Patents Examined by Jason C Chiang
-
Patent number: 10116445Abstract: A result of application of a test to information about a user (U) is securely transmitted between a source of information (A) and a destination of information (B) via an intermediary device (C). The source of information can be, for example, a database of personal data, and the destination of information (B) a server of a service provider performing services depending on an age limit. The intermediary device (C) minimizes the information that is made available to the source (A) and the destination (B) about the purpose of the test and the underlying data. To this end, the intermediary device (C) executes a secure comparison protocol with the source (A), whereby the encrypted result is additionally blinded, for example, with a blinding that comes from the user. The intermediary device (C) decrypts the blinded encrypted result, so that a blinded result is left. The destination B removes the blinding, preferably on the basis of blinding information of the user.Type: GrantFiled: October 29, 2013Date of Patent: October 30, 2018Assignee: Nederlandse Organisatie Voor Toegepast-Natuurwetenschappelijk Onderzoek TnoInventor: Peter Joannes Mathias Veugen
-
Patent number: 10110579Abstract: Authenticated requests can be sent without requiring the requests to include or potentially expose secret information used for the authentication process. A client device use a security credential such as a key to sign a request to be sent to a recipient. When the request is received, the recipient determines whether the request was signed using the correct key for the sender. In some embodiments a client token is included with the request that statelessly encodes the key, enabling a recipient capable of decoding the client token to determine the key and compare that key to the signature of the request. The sender can store the secret information in a secure location, such as a browser security module, such that the secret information is not exposed to the browser or script executing on the client device.Type: GrantFiled: August 24, 2015Date of Patent: October 23, 2018Assignee: Amazon Technologies, Inc.Inventors: Nathan R. Fitch, Gregory B. Roth, Graeme D. Baer
-
Patent number: 10084604Abstract: There is provided a method of programming a smart card, said smart card comprising a secure element and a microcontroller unit which is connected to said secure element, the method comprising: (a) the secure element receives a firmware image from a host device; (b) the secure element validates the firmware image; (c) the secure element forwards the firmware image to the microcontroller unit if the firmware image is valid; (d) the microcontroller unit receives the firmware image from the secure element; (e) the microcontroller unit extracts firmware from the firmware image; and (f) the microcontroller unit installs the firmware in a memory unit of said smart card. Furthermore, a corresponding computer program product and a corresponding programmable smart card are disclosed.Type: GrantFiled: April 7, 2015Date of Patent: September 25, 2018Assignee: NXP B.V.Inventors: Arne Burghardt, Thomas Suwald, Fabian Mackenthun, Kiran G. Shekhar
-
Patent number: 10075465Abstract: Embodiments of the invention are directed to systems, methods and computer program products for determining exposure of an apparatus to a technical hazard and prioritizing technical hazards. An exemplary system is configured to: determine an impact associated with a technical hazard on the apparatus, the impact being initiated by a second apparatus; determine a probability of occurrence of the technical hazard; and determine the exposure of the apparatus based on the impact and the probability.Type: GrantFiled: March 6, 2017Date of Patent: September 11, 2018Assignee: Bank of America CorporationInventors: Santosh S. Nair, Shikhar Sood, Phani Gautham Tenneti
-
Patent number: 10061904Abstract: There is a performing of digital rights management (DRM), operable in an offline mode with respect to a communications network. The performing includes identifying a stored rights object associated with a stored asset. The stored rights object includes reporting duration information associated with the stored asset. The performing also includes determining, utilizing a processor, whether a transmission of an early status message is a successful communication based on an early status message determination. If a failure in communicating the early status message is determined, utilizing the stored asset. The performing may also include transmitting an early status message and/or later status message after identifying the stored rights object. There is also a performing of digital rights management (DRM) associated with a DRM system and operable in an offline mode with respect to a communications network. There are also client devices, communicating systems, computer readable mediums and protocols.Type: GrantFiled: December 10, 2015Date of Patent: August 28, 2018Assignee: GOOGLE TECHNOLOGY HOLDINGS LLCInventors: Nicol C. So, Thomas L. Du Breuil, Barry P. Falvo, Rama Raju Kaldindi, Ambikacharan P. Makam, Geetha Mangalore, Paul Moroney
-
Patent number: 10049212Abstract: In one embodiment, a processor includes at least one execution unit. The processor also includes a Return Oriented Programming (ROP) logic coupled to the at least one execution unit. The ROP logic may validate a return pointer stored on a call stack based on a secret ROP value. The secret ROP value may only be accessible by the operating system.Type: GrantFiled: September 22, 2015Date of Patent: August 14, 2018Assignee: Intel CorporationInventor: Stephen A. Fischer
