at least one database (34) for storing data related to the at least one unauthorized operational activity. The processor is programmed to detect the at least one unauthorized operational activity in the at least one website using a monitoring module (22) configured to monitor the at least one website via a network (16) and provide unauthorized operational status information about the at least one website using a plurality of status messages generated based on the data, and a detection module (24) configured to examine the plurality of status messages and detect an anomaly caused by the at least one unauthorized operational activity.Type: GrantFiled: July 26, 2019Date of Patent: February 9, 2021Assignee: DEV/CON DETECT, INC.Inventor: Margaret C. Louie
-
Patent number: 10911425Abstract: Disclosed are various embodiments for determining authentication assurance based on both user-level and account-level indicators. An authentication request associated with an account is received responsive to an input from a user via a user interface. A user-level measure of authentication assurance corresponding to the user is determined. An account-level measure of authentication assurance corresponding to the account is determined. A composite measure of authentication assurance is then determined from a combination of the user-level measure of authentication assurance and the account-level measure of authentication assurance. A response to the authentication request is generated based at least in part on comparing the composite measure of authentication assurance to a threshold.Type: GrantFiled: November 27, 2018Date of Patent: February 2, 2021Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Daniel Hitchcock, Yogesh Golwalkar, Dharinee Gupta, Bharath Kumar
-
Patent number: 10903989Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing blockchain transactions. One of the methods includes: obtaining, by a blockchain node of a consortium blockchain network, a blockchain transaction associated with a service; invoking a smart contract corresponding to the service; determining presentation information based on the smart contract and the service, wherein the presentation information is presented to a user through a client device in response to receiving a query from the client device; recording the presentation information into a blockchain transaction log based on the smart contract; and recording the blockchain transaction and the blockchain transaction log of the blockchain transaction into a blockchain.Type: GrantFiled: March 9, 2020Date of Patent: January 26, 2021Assignee: Advanced New Technologies Co., Ltd.Inventors: Ping Dai, Wenlong Yang, Shubo Li, Jincheng Wang
-
Patent number: 10904000Abstract: Proof onions for transactions for smart contracts are stored. Details of the transactions are stored on blockchains separate from the proof onions. The proof onions are evidence structures for the steps taken to create any transaction for the smart contract. The proof onions include a plurality of signatures or other cryptographic proofs. A proof request that is associated with at least a first transaction of the transactions is received. A first proof onion of the proof onions that corresponds to the first transaction is retrieved. A plurality of public keys associated with the first proof onion is obtained. The plurality of public keys is used to validate the first proof onion. In response to the validation of the first proof onion, the proof request is responded to with at least an indication of the validity of the first transaction.Type: GrantFiled: April 26, 2018Date of Patent: January 26, 2021Assignee: Microsoft Technology Licensing, LLCInventor: John Marley Gray
-
Patent number: 10897480Abstract: Techniques for transferring data from a first domain to a second domain in a cross-domain environment are presented. The techniques can include accepting computer readable data in the first domain for transfer to the second domain, passing the computer readable data to a first machine learning classifier at the first domain trained with at least malware files publicly identified as malicious, passing the computer readable data to a second machine learning classifier at the first domain trained with at least malware files specific to the first domain, and transferring the computer readable data to a destination in the second domain.Type: GrantFiled: July 27, 2018Date of Patent: January 19, 2021Assignee: THE BOEING COMPANYInventors: Brian C. Grubel, Raymond L. Ward
-
Patent number: 10891363Abstract: Provided is an authentication method including receiving an authentication request; obtaining authentication data for authenticating a user from at least one of a plurality of external devices as when the authentication request is received; obtaining an authentication score based on the obtained authentication data and reliability information assigned to a type of the authentication data in advance; and determining whether additional authentication is necessary based on the obtained authentication score.Type: GrantFiled: June 24, 2016Date of Patent: January 12, 2021Assignee: SAMSUNG ELECTRONICS CO.. LTD.Inventors: Eun-ah Kim, Hee-kwan Lee
-
