Patents Examined by Izunna Okeke
  • Patent number: 10142100
    Abstract: A system for managing user-controlled security keys in cloud-based scenarios is provided. In some implementations, the system performs operations comprising receiving an information request from a user device via a network, and generating a database query based at least in part upon the information request. The operations can comprise generating a request for a secret key for decrypting encrypted data when the database query requests the encrypted data and/or generating a request for a secret key for encrypting data when the database query requests to encrypt data. The operations can also comprise providing the request to a security key management entity via a network, receiving secret key information from the security key management entity via the network, and using the secret key information to form decrypted data or encrypted data. Related systems, methods, and articles of manufacture are also described.
    Type: Grant
    Filed: July 6, 2016
    Date of Patent: November 27, 2018
    Assignee: SAP SE
    Inventors: Meinolf Block, Christoph Hohner, Martin Schindewolf, Sascha Zorn
  • Patent number: 10142372
    Abstract: Methods and systems for protecting a secured network are presented. For example, one or more packet security gateways may be associated with a security policy management server. At each packet security gateway, a dynamic security policy may be received from the security policy management server, packets associated with a network protected by the packet security gateway may be received, and at least one of multiple packet transformation functions specified by the dynamic security policy may be performed on the packets.
    Type: Grant
    Filed: January 24, 2017
    Date of Patent: November 27, 2018
    Assignee: Centripetal Networks, Inc.
    Inventors: Steven Rogers, Sean Moore, David K. Ahn, Peter P. Geremia
  • Patent number: 10133681
    Abstract: Systems and methods for using encryption keys to manage data retention are described. In one embodiment, the systems and methods may include receiving data such as user data from a host of the storage drive, encrypting the data using an encryption key, writing the encrypted data to the storage drive, and retaining the encrypted data on the storage drive based at least in part on a validity of the encryption key.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: November 20, 2018
    Assignee: SEAGATE TECHNOLOGY LLC
    Inventors: Timothy Canepa, Ramdas Kachare
  • Patent number: 10127393
    Abstract: A computer-implemented method included: receiving, by an access manager, a query from a source; communicating the query from the access manager to a translator; translating the query into a next generation access control (NGAC) input; communicating the NGAC input to an NGAC engine, the NGAC engine including access control data; receiving the NGAC input; determining an authorization response; communicating the authorization response to the translator; translating the authorization response into a response statement; communicating the response statement to the access manager; communicating, if the response statement comprises a permitted statement: a permitted query to a database from the access manager, the permitted query comprising a data operation; and performing the data operation on data in the database; and blocking access by the source to data in the database if the response statement comprises a deny statement.
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: November 13, 2018
    Assignee: THE UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF COMMERCE
    Inventors: David Ferraiolo, Serban Gavrila, Gopi Katwala, Joshua Roberts
  • Patent number: 10127365
    Abstract: An application scaffold is generated based on an object model. The object model includes CDS objects and DCL objects. The CDS objects and the DCL objects are evaluated together with corresponding CDS annotations and DCL annotations. Based on the evaluation, a field control hub is generated. The field control hub evaluates the DCL annotations and determines, based on one or more authorization objects from the DCL annotations, field control data for a field from a number of fields of a UI. When a user requests the UI, the field of the UI is displayed in accordance with the determined field control data for a role of the user.
    Type: Grant
    Filed: April 19, 2016
    Date of Patent: November 13, 2018
    Assignee: SAP SE
    Inventors: Bernd Kauerauf, Nils Hartmann, Gregor Tielsch
  • Patent number: 10122740
    Abstract: A method, non-transitory computer readable medium, and network security apparatus that monitors received network traffic to obtain signal data for signals associated with the network traffic in accordance with a stored configuration. A model and configuration update(s) are generated and the stored configuration is updated based on the configuration update(s). The model includes a threshold for at least one of the signals. A determination is made when there is an anomaly in the network traffic based on the application of the model to the signal data or a match of at least a portion of the signal data to an anomalous traffic pattern received from a centralized analytic server computing device. A mitigation action is initiated, when the determining indicates that there is an anomaly in the network traffic. Accordingly, this technology facilitates dynamic and adaptive network traffic analysis and anomaly detection including improvements thereto independent of human intervention.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: November 6, 2018
    Assignee: F5 Networks, Inc.
