Patents Examined by Jacob Lipman
  • Patent number: 10554416
    Abstract: A computer data security system, useful in protecting audit logs, includes symmetric key based techniques, requires only a small-constant number of cryptographic hash operations at the signer side sending a prospective audit log or other computer record data to a primary repository to achieve forward-secure and append-only authentication. The verification is performed by independent parties sharing parts of the symmetric key, wherein the presence of single honest party among all verifier parties ensures a conditional non-repudiation. It also ensures that an active adversary cannot generate authentication tags on behalf of the signer, unless it compromises all verification parties.
    Type: Grant
    Filed: April 19, 2019
    Date of Patent: February 4, 2020
    Assignee: University of South Florida
    Inventor: Attila Altay Yavuz
  • Patent number: 10547624
    Abstract: When a security authentication request sent by a terminal is received, an identity authentication solution includes acquiring network environment information and user behavior data according to the security authentication request, then determining, according to the network environment information and the user behavior data, whether a current operation is a machine attack, and acquiring a CAPTCHA of a predetermined type according to a predetermined policy and delivering the CAPTCHA to the terminal if the current operation is a machine attack, to perform identity authentication, or determining that security authentication succeeds if the current operation is not a machine attack.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: January 28, 2020
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Tang Yan Ping, Zhang Yan Ling, Wang Yu Ye, Gong Ling, Huang Jia Qi, Wei Ren Jia
  • Patent number: 10546130
    Abstract: A Timed Attestation Process (TAP) utilizes a CPU bus cycle counter/timer to accurately measure the time needed to calculate a specific function value for an attestation query in an embedded system. The attestation query takes into account embedded software and the hardware data path. An attestation value database stores the unique timing and function data associated with each hardware design element in the embedded device, which each have unique timing characteristics. By utilizing the CPU bus cycle counter/timer of the client device, the TAP increases the time accuracy to the smallest tolerance possible relative to a particular CPU (typically +/?one instruction cycle). The integrity of the embedded software contained in the permanent storage elements and the hardware timing to access each component is verifiable against the unique timing characteristics stored in the database. With this timing characteristic, each hardware element is linked to a specific software configuration.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: January 28, 2020
    Assignee: United States of America as represented by the Secretary of the Air Force
    Inventor: Richard R Chaney
  • Patent number: 10547445
    Abstract: A method includes, with a computing system, exiting a context of a virtual machine, the exiting in response to a request from a guest operating system of the virtual machine to switch from a first encryption key identifier for the virtual machine to a second encryption key identifier for the virtual machine. The method further includes, with the computing system, loading the second encryption key identifier into a virtual machine control module of a virtual processor of the virtual machine and after loading the second encryption key identifier, entering the context of the virtual machine.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: January 28, 2020
    Assignee: RED HAT, INC.
    Inventor: Henri Van Riel
  • Patent number: 10547646
    Abstract: The present disclosure relates generally to threat detection, and more particularly, to techniques for analyzing security events using dynamic policies and displaying a consolidated view of active threats and user activity including the dynamic policies being triggered by the active threats and user activity. Some aspects are directed to the concept of a policy bus for injecting and communicating the dynamic policies to multiple enforcement entities and the ability of the entities to respond to the policies dynamically. Other aspects are directed providing a consolidated view of active threat categories, a count of policies being triggered for each threat category, and associated trends. Yet other aspects are directed to providing a consolidated view of users, applications being accessed by users, and the access policies, if any, implicated by the such accesses.
    Type: Grant
    Filed: September 15, 2017
    Date of Patent: January 28, 2020
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Aji Joseph, Paresh Raote, Lakshmi Hariharan, Kanishk Mahajan, Ashish Kolli, Moushmi Banerjee, Yitzchak Weiser, Weifang Xie, Jingyu Cui
  • Patent number: 10521574
    Abstract: The present invention relates to a portable electronic device and corresponding method allowing control of a remotely positioned electronic arrangement, allowing for improved user convenience and security improvements when combining gesture identification with fingerprint authentication.
    Type: Grant
    Filed: January 17, 2017
    Date of Patent: December 31, 2019
    Assignee: FINGERPRINT CARDS AB
    Inventor: Olis Olofsson
  • Patent number: 10523447
    Abstract: A secure element (SE) with a notion of time useful for checking secure items is disclosed herein. Use of Public Key Infrastructure (PKI) with secure elements is improved by verifying secure items used by an SE. Methods of obtaining time information by the SE include push, pull, opportunistic, and local interface methods. The SE uses the time information to evaluate arriving and stored public key certificates and to discard those which fail the evaluation. The SE, in some embodiments, uses the time information in cooperation with certificate revocation lists (CRLs) and/or online certificate status protocol (OCSP) stapling procedures.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: December 31, 2019
    Assignee: Apple Inc.