Patent number: 10862597Abstract: In a computer network that has a plurality of nodes, a measure of trustworthiness for a particular node can be updated by other nodes that monitor the particular node's behavior. This includes collecting trustworthiness reports from the other nodes; updating the particular node's trustworthiness level based on the reports; and causing the particular node to route data in the computer network based on its trustworthiness level. The particular node's role in performing at least one of a set of functions is based on a hierarchy of trustworthiness levels, wherein the functions can include monitoring other nodes; sending alerts when anomalous behavior is detected; transmitting a free-antibody software program to a requesting node; updating defensive programs; participating in consensus-based threat analysis with other nodes; identifying threats; tagging suspicious nodes; and performing countermeasures against identified threats.Type: GrantFiled: November 5, 2019Date of Patent: December 8, 2020Inventors: Steve J Shattil, Robi Sen
-
Patent number: 10856147Abstract: An identification information providing system includes a sending processor configured to send a predetermined signal including identification information; a managing processor configured to set or change identification information and manage predetermined identification information that is set or changed; and a receiving processor configured to be able to receive a predetermined signal to obtain predetermined identification information and perform synchronization, and to use a result of determining matching between obtained predetermined identification information and a received predetermined signal to determine whether the sending processor is an authorized sending processor.Type: GrantFiled: August 30, 2018Date of Patent: December 1, 2020Assignee: RICOH COMPANY, LTD.Inventor: Koji Suzuki
-
Patent number: 10855701Abstract: Network traffic management apparatuses, systems, methods, and computer-readable media for automatically detecting attack signatures and generating attack signature identifications, involving: collecting a stable dataset during a stable time; determining whether a cyber-attack is detected; when a cyber-attack is detected, periodically generating attack signatures and updating an enforcer with the attack signatures, the attack signatures representing dynamic rules to be enforced; validating the dynamic rules via a long-time validation mechanism, validating involving considering behavior of each dynamic rule after the cyber-attack and during a new cyber-attack and ranking each dynamic rule using the stable dataset, thereby generating persistent rules having a dynamic rule; exporting the persistent rules to a security enforcer; introducing the persistent rules to a persistent rule revocater; determining whether export of an unrevoked persistent rule is requested; and if requested, exporting the unrevoked persisteType: GrantFiled: November 5, 2018Date of Patent: December 1, 2020Assignee: F5 Networks, Inc.Inventors: Vadim Krishtal, Maor Moshe Gaon, Peter Finkelshtein
-
Patent number: 10855442Abstract: A method for performing an encrypted data operation may include generating an encrypted hierarchical path identifier corresponding to a hierarchical data space for at least one plaintext data operation that preserves the hierarchy of the hierarchical data space. The at least one plaintext data operation may correspond to at least one subdivision of the hierarchical data space. The method may further include encrypting the at least one plaintext data operation, and sending a request to perform an encrypted data operation to a server. The request may include the encrypted data operation and the encrypted hierarchical path identifier.Type: GrantFiled: October 8, 2019Date of Patent: December 1, 2020Assignee: Craxel, Inc.Inventor: David Enga
-
Patent number: 10855723Abstract: In one example embodiment, a proxy server obtains, from a client, a query regarding a server with which the client is attempting to establish a communication session. Based on the query, the proxy server evaluates dynamically updated stored data to determine whether the dynamically updated stored data indicates that the server supports a secure transport protocol. Based on determining that the dynamically updated stored data indicates that the server supports the secure transport protocol, the proxy server provides a response to the client. The response causes the client to provide, to the server, an initial secure transport protocol message in the communication session.Type: GrantFiled: May 11, 2018Date of Patent: December 1, 2020Assignee: CISCO TECHNOLOGY, INC.Inventor: Piotr Jerzy Kupisiewicz
-
Patent number: 10855663Abstract: A method for encrypting data when a device is offline is disclosed. In the method, a determination is made as to whether a successful connection with a remote server computer can or cannot be made. If a connection cannot be made, then data can be encrypted with an ephemeral public key. Later, then a connection is available, the encrypted data can be transmitted to the remote server computer for processing.Type: GrantFiled: October 25, 2019Date of Patent: December 1, 2020Assignee: Visa International Service AssociationInventors: Rhidian John, Bartlomiej Piotr Prokop, Michael Palmer
