Patents Examined by Jeffery L Williams
  • Patent number: 10447731
    Abstract: Systems, methods, apparatuses, and software for electronic mail systems and service in computing environments are provided herein. In one example, an email service is provided that receives receive requests for endpoint information that correspond to email identities included in the requests. For ones of the requests that indicate invalid email identities, the email service determines responses that conceal validity of the invalid email identities by deriving target endpoint information based at least on the invalid email identities, and provides the responses that indicate the target endpoint information.
    Type: Grant
    Filed: May 26, 2017
    Date of Patent: October 15, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Deepak Kumar Singh, Sabitha Abraham, Patrick Tousignant
  • Patent number: 10440523
    Abstract: A communication control device includes an extracting and an output unit. One or more communication devices belong to a first-type group, and one or more communication devices belong to a second-type group. From a media key block containing a plurality of elements, the extracting unit extracts partial information containing an element which is processible by each communication device belonging to a subset of the second-type group. To the communication devices belonging to the second-type group that is identified by identification information corresponding to the partial information; the output unit outputs a group ID that indicates the first-type group, the identification information, and the partial information.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: October 8, 2019
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yoshikazu Hanatani, Toru Kambayashi, Fangming Zhao, Yoshihiro Oba
  • Patent number: 10432643
    Abstract: A system and method uses any or all of information of a user and/or user's activity at a second web site, information of the user's friends or other connections at the second web site, or registration information of the user, to determine whether to allow the user to communicate with other users of a first web site, prevent the user from communicating with other users of the first web site, or monitor the user's communications and allow or prevent the user from further communication based on the monitored communications at the first web site.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: October 1, 2019
    Assignee: Zoosk, Inc.
    Inventors: Alexander F. Mehr, Shayan G. Zadeh
  • Patent number: 10417408
    Abstract: Systems, methods, and computer program products are disclosed for authenticating access to a user device using tactile-based feedback provided to a user of the device. A user device may include a display layer and a tactile layer. The user device may be configured to selectively activate portions of the tactile layer to cause opposing regions of a surface of the display layer to become raised relative to other regions of the display surface. A user may be required to specify a sequence of directional movements corresponding to a correct passcode pattern by traversing a path along the raised regions. The particular arrangement of raised regions may change each time access to the user device is requested by activating different portions of the tactile layer, thereby giving the appearance to a third party that a different passcode pattern is being entered each time, and thus, minimizing likelihood of unauthorized passcode detection.
    Type: Grant
    Filed: March 10, 2017
    Date of Patent: September 17, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Hardee, Steven R. Joroff, Pamela A. Nesbitt, Scott E. Schneider
  • Patent number: 10402570
    Abstract: This disclosure relates to a method and device for software risk management within an IT infrastructure. The method includes computing security risk factors for a plurality of software components based on available executables for the plurality of software components. A set of software components are identified from the plurality of components, such that, a security risk factor for each of the set of software components is greater than a predefined threshold. Thereafter, a compensating control is activated for at least one of the set of software components, when a compensating control mechanism is available for each of the at least one software component and the compensating control mechanism satisfies control criteria. The method includes dynamically deploying at least one continuous monitoring tool satisfying monitoring criteria, to monitor each of at least one remaining software component, for which compensating control mechanism is not available, for a predefined duration.
    Type: Grant
    Filed: March 8, 2017
    Date of Patent: September 3, 2019
    Assignee: Wipro Limited
    Inventor: Sourav Sam Bhattacharya
  • Patent number: 10395045
    Abstract: A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder. The submitted files are scanned for plagiarism. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions.
    Type: Grant
    Filed: December 7, 2015
    Date of Patent: August 27, 2019
    Assignee: Dropbox, Inc.
    Inventors: Mindy Zhang, Pranav Piyush, Gideon Myles
  • Patent number: 10395059
    Abstract: A computer-implemented system and method to reduce re-identification risk of a data set. The method includes the steps of retrieving, via a database-facing communication channel, a data set from a database communicatively coupled to the processor, the data set selected to include patient medical records that meet a predetermined criteria; identifying, by a processor coupled to a memory, direct identifiers in the data set; identifying, by the processor, quasi-identifiers in the data set; calculating, by the processor, a first probability of re-identification from the direct identifiers; calculating, by the processor, a second probability of re-identification from the quasi-direct identifiers; perturbing, by the processor, the data set if one of the first probability or second probability exceeds a respective predetermined threshold, to produce a perturbed data set; and providing, via a user-facing communication channel, the perturbed data set to the requestor.