    Inventors: Peter Finkelshtein, Shlomo Yona
  • Patent number: 10121392
    Abstract: Devices and methods for masking and unmasking sensitive data, based on a standard cryptographic algorithm defining a ciphering algorithm, and a deciphering algorithm using more resources than the ciphering algorithm are described. The masking of sensitive data is done by applying the deciphering algorithm to the sensitive data to obtain masked sensitive data. The unmasking of the masked sensitive data is done by applying the ciphering algorithm to the masked sensitive data to obtain sensitive data in plain form.
    Type: Grant
    Filed: February 23, 2017
    Date of Patent: November 6, 2018
    Assignee: IDEMIA FRANCE
    Inventors: Olivier Chamley, Christophe Giraud
  • Patent number: 10122534
    Abstract: A system that incorporates the subject disclosure may perform, for example, operations including receiving an encrypted secure token from a secure token application function that is remote from the communication device, storing the encrypted secure token in a secure element memory of the secure element, accessing user input requesting the encrypted secure token where the secure device processor is separate from the secure element and is in communication with the secure element, generating a modified secure token by adding identification information to the encrypted secure token and by performing a second encryption of the encrypted secure token with the identification information, receiving the modified secure token from the secure element, and providing the modified secure token to a receiving device. Other embodiments are disclosed.
    Type: Grant
    Filed: July 11, 2016
    Date of Patent: November 6, 2018
    Assignees: AT&T Intellectual Property I, L.P., AT&T Mobility II LLC
    Inventors: Walter Cooper Chastain, Stephen Emille Chin, Samuel King, Michael Suozzo, Nicholas Vondrak, Ismaila Wane
  • Patent number: 10116676
    Abstract: Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one embodiment, a service provider collects data relating to the online activity of users of third-party services and correlates the data with subscribers of the service provider to generate useful products and analytics (e.g., classifications, behavioral models, etc.) containing information relating to the subscribers' online activity. The generated products may be used to determine whether and how to modify services provided to individual subscribers, exported for use by third parties, or for other purposes.
    Type: Grant
    Filed: February 16, 2016
    Date of Patent: October 30, 2018
    Assignee: Time Warner Cable Enterprises LLC
    Inventors: Chris Roosenraad, Richard Harman, John W. Watson, Christopher Turner, Phil Arnhold, Brian Durham, Barbara Stovall
  • Patent number: 10104065
    Abstract: A method implemented by a network element (NE) configured as a streaming client, the method comprising obtaining, via a processor of the NE, a first authorization token for accessing a first media segment located on a content server, embedding, via the processor, the first authorization token in a first content request message for accessing the first media segment located on the content server, sending, via a transmitter of the NE to the content server, the first content request message comprising the first authorization token to request the first media segment, and receiving, via a receiver of the NE from the content server, the first media segment when the first authorization token is valid for accessing the first media segment located on the content server.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: October 16, 2018
    Assignee: Futurewei Technologies, Inc.
    Inventor: Xin Wang
  • Patent number: 10104051
    Abstract: Disclosed are examples of searching for content associated with multiple applications. In various examples, a first application can obtain a search query and provide a request to a second application to search for content associated with the second application that corresponds to the search query. The request can include a key that indicates to the second application that the first application is authorized to request the second application to search for the content. The first application can obtain a search result from the second application based on the request an present the search result in a user interface for the first application.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: October 16, 2018
    Assignee: AIRWATCH LLC
    Inventors: Sandeep Naga Kaipu, Subham Kumar Tyagi, Anantha Raman B R, Joel Sequeira, Vivek Ratilal Vekariya
  • Patent number: 10104062
    Abstract: A system that incorporates the subject disclosure may perform, for example, receiving a baseline credential and an external credential, mapping the external credential to the baseline credential in a secure element memory, receiving a request for an authentication from a secure device processor of the communication device where the request for the authentication includes a user credential inputted into the communication device, comparing the user credential with the baseline credential to verify the authentication, and providing the authentication and the external credential to the secure device processor without providing the baseline credential to enable the secure device processor to provide the external credential to an external entity device that is remote from the communication device. Other embodiments are disclosed.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: October 16, 2018
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Walter Cooper Chastain, Stephen Emille Chin
  • Patent number: 10104068
    Abstract: A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and determining whether the security token is valid. Providing the service may also involve determining a session security token if the security token is valid and generating a service response including the session security token. Providing the service may further involve receiving a service request including the session security token, determining whether the session security token is valid, and, if the session security token is valid, generating a second service response.
    Type: Grant
    Filed: August 8, 2017
    Date of Patent: October 16, 2018
    Assignee: FACEBOOK, INC.