-
Patent number: 10044743Abstract: The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs.Type: GrantFiled: November 10, 2015Date of Patent: August 7, 2018Assignee: AT&T Intellectual Property I, L.P.Inventors: Jerald Robert Howcroft, John J. Markley, Rocco A. Del Carmine
-
Patent number: 10044745Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.Type: GrantFiled: July 11, 2016Date of Patent: August 7, 2018Assignee: Palantir Technologies, Inc.Inventors: Samuel Jones, Joseph Staehle, Lucy Cheng
-
Patent number: 10027692Abstract: An example computer-implemented method includes receiving, via a processor, an application to be tested, a set of intrusive monitoring capabilities, and a set of external monitoring capabilities. The method includes executing, via the processor, the application in a clean environment to generate unmonitored application behavior. The method includes executing, via the processor, the application with intrusive monitoring based on two randomly generated seeds to generate trigger events and external monitoring to detect changes of application behavior in response to the intrusive monitoring. The method includes computing, via the processor, a correlation measure between the trigger events and the detected changes in the application behavior. The method includes modifying, via the processor, the application in response to detecting the application is evasive based on the correlation measure.Type: GrantFiled: January 5, 2016Date of Patent: July 17, 2018Assignee: International Business Machines CorporationInventors: Roee Hay, Sagi Kedmi, Omer Tripp
-
Patent number: 10021092Abstract: Systems and methods for providing access to secure information are disclosed. In one aspect, a computer-implemented method for providing access to secure information comprises receiving a first one-time password (OTP) from a computing device, and verifying whether the first OTP is valid. The method also comprises, if the first OTP is valid, performing the steps of generating a second OTP for accessing the secure information, and transmitting the second OTP to the computing device. In another aspect, a computer-implemented method for providing access to secure information comprises generating a first one-time password (OTP), and transmitting the first OTP to an OTP device. The method also comprises, in response to the first OTP, receiving a second OTP from the OTP device, and sending the second OTP to a system that controls access to the secure information, wherein the first OTP is different from the second OTP.Type: GrantFiled: March 3, 2016Date of Patent: July 10, 2018Assignee: GOOGLE LLCInventors: Randall R. Spangler, Sumit Gwalani
-
Patent number: 10007787Abstract: Input is received during runtime of a program. The input is a return instruction address of a called function and a return target address of the program. A determination is made whether the instruction immediately prior to the return target address is a call to the called function. If the instruction immediately prior to the return target address is not a call to the called function, a notification is transmitted that return-oriented programming is suspected.Type: GrantFiled: December 28, 2015Date of Patent: June 26, 2018Assignee: International Business Machines CorporationInventors: Omer Y. Boehm, Nitzan Peleg
-
Patent number: 9992166Abstract: At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model includes a plurality of message model sections. A representation of the at least one of an HTTP request message and an HTTP response message is parsed into message sections in accordance with the message model sections of the HTTP message model. A plurality of security rules are bounds to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition, which is based, at least in part, on a corresponding given one of the message sections. The at least one of an HTTP request message and an HTTP response message is processed in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided.Type: GrantFiled: December 5, 2015Date of Patent: June 5, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peng Ji, Lin Luo, Vugranam C. Sreedhar, Shun Xiang Yang, Yu Zhang
-
Patent number: 9990249Abstract: Apparatus, systems, and/or methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in memory. In addition, a determination may be made as to whether the unencrypted data includes a random distribution of the plurality of bits, for example based on a compressibility function. An integrity action may be implemented when the unencrypted data includes a random distribution of the plurality of bits, which may include error correction including a modification to ciphertext of the unencrypted data. Independently of error correction, a diffuser may generate intermediate and final ciphertext. In addition, a key and/or a tweak may be derived for a location in the memory. Moreover, an integrity value may be generated (e.g., as a copy) from a portion of the unencrypted data, and/or stored in a slot of an integrity check line based on the location.Type: GrantFiled: December 24, 2015Date of Patent: June 5, 2018Assignee: Intel CorporationInventors: David M Durham, Siddhartha Chhabra, Sergej Deutsch, Men Long, Alpa T Narendra Trivedi
-
