Patents Examined by James J Wilcox
  • Patent number: 9253194
    Abstract: A computer is configured to impose an access restriction based upon user-provided information, such as a user's birthdate. In order to enforce such a restriction, the computer requests from a user an image of a valid identity document associated with the user, such as a valid driver's license. In response to receiving such an image from the user, the computer performs an image analysis on the image to extract user information. The computer might extract the user's name, address, birthdate, driver's license number, and/or other information from the image for instance. The computer may utilize the extracted information to determine whether the user should be granted access. The computer may determine based upon the extracted information, for instance, whether the age of the user is greater than a minimum age required to access the computer. The computer may be configured to restrict access to a Web site in this manner.
    Type: Grant
    Filed: August 7, 2014
    Date of Patent: February 2, 2016
    Assignee: Amazon Technologies, Inc.
    Inventor: Christopher L. McGilliard
  • Patent number: 9245096
    Abstract: An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing environment) is provided. Specifically, in one example, data (e.g., real-time and/or historical) pertaining to usage of a set of software installations on a set of (VM) instances in the networked computing environment is collected. When a request is received (e.g., from a requester) for a license for a particular software installation of the set of software installations, it is determined whether the license is available. If not, it is then determined whether the license is obtainable based on the collected data and a current configuration of the networked computing environment. Then, responsive to the license being obtainable, the requested license may be allocated.
    Type: Grant
    Filed: January 24, 2012
    Date of Patent: January 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 9239909
    Abstract: Approaches for preventing unauthorized access of sensitive data within an operating system (OS), e.g., a guest OS used by a virtual machine. Dummy data may be written over physical locations on disk where sensitive data is stored, thereby preventing a malicious program from accessing the sensitive data. Alternately, a delete operation may be performed on sensitive data within an OS, and thereafter the OS is converted into a serialized format to expunge the deleted data. The serialized OS is converted into a deserialized form to facilitate its use. Optionally, a data structure may be updated to identify where sensitive data is located within an OS. When a request to access a portion of the OS is received, the data structure is consulted to determine whether the requested portion contains sensitive data, and if so, dummy data is returned to the requestor without consulting the requested portion of the OS.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: January 19, 2016
    Assignee: Bromium, Inc.
    Inventors: Gianni Tedesco, Anushree Pole, Andrew Southgate, Ian Pratt, Vikram Kapoor, Gaurav Banga
  • Patent number: 9241003
    Abstract: A method of authenticating an entity includes associating a local identity of the entity with a global identity of the entity, the local identity being associated with a first one of a plurality of restricted access zones, associating the global identity of the entity with particular ones of the plurality of restricted access zones for granting access to the particular ones of the plurality of restricted access zones, receiving an authentication request from the entity to access a second one of the plurality of access zones where the authentication request includes the local identity of the entity, and authenticating the entity for access to the second one of the plurality of access zones responsive to receiving the authentication request when the second one of the plurality of restricted access zones is one of the particular ones of the plurality of restricted access zones that are associated with the global identity of the entity.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: January 19, 2016
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Brian Novack, Jerry Birkes, Alton Drake, Gary Toretti
  • Patent number: 9235693
    Abstract: A system and method for tracking and preventing an execution of an application on a user device are provided. The method comprises receiving a request to determine if an application is a restricted application for a user of the user device; receiving at least one context parameter respective of the application; receiving at least one variable related the user of the user device; determining whether the application is a restricted application based on the analysis of the at least one context parameter and the at least one variable parameter; and disabling an access of the user to contents of the application if the application is determined to be restricted.
    Type: Grant
    Filed: October 10, 2013
    Date of Patent: January 12, 2016
    Assignee: Doat Media Ltd.
    Inventors: Rami Kasterstein, Amihay Ben-David, Joey Joseph Simhon
  • Patent number: 9237132
    Abstract: Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, a switch maintains session data the session entries of which represent established traffic sessions between a source and a destination and form an association between the traffic session and a particular FSD. A data packet of a traffic session from a client device directed to a target device is received at the switch. When none of the session entries are determined to correspond to the data packet, an FSD is selected to associate with the first traffic session by performing a load balancing function on at least a portion of the data packet. When a matching session entry exists, an FSD identified by the matching session entry is selected to process the data packet. The data packet is then caused to be processed by the selected firewall security device.
    Type: Grant
    Filed: July 8, 2014
    Date of Patent: January 12, 2016
    Assignee: Fortinet, Inc.
