Patents Examined by Hee Song
  • Patent number: 10177906
    Abstract: The method for performing encryption including generating a secret key or a parameter for encrypting plaintext; converting the plaintext into ciphertext by using the secret key or the parameter; and transmitting the ciphertext to a database.
    Type: Grant
    Filed: April 15, 2015
    Date of Patent: January 8, 2019
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jae Woo Seo, Yong Ho Hwang, Sungwook Kim
  • Patent number: 10055594
    Abstract: A service proxy services as an application programming interface proxy to a service, which may involve data storage. When a request to store data is received by the service proxy, the service proxy encrypts the data and stores the data in encrypted form at the service. Similarly, when a request to retrieve data is received by the service proxy, the service proxy obtains encrypted data from the service and decrypts the data. The data may be encrypted using a key that is kept inaccessible to the service.
    Type: Grant
    Filed: March 14, 2016
    Date of Patent: August 21, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Eric Jason Brandwine, Matthew James Wren
  • Patent number: 10043001
    Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: August 7, 2018
    Assignee: Invincea, Inc.
    Inventors: Anup Ghosh, Scott Cosby, Alan Keister, Benjamin Bryant, Stephen Taylor
  • Patent number: 10013540
    Abstract: In one aspect, a device includes a processor and memory accessible to the processor. The memory bears instructions executable by the processor to receive input from at least one electromyograph, and based at least in part on the input, determine whether a user is authorized to manipulate the device to execute at least one function.
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: July 3, 2018
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Rod David Waltermann, Russell Speight VanBlon, Nathan J. Peterson, Arnold S. Weksler, John Carl Mese
  • Patent number: 9998475
    Abstract: A method for authorizing a smart-home device for enrollment with a demand-response program may include receiving, at a control server of an energy management system and for the smart-home device, identifying information for a user account. The method may also include sending the identifying information from the control server to an Application Program Interface (API) with an enrollment request. The method may additionally include receiving, at the control server, a determination from the API as to whether the identifying information for the user account was matched to an existing utility account. The method may further include based on the determination from the API, determining whether the smart-home device can be enrolled with the demand-response program.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: June 12, 2018
    Assignee: Google LLC
    Inventors: Scott Ruffner, Jonathan Crimins, Scott McGaraghan, William Greene, Jared Luxenberg
  • Patent number: 9946984
    Abstract: A system and method manages workflows exchanges a document between a first server associated with a first service provider and a second server associated with a second service provider over a network. A first workflow engine associated with the first service provider is configured to apply the document to a first workflow based on a first set of rules. A second workflow engine associated with the second service provider is configured to apply the document to a second workflow based a second set of rules. The first and second workflow engines run the first workflow at first service provider asynchronous to the second workflow at the second service provider. The system and method transports a document between the first service provider and second service provider. A first server encrypts the document to create an encrypted document and append an unencrypted header to the encrypted document. The header has a pairwise relationship identifier.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: April 17, 2018
    Assignee: AXINO SOLUTIONS GMBH
    Inventors: Mehdi Ahari, Klaas W. Scheppink
  • Patent number: 9918125
    Abstract: A method and system for remote viewing of multimedia content using a multimedia content distribution network (MCDN) is configured to duplicate multimedia content displayed on a first MCDN terminal device and route the duplicate multimedia content to a second MCDN terminal device. The MCDN terminal devices may be coupled to a local network at an MCDN client premises. The MCDN terminal devices may also include wireless telephony devices for mobile remote viewing functionality. The method may include transcoding of the multimedia content into a format suitable for the second MCDN terminal device.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: March 13, 2018
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Jerald Robert Howcroft, Michael Raftelis
  • Patent number: 9918228
    Abstract: A method, system and computer program product for session completion through co-browsing is claimed. The method can include establishing a content browsing session between a first computing device and a content server serving access to content to the first computing device and maintaining state data for the content browsing session. A co-browsing arrangement of the content can be created as between the first computing device and a second computing device and at least a subset of the state data can be cloned for use by the second computing device during co-browsing of the content. Thereafter, a modified form of the subset of the state data can be received from the second computing device resulting from the co-browsing of the content by the second computing device and the modified form of the subset of the state data can be provided to the first computing device for use during the content browsing session.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Andrew J. Ivory, Todd E. Kaplinger, Barry J. Pellas, Matthew T. Pellas
  • Patent number: 9900304
    Abstract: A method for implementing a third party application in a micro-blogging service is provided, in which upon reception of a first request for presenting a media message provided by a third party media source, a micro-blog server obtains login information of a user and configuration information corresponding to the third party media source, converts the login information to authorization information, generates a second request for presenting the media message provided by the third party media source, and transmits the second request to a third party application server; the third party application server extracts the media message corresponding to the second request from the third party media source through a micro-blog open platform, by using the authorization information of the user and the configuration information corresponding to the third party media source, and presents it for the user.
