Patents Examined by Hee K Song
  • Patent number: 10726156
    Abstract: Methods and systems described herein provide for protecting user information in an overlay service. Protecting user information may include redacting personally identifiable information (PII) from information that may be exposed to third parties. Additionally, protecting user information may include opening a second account on behalf of the user using a plurality of unique identifiers in lieu of information identifying the user. This protects users' identities and privacy as their assets are transferred between various institutions.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: July 28, 2020
    Assignee: Capital One Services, LLC
    Inventors: Jeremy Phillips, Zachary Podbela
  • Patent number: 10721258
    Abstract: Technologies for secure personalization of a security monitoring virtual network function (VNF) in a network functions virtualization (NFV) architecture include various security monitoring components, including a NFV security services controller, a VNF manager, and a security monitoring VNF. The security monitoring VNF is configured to receive provisioning data from the NFV security services controller and perform a mutually authenticated key exchange procedure using at least a portion of the provisioning data to establish a secure communication path between the security monitoring VNF and a VNF manager. The security monitoring VNF is further configured to receive personalization data from the VNF manager via the secure communication path and perform a personalization operation to configure one or more functions of the security monitoring VNF based on the personalization data. Other embodiments are described and claimed.
    Type: Grant
    Filed: July 30, 2019
    Date of Patent: July 21, 2020
    Assignee: Intel Corporation
    Inventors: Kapil Sood, Manuel Nedbal
  • Patent number: 10715527
    Abstract: A method of managing profiles in a secure element where the secure element includes an active first profile associated with a first communication network and a second profile associated with a second communication network. The method includes deactivating the first profile and activating the second profile, where the deactivation and the activation are implemented following detection of a failure during a local verification pertaining to the first profile for the use of this the first profile. A local verification may be a verification in the secure element of the authorization of access of a user to the first profile, for example three failures of PIN or PUK code or of biometric authentication data, the local verification being performed in the secure element, and the failure being relative to a security failure of the first profile or to an operating failure of the first profile.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: July 14, 2020
    Assignee: IDEMIA France
    Inventors: Jerome Dumoulin, Alexis Michel
  • Patent number: 10708280
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for registering subscribable states in blockchain are provided. One of the methods includes: obtaining a request for registering a workflow comprising one or more states; generating a blockchain contract comprising the workflow; and deploying the blockchain contract in a blockchain, wherein the deployed blockchain contract is executable to update a current state of the workflow among the one or more states.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: July 7, 2020
    Assignee: ALIBABA GROUP HOLDING LIMITED
    Inventors: Yayang Guan, Rubing Shi
  • Patent number: 10701039
    Abstract: Various embodiments are generally directed to the providing for mutual authentication and secure distributed processing of multi-party data. In particular, an experiment may be submitted to include the distributed processing of private data owned by multiple distrustful entities. Private data providers may authorize the experiment and securely transfer the private data for processing by trusted computing nodes in a pool of trusted computing nodes.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: June 30, 2020
    Assignee: INTEL CORPORATION
    Inventors: Vinay Phegade, Huaiyu Liu, Jesse Walker
  • Patent number: 10681038
    Abstract: In a method for efficient password based public key authentication between a first user device and a second user device, a shared password is received by a first user device which generates a first hash value of the shared password and a first value, wherein the first value is composed of at least a product of the first hash value and a first unique security constant associated with the first user. The first user device then generates a first random value generated using data from a generator element, and a first blind public key associated with the first user device, wherein the first blind public key is generated using a first public key. The first user device concurrently sends the first value and the first blind public key to the second user device for authentication.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: June 9, 2020
    Assignee: Marvell Asia Pte, Ltd.
    Inventor: Paul A. Lambert
  • Patent number: 10678915
    Abstract: A method, device and program for checking and killing a backdoor file and a readable medium, wherein the method comprises: acquiring a historical deletion proportion of a target backdoor file, wherein the historical deletion proportion of the target backdoor file is a ratio of the number of deleting the target backdoor file to the number of symbolizing the target backdoor file as a suspect backdoor file in a preset time period; determining a checking and killing policy corresponding to the historical deletion proportion of the target backdoor file according to a predefined rule; and checking and killing the target backdoor file according to the checking and killing policy. Thus, more processing opinions are provided to the user for reference, so as to facilitate the user in rapidly and efficiently performing accurate processing of the file.