    Inventors: Joe Mihelich, Son Pham, Jun Li
  • Patent number: 9231757
    Abstract: Technologies are generally described for proxy key generation, and signature generation and validation. In some examples, a cryptographic key generation system may include an original key generation unit configured to generate a public key and a private key for an original signer, a proxy key generation unit configured to generate one or more proxy public keys and one or more proxy private keys for one or more proxy signers, and a transmitter configured to transmit the proxy private keys respectively to the one or more proxy signers.
    Type: Grant
    Filed: December 5, 2012
    Date of Patent: January 5, 2016
    Assignee: INHA-INDUSTRY PARTNERSHIP INSTITUTE
    Inventor: DaeHun Nyang
  • Patent number: 9230096
    Abstract: A data loss prevention (DLP) manager running on a security virtual machine manages DLP policies for a plurality of guest virtual machines. The DLP manager identifies a startup event of a guest virtual machine, and installs a DLP component in the guest virtual machine. The DLP component communicates with the DLP manager operating within the security virtual machine. The DLP manager also receives file system events from the DLP component, and enforces a response rule associated with the guest virtual machine if the file system event violates a DLP policy.
    Type: Grant
    Filed: July 2, 2012
    Date of Patent: January 5, 2016
    Assignee: Symantec Corporation
    Inventors: Sumit Sarin, Sumesh Jaiswal
  • Patent number: 9223878
    Abstract: Improved mobile content presentation capabilities are disclosed for mobile communications facilities, such as cell phones. Information relating to the user characteristics associated with a mobile communication facility and other capabilities are employed to improve the presentation and relevance of mobile content to appropriate or desirable mobile communication facilities.
    Type: Grant
    Filed: July 31, 2009
    Date of Patent: December 29, 2015
    Assignee: Millenial Media, Inc.
    Inventors: Jorey Ramer, Adam Soroca, Dennis Doughty
  • Patent number: 9226141
    Abstract: Systems, methods, and computer-readable media for identifying and managing wireless devices that are performing tethering services are described. The system may include a database and server. The database stores records of services subscribed by wireless devices in a wireless network. The server may poll the database to generate a list of wireless devices that are not subscribed to a tethering service. In turn, the server receives notification messages from each wireless device that is tethering at least one other network element. The wireless devices are identified as unauthorized by the server when the notification message indicates existence of a configured network address translation table at the wireless device and the wireless device is located on the list of wireless devices that are not subscribed to the tethering service.
    Type: Grant
    Filed: November 4, 2013
    Date of Patent: December 29, 2015
    Assignee: Sprint Communications Company L.P.
    Inventor: Daniel Alberto Vivanco
  • Patent number: 9219608
    Abstract: A system, apparatus, and method in a communication system allow sharing contents of users by acquiring an access right even if there is no connection relationship in a Social Network Service (SNS). The system includes an SNS provider and a middleware server. The SNS provider provides the SNS and generates an authorization key and an authorization token according to an open authorization protocol. The middleware server obtains contents of a second user from the SNS provider by using an authorization key of the second user when a first user requests sharing SNS contents of the second user, and transmits the contents of the second user to the first user.
    Type: Grant
    Filed: August 5, 2011
    Date of Patent: December 22, 2015
    Assignees: Samsung Electronics, Co., Ltd, SNU R&DB Foundation
    Inventors: Jeong-Soo Lee, Hong-Gee Kim, Sang-Won Yang, Seung-Jae Song, Jin-Hyun Ahn, James G. Kim
  • Patent number: 9213832
    Abstract: Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output.
    Type: Grant
    Filed: January 24, 2012
    Date of Patent: December 15, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yair Amit, Ronen Bachar, Lotem Guy, Igal Kreichman, Ron Nordan, Roi Saltzman, Ori Segal
  • Patent number: 9208347
    Abstract: Embodiments for updating roles based system access to a user include systems for identifying an application login event and a role associated with the login event. Further the embodiments include selecting an application shell comprising data for an application, the data being associated with the identified role and where the application is a first version of the application, selecting a second version of the application that is different from the first version, modifying the data of the application shell in response to selecting the second version of the application, and providing the modified data to the application associated with a computing device of a user in response to the login event. In specific embodiments, data unrelated to the identified role is not provided to the application or stored in the computing device.