    Inventor: Conor P. Cahill
  • Patent number: 10097560
    Abstract: The disclosed computer-implemented method for automatically adjusting user access permissions based on beacon proximity may include (1) identifying a network-enabled device that is attempting to access a network resource that is protected by a security policy, where the security policy identifies an access level at which one or more devices may access the network resource when the devices are within range of the short-range wireless signal from the secure beacon, (2) determining that the network-enabled device is within range of the short-range wireless signal from the secure beacon, and (3) establishing, according to the security policy, the access level at which the network-enabled device is allowed to access the network resource based at least in part on the network-enabled device being within range of the short-range wireless signal. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: October 9, 2018
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Kevin Jiang, Ilya Sokolov, Lei Gu
  • Patent number: 10097575
    Abstract: Implementations of the present disclosure involve a system and/or method of performing security asset management. The system and/or method may schedule vulnerability scanners to scan the various portions of one or more networks and obtain the results of the vulnerability scans. IP addresses may be assigned to each of vulnerability scanners to scan. The system obtains the results of the vulnerability scans and may adjust the results of the scans according to configuration of the one or more networks that an IP address is associated with. The system and/or method may also assign and reassign IP addresses amongst the scanners to optimize scanning speed.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: October 9, 2018
    Assignee: Level 3 Communications, LLC
    Inventors: Brad Bernay Doctor, Taylor Fraley, Daniel Joseph Romero, Brett Wentworth, Keshava Berg
  • Patent number: 10097552
    Abstract: A system may include at least one server having a processor and a communication interface communicatively coupled to an Internet connection and a non-transitory memory device storing instructions that cause the system to retrieve, from a data repository, user information corresponding to a user of products and/or services of a business entity, identify by, at least one a social network identification of the user, and match the user to a plurality of individuals based on the user information. The system may the plurality of social network communications associated with the social network identification of the user using rules provided by the rules engine server, and generate, by the sourcing engine server, based on the analyzed social network communications, a trigger condition based on predetermined criteria stored in a database and in response to the trigger condition, solicit, via a secure network, input from the matched individuals corresponding to the trigger condition.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: October 9, 2018
    Assignee: Bank of America Corporation
    Inventors: Cameron Wadley, Jiyoung Choi, Hamid Dalglijli, Thomas H. Judge, Britton T. Farrell, Katherine Dintenfass, Craig Terrill, Susan Varghese, Minh Vuong
  • Patent number: 10097568
    Abstract: Embodiments for domain name service (DNS) tunneling prevention by a processor. A DNS tunneling detection operation is requested to be performed upon receiving a DNS query. A response is generated based on the DNS tunneling detection operation such that the DNS tunneling detection operation indicates in the response that the DNS query for a domain name is associated with DNS tunneling activity.
    Type: Grant
    Filed: August 25, 2016
    Date of Patent: October 9, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Aaron K. Baughman, Mauro Marzorati, Gregory A. Porpora
  • Patent number: 10095864
    Abstract: A remote server dispatches an instruction packet to a node in a network through a linear communication orbit formed by a collection of nodes. The instruction packet propagates from node to node along the linear communication orbit until reaching the node. The instruction packet includes instructions for establishing a direct duplex connection between the node and the remote server. After dispatching the instruction packet to the node through the linear communication orbit, the remote server receives, from the node, a request for establishing the direct duplex connection. In response to receiving the request from the node, the remote server establishes the direct duplex connection. After establishing the direct duplex connection, the remote server issues instructions to the node to upload local data from the node to the remote server through the direct duplex connection.
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: October 9, 2018
    Assignee: TANIUM INC.
    Inventors: Christian L. Hunt, Thomas R. Gissel, Aaron Tarter, Daniel Floyd, Benjamin Hobbs
  • Patent number: 10089462
    Abstract: A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.
    Type: Grant
    Filed: August 29, 2017
    Date of Patent: October 2, 2018
    Assignee: CUPP Computing AS
    Inventor: Shlomo Touboul
  • Patent number: 10091167
    Abstract: A method of interpreting a rule and a rule-interpreting apparatus for rule-based security apparatus, and an apparatus implementing the method. The method comprises the following steps: designating a suspicious timeslot; if any packet does not present in the designated timeslot, capturing current incoming packets or capturing other incoming packets in the designated timeslot next time; automatically associating the packets in the designated timeslot to form at least one traffic flow corresponding to a connection or call; analyzing the at least one traffic flow to select at least one suspicious target traffic flow; and outputting the at least one selected suspicious target flow.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sheng-Tung Hsu, Chien Pang Lee, Pei-Chun Yao