    Type: Grant
    Filed: June 22, 2017
    Date of Patent: February 20, 2018
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Wei Zheng
  • Patent number: 9898615
    Abstract: A processor-based method to defeat file and process hiding techniques in a computing device is provided. The method includes generating one of a path permutation, a symlink, or an address, for a path to open or obtain status of a tool or function in a library in a mobile computing device and making an open or status call for the tool or function, using the one of the path permutation, symlink or address. The method includes avoiding a pattern match and blocking, by an injected library, of the open or status call, the avoiding being a result of making the open or status call using the path permutation, symlink or address.
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: February 20, 2018
    Assignee: SYMANTEC CORPORATION
    Inventors: Nathan Evans, Azzedine Benameur, Yun Shen
  • Patent number: 9900312
    Abstract: Methods and systems for authenticating a user device employ a database of global network latencies categorized and searchable by location and calendar date-time of day usage, providing network latency by geography and by time. The database is constructed using voluminous daily data collected from a world-wide clientele of users who sign in to a particular website. Accuracy of the latency data and clock skew machine identification is made practical and useful for authentications using a service provider-proprietary, stable reference clock, such as an atomic clock, so that internal clock jitter of a service provider performing authentications does not affect the network latency time and clock skew identification of user devices. Increased authentication confidence results from using the database for correcting network latency times and user device signatures generated from the clock skew identifications and for cross checking the authentication using comparisons of initial registration to current sign in data.
    Type: Grant
    Filed: March 13, 2017
    Date of Patent: February 20, 2018
    Assignee: PAYPAL, INC.
    Inventors: Rasta A. Mansour, Upendra Mardikar
  • Patent number: 9898623
    Abstract: An encryption method includes accessing a look-up table (LUT) to implement countermeasures against side-channel attacks, such as embedding masks. The LUT is initialized by writing initialization values in the LUT by applying an address-mask to input data that identify a location of said LUT and a data-mask to data to be stored at a location of the LUT. The method includes carrying out an initialization of the LUT that includes providing at least one second address-mask and one second data-mask; and computing corresponding initialization values as a function of a logic combination of the aforesaid first address-mask and second address-mask and of a logic combination of the aforesaid first data-mask and second data-mask. In the resulting table the address data are masked only by the second address-mask and the data are masked only by the second data-mask. The structure of the LUT may allow convenient implementation by initializing all the values of the LUT in parallel in one cycle.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: February 20, 2018
    Assignee: STMICROELECTRONICS S.R.L.
    Inventor: Filippo Melzani
  • Patent number: 9875377
    Abstract: A device of the Substitution-Box (S-Box) type, which is suitable for operating in a symmetric-key encryption apparatus, in particular an AES (Advanced Encryption Standard) encryption apparatus, and includes at least one module configured for carrying out a non-linear operation in a finite field (GF(28)) of an encryption method implemented by the above encryption apparatus, the module including at least one reprogrammable look-up table to, for example, implement countermeasures against side-channel attacks. When no countermeasures are employed, the tables may be set to fixed values, instead of being reprogrammable. The above module includes a plurality of composite look-up tables that implement the non-linear operation in a composite field of finite subfields (GF(24)2; GF((22)2)2) deriving from the finite field (GF(28)), each of the above composite look-up tables being smaller than a look-up table that is able to implement autonomously the non-linear operation in a finite field (GF(28)).
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: January 23, 2018
    Assignee: STMICROELECTRONICS S.R.L.
    Inventor: Filippo Melzani
  • Patent number: 9872174
    Abstract: Methods, systems, and apparatus are described for transferring application data between devices. In one aspect, a method includes causing, by a first service running on a first device, the first device to establish a wireless connection with a second device; receiving, from a second service running on the second device, data specifying applications that are installed on the second device and supported by the second service, each of the applications being separate from the second service; determining, by the first service, that a first application installed on the first device matches one of the applications installed on the second device, the first application being separate from the first service; receiving, by the first service, first application data from the first application; and causing, by the first service, the first device to send the first application data to the second service running on the second device using the wireless connection.