    Type: Grant
    Filed: March 7, 2017
    Date of Patent: August 27, 2019
    Assignee: PRIVACY ANALYTICS INC.
    Inventors: Martin Scaiano, Grant Middleton, Varada Kolhatkar, Khaled El Emam
  • Patent number: 10397212
    Abstract: An information device includes a reader, and a data processor. The reader reads, from a removable medium, ticket data that is provided from a server upon successful authentication, and that includes information representing a content of data processing to be executable upon the successful authentication. The data processor executes the data processing represented in the ticket data.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: August 27, 2019
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventors: Jun Anzai, Yoshihiko Kitamura, Mami Kuramitsu
  • Patent number: 10382431
    Abstract: Identifying a communication source includes receiving a message from a client computer requesting access to a computer-based resource; and receiving, a network signature from the client computer, wherein the network-related signature comprises a value representing how many routing devices are on a network path between the client computer and a predetermined computer. Also included is determining whether the vector of values matches a vector of stored values, each stored value potentially corresponding to a respective one of the values in the vector of values; and limiting access to the computer-based resource based at least in part on the vector of values not matching the vector of stored values.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: August 13, 2019
    Assignee: CA, Inc.
    Inventors: Himanshu Ashiya, Atmaram Shetye, Roshan Mathews
  • Patent number: 10360354
    Abstract: Example embodiments of the present invention may include an example method of performing steganography. The example method may include processing a data message into multiple message blocks each representing a portion of the data message, and assigning the multiple message blocks to a corresponding set of multiple data files. The method may also include storing the multiple data files in at least one memory location.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: July 23, 2019
    Assignee: OPEN INVENTION NETWORK LLC
    Inventor: William Charles Easttom, II
  • Patent number: 10331913
    Abstract: A method for searchable symmetric encryption. The method includes: accessing a computerized database that comprises keyword lists, each of the keyword lists comprising memory addresses of electronic documents that all contain a respective keyword; binning the memory addresses by performing balanced allocation of the memory addresses into ordered bins, such that at least some of the ordered bins each contains memory addresses of electronic documents that contain different keywords; encrypting each of the memory addresses with an encryption key that is derived from the keyword of the respective memory address; and storing the ordered bins at consecutive locations in a non-transient computer-readable memory, wherein the consecutive locations preserve the order of the ordered bins.
    Type: Grant
    Filed: January 19, 2017
    Date of Patent: June 25, 2019
    Assignees: Yissum Research Development Company of the Hebrew University of Jerusalem Ltd., Yeda Research and Development Co. Ltd.
    Inventors: Gil Segev, Ido Shahaf, Gilad Asharov, Moni Naor
  • Patent number: 10333970
    Abstract: A method and technique for protecting against denial of service attacks includes maintaining a window over a sequence number space that includes sequence numbers that are sequentially assigned to challenge messages where the window has a leading edge and a trailing edge. Responsive to receiving a request from a client, the leading edge of the window is advanced and a leading edge sequence number is selected as a challenge sequence number. A challenge message including the challenge sequence number is sent to a client. Responsive to receiving a response message from the client, it is verified that a challenge sequence number included with the response message is within the window and does not correspond to a marked sequence number within the window.
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: June 25, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Clark Debs Jeffries, Mohammad Peyravian
  • Patent number: 10325116
    Abstract: An example method of dynamic privilege management in a computer system includes: detecting launch of an application by a user in a login session of a desktop executing on the computer system; determining identification information for the application; evaluating at least one policy that specifies requirements for privilege elevation using the identification information as parametric input; generating a privilege elevation result for the application, the privilege evaluation result including a positive or negative indication of whether the at least one policy permits privilege elevation of a process created for the application within the login session; and elevating privilege of the process in response to the positive indication in the privilege elevation.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: June 18, 2019
    Assignee: VMware, Inc.
    Inventors: Sisimon Soman, Arnout Grootveld, Arindam Nag, Matt Conover
  • Patent number: 10326802
    Abstract: In an embodiment, a computer-implemented method comprises receiving, at multiple broker computing devices, device control data from a plurality of directory services in a federation; posting, by the broker computing devices, the device control data to a distributed datastore including distributed ledger and blockchain; receiving, at a computing hardware device, the device control data from the distributed datastore; in response to receiving the device control data from the distributed datastore, remotely managing, by the computing hardware device, user accounts and access control and security policies on at least one networked device.
    Type: Grant
    Filed: December 4, 2018
    Date of Patent: June 18, 2019
    Assignee: Xage Security, Inc.