-
Patent number: 10841342Abstract: Disclosed are various embodiments that related to rendering a data driven user interface used to configure device profiles in an enterprise device management environment. In some examples, the enterprise device management environment can include a platform messaging service and a platform specific adapter. In one example, a system can receive a request to generate a device profile for a platform. The system can render a data driven user interface for configuring the device profile based on a definition file. The system can also receive input of a value for a user interface element and retrieve the values from the other user interface elements. The system can generate the device profile based on a translation of the values and transmit a command to a platform messaging service to facilitate an installation of the device profile in a mobile device. Various delivery methods for installing the device profile are disclosed.Type: GrantFiled: January 9, 2018Date of Patent: November 17, 2020Assignee: VMware, Inc.Inventors: Adam Stephen Rykowski, Adarsh Subhash Chandra Jain, Kai Chen, Daniel Quintas, Huda Osman
-
Patent number: 10833876Abstract: This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP (SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.Type: GrantFiled: October 25, 2017Date of Patent: November 10, 2020Assignee: Apple Inc.Inventors: Rohan C Malthankar, Paresh B. Sawant, Delziel J. Fernandes, Sergey Sitnikov, Arun G. Mathias, Jason A. Novak, Krisztian Kiss, Rafael L. Rivera-Barreto, Chandiramohan Vasudevan, Vladimir M. Appel
-
Patent number: 10832506Abstract: An encrypted security system and associated methods for controlling physical access are described. The system includes a security server configured to receive a request for authentication from a mobile device, the request including information identifying the mobile device and a physical access control device. The security server forwards an encryption message including a plurality of unique identifiers to the physical access control device via the mobile device. The physical access control device is configured to authenticate the plurality of unique identifiers in the encryption message and operate an access control mechanism.Type: GrantFiled: June 23, 2017Date of Patent: November 10, 2020Assignee: Delphian Systems, LLCInventors: Gary L. Myers, Ashok Hirpara, John D. Veleris, Arkadiusz Zimny, Michael Aaron Cohen, Eugene Nakshin
-
Patent number: 10831872Abstract: Methods, systems, and devices for voice-activated medical assistance are described. The method may include receiving an indication of an audio request from a user and determining whether a response to the audio request includes medical information associated with a patient. After determining whether the response includes medical information, the medical assistance server may identify an access class of the medical information and a permission level associated with accessing the access class of the medical information. The method may further include determining whether the user is authorized to access the access class based on the permission level and transmitting an indication of the response to the audio request based on determining whether the user is authorized.Type: GrantFiled: May 8, 2018Date of Patent: November 10, 2020Assignee: Covidien LPInventors: Jonathan James Woodward, Matthew Sgambato, Paul Von der lippe
-
Patent number: 10833860Abstract: Authentication is performed on a plurality of links of a computing environment. One node requests generation of a shared key by a key server coupled to the one node. The one node obtains the shared key and an identifier of the shared key and sends the identifier from the one node to another node. A message encrypted with the shared key is sent from the one node to the other node via one link of the plurality of links. The one node receives via the one link an indication that the other node decrypted the encrypted message using the shared key obtained by the other node. The sending the encrypted message and the receiving the indication that the other node decrypted the encrypted message are repeated on one or more other links of the plurality of links using the shared key previously obtained.Type: GrantFiled: September 4, 2018Date of Patent: November 10, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Patricia G. Driever, Roger G. Hathorn, Christopher Colonna, John Flanagan, George P. Kuch, Richard M. Sczepczenski, Glen Jaquette
-
Patent number: 10834136Abstract: Techniques for access point name and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for access point name (e.g., APN) and application identity (e.g., application identifier) based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify an access point name for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the access point name and the application identifier.Type: GrantFiled: March 28, 2018Date of Patent: November 10, 2020Assignee: Palo Alto Networks, Inc.Inventors: Sachin Verma, Leonid Burakovsky