    Type: Grant
    Filed: September 19, 2014
    Date of Patent: January 16, 2018
    Assignee: Google Inc.
    Inventors: Vincent Wei-Kang Chen, Paul Lee, Gregory M. Hecht, Erdi Chen, Jenny Chun-yi Chen, Maria-Ines Carrera, Estelle Laure Myriam Comment, Eric Chu, Peter Jin Hong, Christopher John Adams, Lucas Gill Dixon
  • Patent number: 9846783
    Abstract: Methods and systems for securely accessing content irrespective of the security of the environment in which the content is being accessed are described herein. In some embodiments, a mobile computing device may determine whether secure enterprise content is being accessed on a mobile computing device. In response to determining that a private user device (e.g., virtual reality or augmented reality headwear/eyewear), is communicatively coupled to the mobile computing device, the mobile computing device may prevent the secure content from display on the mobile computing device and instead generate the secure enterprise content for presentation in an unencrypted form on the private user device.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: December 19, 2017
    Assignee: Citrix Systems, Inc.
    Inventor: Ashish Goyal
  • Patent number: 9846771
    Abstract: An API gateway designed to process a high volume of API requests for data and services where relatively large payloads are returned to the requester. The API gateway includes an “on-line” component that, for each API request, examines information in the request to increment an API usage count by API ID and product key. The usage information is periodically pushed to an outbound message queue, where it is later populated in a database. An “off-line” component determines if a customer has exceeded its predetermined quota based on the information in the database. This determination is pushed to another message queue that is periodically read by the on-line component to update the in-memory API ID, product key and API validity flag values. As such the on-line component is able to service a high volume of API requests for data with a low latency.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: December 19, 2017
    Assignee: TWC PATENT TRUST LLT
    Inventor: Sathish Kumar Gaddipati
  • Patent number: 9832222
    Abstract: There is provided an anti-malware mobile content data management apparatus, for use in managing content data within an input electronic file containing content data to be sent over a wireless network including at least one mobile device being served by the wireless network, at least one tokenizer to tokenize the content data contained within the input electronic file into a tagged generic representation of the content data, a content management engine to apply a predetermined content management policy to the tagged generic representation of the content data to form content-managed tagged generic content data and a validator to create validated content-managed content data by being arranged to ensure the content-managed content data represented in the content-managed tagged generic representation conforms to any predefined limits and rules applied to each form of content data appearing in the content data of the input electronic file, wherein an output of the validator is operably coupled to the wireless netwo
    Type: Grant
    Filed: October 2, 2014
    Date of Patent: November 28, 2017
    Assignee: GLASSWALL (IP) LIMITED
    Inventor: Samuel Harrison Hutton
  • Patent number: 9825939
    Abstract: An identity federation and security token translation module and method for operable engagement with a web application or an internet information service (IIS). A first server includes computer-executable instructions defining the identity federation and security token translation module for managing and facilitating a creation of a custom security principal object for a user requesting access to the web application. A data cache stores the custom security principal object in a non-transitory computer readable media. The identity federation and security token translation module may be changed without making changes to the web application or the IIS.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: November 21, 2017
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventors: Robert Reilly, Sandeep Chakravarthy Chimakurthi, Bridget Huck
  • Patent number: 9819495
    Abstract: Embodiments include systems and methods of certificate-key pair generation. A processor of a network element may anticipate a demand for certificate-key pairs, and the processor may generate certificate-key pairs at a key length in accordance with the anticipated demand. The processor may monitor whether the generation of the certificate-key pairs at the key length meets an observed demand for the certificate-key pairs. The processor may adjust the key length when the generation of the certificate-key pairs at the key length does not satisfy the observed demand for the certificate-key pairs.
    Type: Grant
    Filed: October 2, 2014
    Date of Patent: November 14, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Vijay Anandrao Suryavanshi, Daniel Scott Abplanalp, Zhidian Du, Vaibhav Sudhir Jain, Bryant Keith Forsgren
  • Patent number: 9811669
    Abstract: Example embodiments of the present invention relate to a method, an apparatus, and a computer program product for privacy audit support via provenance-aware systems. The method includes associating a first identifier with a first data object and associating a second identifier with a second data object derived from the first data object according to a control object. Metadata for the second data object identifying the first data object and identifying the control object then may be stored.
    Type: Grant
    Filed: December 31, 2013
    Date of Patent: November 7, 2017
    Assignee: EMC IP Holding Company LLC
    Inventor: Stephen J. Todd