    Type: Grant
    Filed: November 5, 2013
    Date of Patent: December 8, 2015
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Jason N. Alexandrian, Hudson Philip Hoen, IV
  • Patent number: 9208309
    Abstract: Collecting log file data from at least one log file. From the collected log file data, at least one HTTP request can be generated to exercise a web application to perform a security analysis of the web application. The HTTP request can be communicated to the web application. At least one HTTP response to the HTTP request can be received. The HTTP response can be analyzed to perform validation of the web application. Results of the validation can be output.
    Type: Grant
    Filed: July 31, 2012
    Date of Patent: December 8, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yair Amit, Ronen Bachar, Lotem Guy, Igal Kreichman, Ron Nordan, Roi Saltzman, Ori Segal
  • Patent number: 9210155
    Abstract: Some embodiments of the present disclosure provide a system for providing access control. The system may include an extension module for extending a host website; and a marketplace server that is configured to: receive a request to access the extension module from a browsing device, the browsing device is for maintaining a browsing session with the host website, and the extension module is for exchanging data with the host website; generate a first authorization token that is associated with the browsing session; and send, to the browsing device, the first authorization token. The extension module may be configured to receive a second authorization token from the browsing device. One of the extension module or the marketplace server may then be further configured to: verify that the second authorization token matches the first authorization token; and if verification is successful, the extension module can be allowed to exchange data with the host website and communicate with the browsing device.
    Type: Grant
    Filed: March 4, 2014
    Date of Patent: December 8, 2015
    Assignee: Stocktree Inc.
    Inventor: Brian Amaro
  • Patent number: 9210471
    Abstract: In one embodiment of the present invention, a signal sampling method is provided. It comprises: (a) sampling an input signal with respect to a sampling clock signal; (b) calculating a maximum transition timing and a minimum transition timing of the input signal according to a relation between the sampling in step (a) and a reference timing clock; (c) defining a voltage level transition interval according to the maximum transition timing and the minimum transition timing; and (d) determining phase of the sampling clock signal or phase of the input signal according to the voltage level transition interval.
    Type: Grant
    Filed: February 24, 2014
    Date of Patent: December 8, 2015
    Assignee: MStar Semiconductor, Inc.
    Inventors: Chih-Hung Lin, Tsung-Hsiu Ko, Wei-Li Su
  • Patent number: 9208341
    Abstract: A method and system for synchronizing an encrypted file with a remote storage is disclosed. According to one embodiment, a computer-implemented method comprises providing a user with a user application and an encryption key in a portable memory device. The user runs the user application to securely access to a storage on a cloud storage system. A file is encrypted with the encryption key stored in the portable memory device and synchronized with the cloud storage system.
    Type: Grant
    Filed: October 8, 2013
    Date of Patent: December 8, 2015
    Assignee: Brainzquare Inc.
    Inventors: Seon Geun Kang, Jeong Hwan Park
  • Patent number: 9203845
    Abstract: A method of providing control preferences set by a person for a second person who is a prospective Internet user, the method comprising the steps of establishing a first account, the settings of the first account being stored in a database; establishing a second account, the settings of the second account being stored in the database; linking the first and second accounts such that control settings of the second account are determined through the first account; and viewing Internet content from the second account consistent with the control settings of the second account.
    Type: Grant
    Filed: September 3, 2010
    Date of Patent: December 1, 2015
    Assignee: VIRTUAL PIGGY, INC.
    Inventors: Jo Webber, Pradeep Ittycheria
  • Patent number: 9172546
    Abstract: Described in an example embodiment herein is an apparatus, comprising a communication interface and authentication logic coupled with the wireless interface. The authentication logic authenticates with at least one neighboring device forming a trust relationship with the at least one neighboring device. The authentication logic obtains via the communication interface data representative of a user associated with a user device. The authentication logic sends a challenge to the user device, via the communication interface, the challenge requesting data associated with the user associated with the user device. The authentication logic receives a response to the challenge via the user interface and validates the response to the challenge. The authentication logic provides data to the at least one neighboring device indicating that the user associated with the user device has been authenticated, to enable access to the functionality and/or resources of the at least one neighboring device.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: October 27, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Stephan Edward Friedl, Thomas Martin Wesselman, Steven Chervets
  • Patent number: 9172698
    Abstract: Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).
    Type: Grant
    Filed: October 11, 2013
    Date of Patent: October 27, 2015
    Assignee: UT-Battelle, LLC
    Inventors: Philip G. Evans, Travis S. Humble, Nathanael R. Paul, Raphael C. Pooser, Stacy J. Prowell