Patents Examined by Jason C Chiang
  • Patent number: 10116445
    Abstract: A result of application of a test to information about a user (U) is securely transmitted between a source of information (A) and a destination of information (B) via an intermediary device (C). The source of information can be, for example, a database of personal data, and the destination of information (B) a server of a service provider performing services depending on an age limit. The intermediary device (C) minimizes the information that is made available to the source (A) and the destination (B) about the purpose of the test and the underlying data. To this end, the intermediary device (C) executes a secure comparison protocol with the source (A), whereby the encrypted result is additionally blinded, for example, with a blinding that comes from the user. The intermediary device (C) decrypts the blinded encrypted result, so that a blinded result is left. The destination B removes the blinding, preferably on the basis of blinding information of the user.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: October 30, 2018
    Assignee: Nederlandse Organisatie Voor Toegepast-Natuurwetenschappelijk Onderzoek Tno
    Inventor: Peter Joannes Mathias Veugen
  • Patent number: 10110579
    Abstract: Authenticated requests can be sent without requiring the requests to include or potentially expose secret information used for the authentication process. A client device use a security credential such as a key to sign a request to be sent to a recipient. When the request is received, the recipient determines whether the request was signed using the correct key for the sender. In some embodiments a client token is included with the request that statelessly encodes the key, enabling a recipient capable of decoding the client token to determine the key and compare that key to the signature of the request. The sender can store the secret information in a secure location, such as a browser security module, such that the secret information is not exposed to the browser or script executing on the client device.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: October 23, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Nathan R. Fitch, Gregory B. Roth, Graeme D. Baer
  • Patent number: 10084604
    Abstract: There is provided a method of programming a smart card, said smart card comprising a secure element and a microcontroller unit which is connected to said secure element, the method comprising: (a) the secure element receives a firmware image from a host device; (b) the secure element validates the firmware image; (c) the secure element forwards the firmware image to the microcontroller unit if the firmware image is valid; (d) the microcontroller unit receives the firmware image from the secure element; (e) the microcontroller unit extracts firmware from the firmware image; and (f) the microcontroller unit installs the firmware in a memory unit of said smart card. Furthermore, a corresponding computer program product and a corresponding programmable smart card are disclosed.
    Type: Grant
    Filed: April 7, 2015
    Date of Patent: September 25, 2018
    Assignee: NXP B.V.
    Inventors: Arne Burghardt, Thomas Suwald, Fabian Mackenthun, Kiran G. Shekhar
  • Patent number: 10075465
    Abstract: Embodiments of the invention are directed to systems, methods and computer program products for determining exposure of an apparatus to a technical hazard and prioritizing technical hazards. An exemplary system is configured to: determine an impact associated with a technical hazard on the apparatus, the impact being initiated by a second apparatus; determine a probability of occurrence of the technical hazard; and determine the exposure of the apparatus based on the impact and the probability.
    Type: Grant
    Filed: March 6, 2017
    Date of Patent: September 11, 2018
    Assignee: Bank of America Corporation
    Inventors: Santosh S. Nair, Shikhar Sood, Phani Gautham Tenneti
  • Patent number: 10061904
    Abstract: There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols.
    Type: Grant
    Filed: December 10, 2015
    Date of Patent: August 28, 2018
    Assignee: GOOGLE TECHNOLOGY HOLDINGS LLC
    Inventors: Nicol C. So, Thomas L. Du Breuil, Barry P. Falvo, Rama Raju Kaldindi, Ambikacharan P. Makam, Geetha Mangalore, Paul Moroney
  • Patent number: 10049212
    Abstract: In one embodiment, a processor includes at least one execution unit. The processor also includes a Return Oriented Programming (ROP) logic coupled to the at least one execution unit. The ROP logic may validate a return pointer stored on a call stack based on a secret ROP value. The secret ROP value may only be accessible by the operating system.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: August 14, 2018
    Assignee: Intel Corporation
    Inventor: Stephen A. Fischer
  • Patent number: 10044743
    Abstract: The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: August 7, 2018
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Jerald Robert Howcroft, John J. Markley, Rocco A. Del Carmine
  • Patent number: 10044745
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.
    Type: Grant
    Filed: July 11, 2016
    Date of Patent: August 7, 2018
    Assignee: Palantir Technologies, Inc.