    Inventors: Susanto Junaidi Irwan, Roman M. Arutyunov, Andy Sugiarto, Ganesh B. Jampani, Bao Q. Ngo
  • Patent number: 10305909
    Abstract: Systems and methods for network access control, including sending a service request from an on-premise system to one or more offloaded front-end services on one or more offloading servers. The requests by the offloaded services to access back-end services in one or more on-premise systems are monitored, and access requests by the offloaded services for unauthorized back-end services are denied. The service request is redirected and locally executed to generate logs of the back-end services used to perform the service request if the access requests are denied. A permission mapping in a firewall between the offloaded services and the logged back-end services is updated to permit future access requests by the offloaded services.
    Type: Grant
    Filed: August 9, 2018
    Date of Patent: May 28, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hiroshi H. Horii, Takuya Mishina
  • Patent number: 10305937
    Abstract: This invention provides secure, policy-based separation of data and applications on computer, especially personal computers that operate in different environments, such as those including personal applications and corporate applications, so that both types of applications can run simultaneously while complying with all required policies. The invention enables employees to use their personal devices for work purposes, or work devices for personal purposes. The secure, policy-based separation is created by dividing the data processing device into two or more “domains,” each with its own policies. These policies may be configured by the device owner, an IT department, or other data or application owner.
    Type: Grant
    Filed: May 25, 2018
    Date of Patent: May 28, 2019
    Assignee: Cellsec, Inc.
    Inventors: Yoav Weiss, David Goldschlag, Karl Ginter, Michael Bartman
  • Patent number: 10291632
    Abstract: Systems and methods for high performance IDS/IPS with efficient metadata filtering are provided. According to one embodiment, a signature database of an IDS/IPS is configured with multiple metadata signatures. A pre-match engine identifies a candidate packet of network traffic received by the IDS/IPS for full-feature match processing by: (i) categorizing the metadata signatures based on characteristics thereof; and (ii) processing and filtering a first set of the metadata signatures that forms part of a hash key based metadata signature category. The hash key based metadata signature category represents a category resulting from the categorization and each of the first set of metadata signatures is associated with a fixed unique hash key based on which respective metadata signatures are matched with the received network traffic to identify the candidate packet.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: May 14, 2019
    Assignee: Fortinet, Inc.
    Inventors: Juneng Zheng, Hongbin Lu
  • Patent number: 10225278
    Abstract: A method of assessing the security of a user's connection to a Sequenced Packet Exchange (SPX) network and the user's consumption of services via the SPX network. The invention includes digitally accessing a plurality of network nodes and obtaining data transmissions through said plurality of network nodes. Each transmission corresponds to a security implementation of a current state of the user's connection or consumption of SPX services. A coefficient is determined for each security implementation, wherein the coefficient corresponds to a weight given to each security implementation in determining a level of security of the user's connection or consumption. A security score representative of the level of security of the user's connection is calculated as a function of the security implementation and their corresponding coefficients. The security score is output to the user.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: March 5, 2019
    Assignee: Syniverse Technologies, LLC
    Inventor: Kathiravan Kandasamy
  • Patent number: 10218494
    Abstract: In a general aspect, a cryptography process performs modular operations, where the modulus is a non-Mersenne prime. In some aspects, an integer is obtained during execution of a cryptography protocol defined by a cryptosystem. A prime modulus is defined by the cryptosystem in terms of a set of constants. The set of constants includes at least a first constant and a second, distinct constant. A set of block coefficients is computed to represent the integer in a block form. The plurality of block coefficients includes a first block coefficient obtained by a first modular reduction modulo the first constant, and a second block coefficient obtained by a second modular reduction modulo the second constant. A reduced representation of the integer is computed based on the plurality of block coefficients, such that the reduced representation is less than the prime modulus.
    Type: Grant
    Filed: February 23, 2018
    Date of Patent: February 26, 2019
    Assignee: ISARA Corporation
    Inventors: Victoria de Quehen, Shane Daniel Kelly
  • Patent number: 10204241
    Abstract: Systems and methods are provided for adding security to client data by maintaining keys providing access to the client data remotely from the client data. In some circumstances, the systems encrypt a cluster of data using an encryption key, associate the cluster of encrypted data with a unique identifier and send the unique identifier and the decryption key to a server for storage. The decryption key is then received from the server and is used to decrypt the cluster of encrypted data. A server can also perform policy checks or trigger additional authentication such as SMS, phone, or email notification before allowing access to a key. Furthermore, in some instances, the server can also prevent access to the stored keys in response to anomalies, such as decommissioning and other asset management events.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: February 12, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Scott A. Field, Aravind N. Thoram, John Michael Walton, Dayi Zhou, Alex M. Semenko, Avraham Michael Ben-Menahem