Patents Examined by Jason T Lee
-
Patent number: 10044748Abstract: A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS) data for the second network; examining the collected data relative to DNS data from known comprised and/or uncompromised computers in the second network; and determining the existence of the first network and/or the identity of compromised computers in the second network based on the examination.Type: GrantFiled: February 9, 2016Date of Patent: August 7, 2018Assignees: Georgia Tech Research Corporation, Georgia Institute of TechnologyInventors: David Dagon, Nick Feamster, Wenke Lee, Robert Edmonds, Richard Lipton, Anirudh Ramachandran
-
Patent number: 10026648Abstract: An integrated circuit includes an array of devices including a physically unclonable function (PUF) for chip authentication. A logic pattern is stored in the devices. The logic pattern is determined in accordance with processing variations during manufacture of the array. The logic pattern is represented with a first state for one or more devices with contact shorts and a second state with one or more devices without contact shorts.Type: GrantFiled: March 8, 2016Date of Patent: July 17, 2018Assignee: International Business Machines CorporationInventors: Qing Cao, Kangguo Cheng, Zhengwen Li, Fei Liu
-
Patent number: 10013562Abstract: An information processing device includes an interrupt information output request part configured to detect an input of interrupt information, which is information newly output with an output part and which includes a plurality of contents, when output information is being output with the output part. An output controller restricts the scope of the interrupt information being output with the output part based on the type of the output information. Thus, the information processing device is able to switch an operation as to whether or not to output personal information such as an incoming notice with the output part.Type: GrantFiled: February 7, 2014Date of Patent: July 3, 2018Assignee: NEC CORPORATIONInventor: Yasunari Maruyama
-
Patent number: 9973503Abstract: An internet-connected server comprising a first module for authorizing a user to access the server for: setting up, on the server, a given configuration for conducting a computer-executable experiment, wherein the given configuration comprises at least an executable instruction and a parameter or input data; executing, on the server, the computer-executable experiment with the given configuration so to produce a numerical result; certifying, on the server, the numerical result so to produce a certified result; and generating, on the server, a certification identifier of the certified result. The internet-connected server further comprises a second module for authorizing a reviewer for: providing the server with the certification identifier; and requesting and/or accessing, on the server, the certified numerical result on the basis of the provided certification identifier.Type: GrantFiled: December 15, 2015Date of Patent: May 15, 2018Assignee: Foundation of the IDIAP Research Institute (IDIAP)Inventors: Sebastien Marcel, Andre Anjos, Philip Abbet
-
Patent number: 9948620Abstract: A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple encryption operation is determined of the first processing element and the second processing element. The first processing element includes a first encryption key for encrypting the tuples as the leave the first processing element. An encryption workload is measured of the tuple encryption operation of a processing workload of the use of the first encryption key of a transfer of the stream of tuples. A threshold of the tuple encryption operation is determined. The second processing element is migrated to the first compute node and fused to the first compute node with the first processing element. The tuple encryption operation is removed from the first processing element.Type: GrantFiled: December 15, 2015Date of Patent: April 17, 2018Assignee: International Business Machines CorporationInventors: Eric L. Barsness, Michael J. Branson, John M. Santosuosso
-
Patent number: 9942277Abstract: A policy engine is situated within the communications path of a cloud computing environment and a user of the cloud computing environment to comply with an organization's policies for deploying web applications in the cloud computing environment. The policy engine intercepts communications packets to the cloud computing environment from a user, such as a web application developer, for example, in preparation for deploying a web application in the cloud computing environment. The policy engine identifies commands corresponding to the communications packets and directs the communications packets to appropriate rules engines corresponding to such commands in order to execute rules to comply with an organization's policies. Upon completion of execution of the rules, the communications packets are forwarded to the cloud computing environment if they comply with the policies.Type: GrantFiled: January 30, 2017Date of Patent: April 10, 2018Assignee: Pivotal Software, Inc.Inventors: Mark Lucovsky, Derek Collison, Vadim Spivak, Gerald C. Chen, Ramnivas Laddad
-
Patent number: 9940449Abstract: A user using a client computer registers with a server computer over a computer network by submitting a biometric scan of a body part of the user. The user commands the client computer to encrypt an electronic file. The client computer generates a private key, encrypts the electronic file and transmits the key to the server computer. The client computer saves the encrypted file. The encrypted file and the key are saved at different physical locations. The owner of the file is able to grant permission to other registered users to unlock the encrypted file.Type: GrantFiled: May 14, 2015Date of Patent: April 10, 2018Inventor: James McNulty