    Inventors: Samuel Jones, Joseph Staehle, Lucy Cheng
  • Patent number: 10027692
    Abstract: An example computer-implemented method includes receiving, via a processor, an application to be tested, a set of intrusive monitoring capabilities, and a set of external monitoring capabilities. The method includes executing, via the processor, the application in a clean environment to generate unmonitored application behavior. The method includes executing, via the processor, the application with intrusive monitoring based on two randomly generated seeds to generate trigger events and external monitoring to detect changes of application behavior in response to the intrusive monitoring. The method includes computing, via the processor, a correlation measure between the trigger events and the detected changes in the application behavior. The method includes modifying, via the processor, the application in response to detecting the application is evasive based on the correlation measure.
    Type: Grant
    Filed: January 5, 2016
    Date of Patent: July 17, 2018
    Assignee: International Business Machines Corporation
    Inventors: Roee Hay, Sagi Kedmi, Omer Tripp
  • Patent number: 10021092
    Abstract: Systems and methods for providing access to secure information are disclosed. In one aspect, a computer-implemented method for providing access to secure information comprises receiving a first one-time password (OTP) from a computing device, and verifying whether the first OTP is valid. The method also comprises, if the first OTP is valid, performing the steps of generating a second OTP for accessing the secure information, and transmitting the second OTP to the computing device. In another aspect, a computer-implemented method for providing access to secure information comprises generating a first one-time password (OTP), and transmitting the first OTP to an OTP device. The method also comprises, in response to the first OTP, receiving a second OTP from the OTP device, and sending the second OTP to a system that controls access to the secure information, wherein the first OTP is different from the second OTP.
    Type: Grant
    Filed: March 3, 2016
    Date of Patent: July 10, 2018
    Assignee: GOOGLE LLC
    Inventors: Randall R. Spangler, Sumit Gwalani
  • Patent number: 10007787
    Abstract: Input is received during runtime of a program. The input is a return instruction address of a called function and a return target address of the program. A determination is made whether the instruction immediately prior to the return target address is a call to the called function. If the instruction immediately prior to the return target address is not a call to the called function, a notification is transmitted that return-oriented programming is suspected.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: June 26, 2018
    Assignee: International Business Machines Corporation
    Inventors: Omer Y. Boehm, Nitzan Peleg
  • Patent number: 9992166
    Abstract: At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model includes a plurality of message model sections. A representation of the at least one of an HTTP request message and an HTTP response message is parsed into message sections in accordance with the message model sections of the HTTP message model. A plurality of security rules are bounds to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition, which is based, at least in part, on a corresponding given one of the message sections. The at least one of an HTTP request message and an HTTP response message is processed in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided.
    Type: Grant
    Filed: December 5, 2015
    Date of Patent: June 5, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peng Ji, Lin Luo, Vugranam C. Sreedhar, Shun Xiang Yang, Yu Zhang
  • Patent number: 9990249
    Abstract: Apparatus, systems, and/or methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in memory. In addition, a determination may be made as to whether the unencrypted data includes a random distribution of the plurality of bits, for example based on a compressibility function. An integrity action may be implemented when the unencrypted data includes a random distribution of the plurality of bits, which may include error correction including a modification to ciphertext of the unencrypted data. Independently of error correction, a diffuser may generate intermediate and final ciphertext. In addition, a key and/or a tweak may be derived for a location in the memory. Moreover, an integrity value may be generated (e.g., as a copy) from a portion of the unencrypted data, and/or stored in a slot of an integrity check line based on the location.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: June 5, 2018
    Assignee: Intel Corporation
    Inventors: David M Durham, Siddhartha Chhabra, Sergej Deutsch, Men Long, Alpa T Narendra Trivedi
  • Patent number: 9973475
    Abstract: A gateway device for implementing data security is described herein. The gateway device is coupled between a client device and a server device, and is configured to receive encoded data and a set of operations from the server device in response to a request for cloud services from the client device. The gateway device is configured to decode the encoded data, and to provide the decoded data and the set of operations to the client device. The client device is configured to perform the set of operations on the decoded data, and to incorporate the operation results into an application or interface corresponding to the requested cloud service. The gateway device is configured to encode the operation result data, and to provide the encoded operation result data to the server device for storage.