    Inventor: Xiangying Yang
  • Patent number: 10523646
    Abstract: A method for distributing encrypted cryptographic data includes receiving, by a key service, from a first client device, a request for a first public key. The method includes transmitting, by the key service, to the first client device, the first public key. The method includes receiving, by the key service, from an access control management system, an encryption key encrypted with the first public key and a request from a second client device for access to the encryption key. The method includes decrypting, by the key service, the encrypted encryption key, with a private key corresponding to the first public key. The method includes encrypting, by the key service, the decrypted encryption key, with a second public key received from the second computing device. The method includes transmitting, by the key service, to the second client device, the encryption key encrypted with the second public key.
    Type: Grant
    Filed: August 17, 2016
    Date of Patent: December 31, 2019
    Assignee: Virtru Corporation
    Inventor: William R. Ackerly
  • Patent number: 10496821
    Abstract: Client devices detect malware based on a ruleset received from a security server. To evaluate a current ruleset, an administrative client device initiates a ruleset evaluation of the malware detection ruleset. A security server partitions stored malware samples into a group of evaluation lists based on an evaluation policy. The security server then creates scanning nodes on an evaluation server according to the evaluation policy. The scanning nodes scan the malware samples of the evaluation lists using the rulesets and associate each malware sample with a rule of the ruleset based on the detections, if any. The security server analyzes the associations and optimizes the ruleset and stored malware samples. The security server sends the optimized ruleset to client devices such that they more efficiently detect malware samples.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: December 3, 2019
    Assignee: Malwarebytes Inc.
    Inventors: Sunil Mathew Thomas, Michael Graham Malone
  • Patent number: 10496820
    Abstract: Described herein are various technologies pertaining to providing information to a user regarding behavior of a potentially unwanted application. In response to this information, the user can determine action(s) to take regarding the potentially unwanted application. Further, optionally, based upon action(s) taken by the user, an adaptive component can modify information collected by a collector component.
    Type: Grant
    Filed: August 23, 2016
    Date of Patent: December 3, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Maxim Vainstein
  • Patent number: 10491614
    Abstract: Detecting illegitimate typosquatting with Internet Protocol (IP) information includes, at a computing device having connectivity to a network, obtaining a list of domains and filtering the list to generate a list of monitored domain strings. IP information is passively determined for domains associated with each of the monitored domain strings. A domain requested in network traffic for the network is identified as a candidate typosquatting domain and the candidate typosquatting domain is determined to be an illegitimate typosquatting domain based at least on the IP information. An action is initiated related to the illegitimate typosquatting domain.
    Type: Grant
    Filed: August 25, 2016
    Date of Patent: November 26, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Martin Grill, Jan Kohout, Martin Kopp, Tomas Pevny
  • Patent number: 10489610
    Abstract: Systems and methods are discussed herein for reusing hardware for encryption and authentication, where the hardware has a fixed input bandwidth, and where the hardware has the same bandwidth for a different input bandwidth. In order to accomplish this mechanism, systems and methods are provided herein for processing invalid data that appears within streams of valid data. Systems and methods are also provided herein for authentication mechanisms that require more than one data cycle to complete.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: November 26, 2019
    Assignee: Altera Corporation
    Inventor: Robert Groza
  • Patent number: 10482456
    Abstract: Systems and methods are provided for generating and managing dynamic customized electronic tokens for electronic device interactions. A system for transferring data between a user device associated with a user and a remote device may include a memory storing instructions and a processor configured to execute the stored instructions. The stored instructions may configure the processor to receive, via a network, transaction information from the remote device, access information associated with an electronic token, and provide the electronic token to the remote device. The electronic token may be associated with at least one of the user or the user device, and a token server may generate the electronic token based on the received transaction information, and determine one or more expiration parameters for the electronic token.
    Type: Grant
    Filed: October 3, 2018
    Date of Patent: November 19, 2019
    Assignee: Capital One Services, LLC
    Inventors: Paul Y Moreton, Matthew de Ganon, Thomas S Poole
  • Patent number: 10484803
    Abstract: A hearing instrument includes: a radio for reception of a broadcasted signal having a message, at least a part of the message has been encrypted with a first key, wherein the first key has been encrypted with a second key; an authenticator configured for authentication of the message by decrypting the first key with a third key, and decrypting the at least a part of the message with the first key; and a processing unit for converting the message into an acoustic signal for transmission towards an eardrum of a user of the hearing instrument.