Patent number: 9973475Abstract: A gateway device for implementing data security is described herein. The gateway device is coupled between a client device and a server device, and is configured to receive encoded data and a set of operations from the server device in response to a request for cloud services from the client device. The gateway device is configured to decode the encoded data, and to provide the decoded data and the set of operations to the client device. The client device is configured to perform the set of operations on the decoded data, and to incorporate the operation results into an application or interface corresponding to the requested cloud service. The gateway device is configured to encode the operation result data, and to provide the encoded operation result data to the server device for storage.Type: GrantFiled: October 16, 2015Date of Patent: May 15, 2018Assignee: Protegrity CorporationInventors: Rajnish Jain, Vichai Levy, Ulf Mattsson, Yigal Rozenberg
-
Patent number: 9961108Abstract: A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolator that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.Type: GrantFiled: August 29, 2016Date of Patent: May 1, 2018Assignee: Savannah River Nuclear Solutions, LLCInventors: Jody Rustyn Coleman, Richard W. Poland
-
Patent number: 9961085Abstract: A network entity that allows collaboration among end users of a collaborative application by using different identifiers. The network entity receives an authentication request from a collaborative application to authenticate an end user. The network entity uses a first identifier of the end user that is associated with the network entity to verify that end user is permitted to use the collaborative application and informs the collaborative application that the end user is permitted to use the collaborative application. The network entity receives from the collaborative application a second identifier of the end user that is not associated with the network entity. The second identifier is linked to the first identifier. The network entity allows the second identifier to be used to authenticate the user with the collaborative application without the need to use the first identifier when a collaborative session is begun.Type: GrantFiled: June 15, 2015Date of Patent: May 1, 2018Assignee: Microsoft Technology Licensing, LLCInventor: Chetan Pentam Raghavendra
-
Patent number: 9954684Abstract: Among other things, at a central server, management of a document sharing process includes uploading from client devices through a communication network, storing at the server, and downloading to client devices through the communication network documents that are shared between users of the client devices. Encryption keys are used to protect features of the documents from unauthorized or unintended disclosure. Operations are performed on encryption keys or encrypted data as a result of which protection of features of the documents from unauthorized or unintended disclosure may be compromised. A determination is made whether performance of a given one of the operations on any of the encryption keys or encrypted data meets predefined conditions for approval by members of an approval group. Performance of the operation on the encryption key or encrypted data is controlled based on a result of the determination.Type: GrantFiled: February 29, 2016Date of Patent: April 24, 2018Assignee: PreVeil LLCInventors: Raluca Ada Popa, Nickolai Zeldovich, Sanjeev Verma, Randall Steven Battat, Aaron Delano Burrow
-
Patent number: 9946887Abstract: A method includes determining at least one value for at least one instance of data; determining at least one privacy policy, at least one security policy, or a combination thereof based, at least in part, on the at least one value; and causing, at least in part, an application of the at least one privacy policy, the at least one security policy, or a combination thereof with respect to the at least one instance of data.Type: GrantFiled: June 4, 2012Date of Patent: April 17, 2018Assignee: NOKIA TECHNOLOGIES OYInventors: Jan Otto Blom, Julian Charles Nolan
-
Patent number: 9935964Abstract: An aspect of the present disclosure facilitates controlling access to objects having attributes defined against hierarchically organized domains, with each domain containing a corresponding fixed number of values. In one embodiment, in response to receiving data indicating specific hierarchies of the hierarchically organized domains, the corresponding fixed number of values of the corresponding domains in each hierarchy is displayed. Accordingly, a user is enabled to select a desired set of values from the corresponding fixed number of values of the corresponding domains, and to specify a security rule for a combination of the selected set of values and a user entity. The security rule is thereafter enforced when objects having attributes matching the selected set of values are accessed by the user entity.Type: GrantFiled: February 23, 2015Date of Patent: April 3, 2018Assignee: ORACLE FINANCIAL SERVICES SOFTWARE LIMITEDInventors: Rajaram Narasimha Vadapandeshwara, Bhargava Srinivasa, Gangadhar Nagulakonda
-
Patent number: 9930046Abstract: The disclosed embodiments include methods and systems for providing information-technology (IT) assets in an open environment. In certain aspects, an IT system may provide an online portal that presents an IT self-serve store of IT assets that a user may select for access or use. The IT system may, for example, determine that the selected IT assets comply with one or more compliance and permissioning policies, and based on the determination, may assemble the selected IT assets to generate or “spin-up” instances of applications executable by various hardware platforms. The IT system may also perform processes that perform automated operations relating to certain IT assets, such as testing, modeling, recommendations, etc.Type: GrantFiled: April 7, 2015Date of Patent: March 27, 2018Assignee: The Toronto-Dominion BankInventors: Mok Choe, Paul Mon-Wah Chan, Ali Hosseinian