    Type: Grant
    Filed: October 16, 2015
    Date of Patent: May 15, 2018
    Assignee: Protegrity Corporation
    Inventors: Rajnish Jain, Vichai Levy, Ulf Mattsson, Yigal Rozenberg
  • Patent number: 9961108
    Abstract: A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolator that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: May 1, 2018
    Assignee: Savannah River Nuclear Solutions, LLC
    Inventors: Jody Rustyn Coleman, Richard W. Poland
  • Patent number: 9961085
    Abstract: A network entity that allows collaboration among end users of a collaborative application by using different identifiers. The network entity receives an authentication request from a collaborative application to authenticate an end user. The network entity uses a first identifier of the end user that is associated with the network entity to verify that end user is permitted to use the collaborative application and informs the collaborative application that the end user is permitted to use the collaborative application. The network entity receives from the collaborative application a second identifier of the end user that is not associated with the network entity. The second identifier is linked to the first identifier. The network entity allows the second identifier to be used to authenticate the user with the collaborative application without the need to use the first identifier when a collaborative session is begun.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: May 1, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Chetan Pentam Raghavendra
  • Patent number: 9954684
    Abstract: Among other things, at a central server, management of a document sharing process includes uploading from client devices through a communication network, storing at the server, and downloading to client devices through the communication network documents that are shared between users of the client devices. Encryption keys are used to protect features of the documents from unauthorized or unintended disclosure. Operations are performed on encryption keys or encrypted data as a result of which protection of features of the documents from unauthorized or unintended disclosure may be compromised. A determination is made whether performance of a given one of the operations on any of the encryption keys or encrypted data meets predefined conditions for approval by members of an approval group. Performance of the operation on the encryption key or encrypted data is controlled based on a result of the determination.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: April 24, 2018
    Assignee: PreVeil LLC
    Inventors: Raluca Ada Popa, Nickolai Zeldovich, Sanjeev Verma, Randall Steven Battat, Aaron Delano Burrow
  • Patent number: 9946887
    Abstract: A method includes determining at least one value for at least one instance of data; determining at least one privacy policy, at least one security policy, or a combination thereof based, at least in part, on the at least one value; and causing, at least in part, an application of the at least one privacy policy, the at least one security policy, or a combination thereof with respect to the at least one instance of data.
    Type: Grant
    Filed: June 4, 2012
    Date of Patent: April 17, 2018
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Jan Otto Blom, Julian Charles Nolan
  • Patent number: 9935964
    Abstract: An aspect of the present disclosure facilitates controlling access to objects having attributes defined against hierarchically organized domains, with each domain containing a corresponding fixed number of values. In one embodiment, in response to receiving data indicating specific hierarchies of the hierarchically organized domains, the corresponding fixed number of values of the corresponding domains in each hierarchy is displayed. Accordingly, a user is enabled to select a desired set of values from the corresponding fixed number of values of the corresponding domains, and to specify a security rule for a combination of the selected set of values and a user entity. The security rule is thereafter enforced when objects having attributes matching the selected set of values are accessed by the user entity.
    Type: Grant
    Filed: February 23, 2015
    Date of Patent: April 3, 2018
    Assignee: ORACLE FINANCIAL SERVICES SOFTWARE LIMITED
    Inventors: Rajaram Narasimha Vadapandeshwara, Bhargava Srinivasa, Gangadhar Nagulakonda
  • Patent number: 9930046
    Abstract: The disclosed embodiments include methods and systems for providing information-technology (IT) assets in an open environment. In certain aspects, an IT system may provide an online portal that presents an IT self-serve store of IT assets that a user may select for access or use. The IT system may, for example, determine that the selected IT assets comply with one or more compliance and permissioning policies, and based on the determination, may assemble the selected IT assets to generate or “spin-up” instances of applications executable by various hardware platforms. The IT system may also perform processes that perform automated operations relating to certain IT assets, such as testing, modeling, recommendations, etc.
    Type: Grant
    Filed: April 7, 2015
    Date of Patent: March 27, 2018
    Assignee: The Toronto-Dominion Bank
    Inventors: Mok Choe, Paul Mon-Wah Chan, Ali Hosseinian