    Type: Grant
    Filed: November 20, 2014
    Date of Patent: November 19, 2019
    Assignee: GN HEARING A/S
    Inventor: Brian Dam Pedersen
  • Patent number: 10476884
    Abstract: A method for controlling access to a user's personal information includes obtaining, from an application executing on a device of a user of the application, personal information about the user of an application; determining a required permission from the user for at least one proposed use of the personal information; presenting, to the user, a first offer to provide access to at least one enhanced function of the application in exchange for the required permission; and responsive to the user providing the required permission, providing the user with access to the at least one enhanced function of the application.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: November 12, 2019
    Assignee: VERIPATH, INC.
    Inventors: Nicholas Hall, Steven Eakin
  • Patent number: 10460128
    Abstract: In an example embodiment, an attribute interference model is trained by a machine learning algorithm to output missing attribute values from a member profile of a social networking service. In an attribute inference phase, an identification of a member of a social networking service is obtained. A member profile corresponding to the member of the social networking service is retrieved using the identification. The member profile is then passed to the attribute inference model to generate one or more missing attribute values for the member profile. A collection flow, defined in a user interface of a computing device, is modified based on the generated one or more missing attribute values, the collection flow defining a sequence of screens for collecting confidential data. The modified collection flow is then presented to the member in the user interface to collect confidential data from the member.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: October 29, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Krishnaram Kenthapadi, Stephanie Chou, Ahsan Chudhary, Ryan Wade Sandler
  • Patent number: 10461925
    Abstract: An integrated circuit may implement a masked substitution box that includes a counter that generates counter values. An input mask component may generate unmasked input values based on a combination of respective counter values and an input mask value. Furthermore, a substitution function component may receive the unmasked input values and may generate output values based on respective unmasked input values and a substitution function. An output mask component may generate masked output values based on a combination of respective output values and an output mask value. The masked output values may be stored at memory elements.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: October 29, 2019
    Assignee: Cryptography Research, Inc.
    Inventors: Matthew Pond Baker, Elena Trichina, Jean-Michel Cioranesco, Michael Hutter
  • Patent number: 10460087
    Abstract: A method is implemented by a network device communicatively coupled to a datacenter to detect a presence of unauthorized software and hardware in the datacenter. The method includes initiating deployment of a virtual agent on a node in the datacenter, where the virtual agent is to perform a security scan of the node and store results of the security scan in a memory allocated to the virtual agent at the node, and where the results of the security scan are to be encrypted using a data encryption key. The method further includes initiating migration of the virtual agent to a preconfigured location, where the results of the security scan are to be extracted from the virtual agent and decrypted at the preconfigured location.
    Type: Grant
    Filed: August 18, 2016
    Date of Patent: October 29, 2019
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Heikki Mahkonen, Wassim Haddad, Ravi Manghirmalani
  • Patent number: 10462115
    Abstract: Systems, methods, and non-transitory computer-readable storage media for a non-replayable communication system are disclosed. A first device associated with a first user may have a public identity key and a corresponding private identity. The first device may register the first user with an authenticator by posting the public identity key to the authenticator. The first device may perform a key exchange with a second device associated with a second user, whereby the public identity key and a public session key are transmitted to the second device. During a communication session, the second device may transmit to the first device messages encrypted with the public identity key and/or the public session key. The first device can decrypt the messages with the private identity key and the private session key. The session keys may expire during or upon completion of the communication session.
    Type: Grant
    Filed: November 1, 2017
    Date of Patent: October 29, 2019
    Assignee: Dropbox, Inc.
    Inventor: Graham Abbott
  • Patent number: 10447681
    Abstract: To establish a sign on session among single sign on (SSO)-enabled applications, a user can be prompted by an application for an access code. An access interval key can be generated using a key derivative function based on the access code. The access interval key can be considered a session key, and it can be used during a valid SSO session to decrypt a master key stored in a shared memory. In turn, the master key can be used to encrypt and decrypt the contents of the shared memory. To securely distribute the access interval key among the SSO-enabled applications during a current session, individual SSO-enabled applications can each store a public key in the shared memory. The access interval key can then be encrypted, respectively, by the public keys of the SSO-enabled applications and stored in the shared memory to be retrieved securely by the SSO-enabled applications.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: October 15, 2019
    Assignee: VMWARE, INC.
    Inventors: Kishore Sajja, Lucas Chen, Raghuram Rajan, Anuj Panwar, Sandeep Naga Kaipu, Rajiv Singh