    Type: Grant
    Filed: December 12, 2016
    Date of Patent: June 9, 2020
    Assignee: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventor: Yi Yang
  • Patent number: 10667129
    Abstract: Methods, systems, and apparatus are described for transferring application data. In one aspect, a method includes causing, by a first service running on a first device to establish a wireless connection with a second device; receiving, from a second service running on the second device, data specifying applications that are installed on the second device and supported by the second service, each of the applications being separate from the second service; determining, by the first service, that a first application installed on the first device matches one of the applications installed on the second device, the first application being separate from the first service; receiving, by the first service, first application data from the first application; and causing, by the first service, the first device to send the first application data to the second service running on the second device using the wireless connection.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: May 26, 2020
    Assignee: GOOGLE LLC
    Inventors: Vincent Wei-Kang Chen, Paul Lee, Gregory M. Hecht, Erdi Chen, Jenny Chun-yi Chen, Marina-Ines Carrera, Estelle Laure Myriam Comment, Eric Chu, Peter Jin Hong, Christopher John Adams, Lucas Gill Dixon
  • Patent number: 10666650
    Abstract: Embodiments of the present application provide a packet processing method in a Point-to-Point Protocol over Ethernet (PPPoE) authentication process and a relevant device. A first broadcast access server (BAS) exists in a broadcast domain in which a user terminal is located, the first BAS supports the PPPoE and corresponds to a first operator. The method includes receiving, by the first BAS, a PPPoE active discovery initiation (PADI) packet sent by the user terminal; and when determining that a quantity of authentication failures of the user terminal on the first BAS is greater than a preset threshold, skipping sending, by the first BAS, a PPPoE active discovery offer (PADO) packet to the user terminal in a preset period. The technical solutions in the embodiments of the present application resolve a problem that the user terminal cannot perform access because the user terminal establishes a session with the first BAS.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: May 26, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Ting Hu, Guofeng Qian
  • Patent number: 10664579
    Abstract: Detecting rhythm for selectively controlling access via a programmable locking system includes the steps of detecting a plurality of primary taps made by a user; storing the time intervals as a primary input sequence; normalizing the primary input sequence; calculating a tolerance value; detecting a plurality of secondary taps made by a user; storing the time intervals as a secondary input sequence; normalizing the secondary input sequence; storing a plurality of difference values equal to the value of the differences between the corresponding time intervals of the normalized primary and secondary input sequences; generating a secondary input sequence range equal to the value of the range between the minimum and maximum values of the difference values; and providing access via the programmable locking system when the value of the secondary input sequence range is lower than the tolerance value of the primary input vibration sequence.
    Type: Grant
    Filed: May 10, 2018
    Date of Patent: May 26, 2020
    Assignee: Haptic One, Inc.
    Inventors: Benjamin Robert Dixon, William Jeffrey Sylvester, Jonathan C. Wooding
  • Patent number: 10659217
    Abstract: Methods, systems, and apparatuses for blockchain-based automated user matching are described herein. In some arrangements, a node within a decentralized peer-to-peer (e.g., P2P) network may receive match parameters from one or more computing devices associated with supply side entities and demand side entities. The node may execute one or more artificial intelligence algorithms to match the supply side entities with the demand side entities based on the received match parameters. In some instances, the artificial intelligence algorithms may be stored in a smart contract on a blockchain and the matching may be performed through execution of the smart contract by nodes of the decentralized P2P network.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: May 19, 2020
    Assignee: Bank of America Corporation
    Inventors: Suki Ramasamy, Sasidhar Purushothaman
  • Patent number: 10650161
    Abstract: An alias key is generated for each person identification (ID) in a database table. The alias key us used to lookup the corresponding person ID in the database table. In addition, for each alias key, a temporary alias key is generated that is used to lookup the corresponding alias key in the database table. A plurality of queries are received from at least one remote client that each specify at least one of the temporary alias keys. Data is later transmitted to the at least one remote client that is responsive to the queries. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: May 12, 2020
    Assignee: SAP SE
    Inventors: Udo Klein, Michael Kusber
  • Patent number: 10644878
    Abstract: A system and method for private key management in a public key encryption system are disclosed. In one embodiment, the system and method may utilize a “fake” private key to provide the private key management.
    Type: Grant
    Filed: June 24, 2016
    Date of Patent: May 5, 2020
    Assignee: NTT Research
    Inventor: Go Yamamoto
  • Patent number: 10645117
    Abstract: Systems and methods to detect the identities of victims of phishing activities, in which embedding, in an item, an element having a reference to a server, is embedded in an item (e.g., a webpage or a mobile application) that may be copied by attackers. When used on a user computer, the element generates a request to the server. Based on the request, the server identifies a user of the element embedded in the item or a copy of the item. Based on uses of the element, the server tracks a history of the user using the item or the copy of the item. In response to a determination that the element is currently being used by the user in the item and the history indicates that the user has used the copy of the item, the server identifies the user as a victim of the copy of the item.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: May 5, 2020
    Assignee: Easy Solutions Enterprises Corp.
    Inventor: Javier Fernando Vargas Gonzalez
  • Patent number: 10645089
    Abstract: An example terminal includes a communication circuitry configured to communicate with a server; and a data processor configured to request the server to include a second user in a relationship group of a first user and to extend, to the relationship group, a range of authorization for an Internet of Things (IoT) apparatus registered as an apparatus of the first user.
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: May 5, 2020
    Assignees: SAMSUNG ELECTRONICS CO., LTD., KOREA ELECTRONICS TECHNOLOGY INSTITUTE
    Inventors: Ji-min Chung, Seung-woo Kum, Young-sun Ryu, Tae-beom Lim
  • Patent number: 10642256
    Abstract: A system includes a processor configured to determine that a first user will transition from a first climate-controllable environment to a second climate-controllable environment within a threshold time. The processor is also configured to compare first and second environment temperatures. The processor is further configured to detect whether a second-user control device is in communication with a second-environment climate control and set the second-environment climate control to a desired temperature, based on the first environment temperature, responsive to an absence of the second-user control device.
    Type: Grant
    Filed: June 5, 2017
    Date of Patent: May 5, 2020
    Assignee: Ford Global Technologies, LLC
    Inventors: Benjamin M. Rocci, Michael David Beeney, Mark Anthony Rockwell
  • Patent number: 10644892
    Abstract: The present disclosure relates to implementations of physically unclonable functions (PUFs) for cryptographic and authentication purposes. Specifically, the disclosure describes implementations of machine learning engines (MLEs) in conjunction with PUFs generating outputs having multiple states.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: May 5, 2020
    Assignee: ARIZONA BOARD OF REGENTS ON BEHALF OF NORTHERN ARIZONA UNIVERSITY
    Inventors: Fatemeh Afghah, Bertrand Francis Cambou
  • Patent number: 10637842
    Abstract: The present disclosure provides a method and system for sharing a real time, dynamic, adaptive and non-linearly assembled video on one or more publisher platforms. The method includes collection of a first set of information associated with a publisher platform of the one or more publisher platforms and fetching a set of preference data of the user from the publisher platform in the real time. The method includes fragmentation of each tagged video into the one or more tagged fragments and segregation of one or more mapped fragments into one or more logical sets of mapped fragments. The method includes mining of semantic context information and clustering of the one or more logical sets of mapped fragments into the one or more logical clusters of mapped fragments. The method includes assembling the one or more logical clusters of mapped fragments and sharing an assembled video on the publisher platform.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: April 28, 2020
    Inventors: N. Dilip Venkatraman, Savitri Dilip
  • Patent number: 10632315
    Abstract: Embodiments described herein relate to implantable medical devices (IMDs) and methods for use therewith. Such a method includes enabling a communication capability of an IMD during a message alert period and monitoring for a message while the communication capability is enabled during the message alert period. In response to receiving a message during the message alert period, there is a determination whether the message is valid or invalid. If the message is invalid, the message is ignored, and an invalid message count is incremented. A further message is monitored for during the message alert period occurs, when the invalid message count has not yet reached a corresponding invalid message count threshold. The communication capability of the IMD is disabled for a disable period, when the invalid message count reaches the corresponding invalid message count threshold. If a valid message is received, the IMD acts upon information included therein.
    Type: Grant
    Filed: May 10, 2018
    Date of Patent: April 28, 2020
    Assignee: Pacesetter, Inc.
    Inventors: Matthew G. Fishler, Benjamin T. Persson, Suresh Gurunathan
  • Patent number: 10621327
    Abstract: A resource instrument system, alone or in combination with a user computer system, may be utilized to capture information from third-party resource instruments associated with interactions, using a reader component, and process such third-party resources. Additionally, or alternatively, the resource instrument systems may also automatically capture interaction information associated with an interaction and automatically create one or more first resource instruments, using a writing component, in order utilize the one or more first resource instruments in interactions. Moreover, the resource instrument systems of multiple parties may interact with each other to facilitate electronic interactions that may include providing aggregated resources from multiple parties and providing a resource instrument to a third-party.
    Type: Grant
    Filed: October 11, 2017
    Date of Patent: April 14, 2020
    Assignee: BANK OF AMERICA CORPORATION
    Inventor: Manu Jacob Kurian