Patents Examined by Jeffery L Williams
-
Patent number: 10785200Abstract: An information processing system is provided that includes a cloud server and an information processing terminal. The cloud server includes a storage device storing a program for using a cloud service and account information of a cloud account registered with the cloud service, and a first processor that manages execution of an authentication process for controlling access to the cloud service. The information processing terminal includes a second processor that executes processes of acquiring the program from the cloud server, sending a sign-up request to the cloud server to sign up for the cloud service using an external account of an external service, sending a setup request to the cloud server to set up a passcode or a character string to be used for signing in to the cloud service, and sending a sign-in request to the cloud server to sign in to the cloud service using the cloud account.Type: GrantFiled: November 22, 2017Date of Patent: September 22, 2020Assignee: Ricoh Company, Ltd.Inventor: Rina Takahashi
-
Patent number: 10776511Abstract: Embodiments described herein provide a privacy mechanism to protect user data when transmitting the data to a server that estimates a frequency of such data amongst a set of client devices. One embodiment uses a differential privacy mechanism to enhance a user experience by inferring potential user preferences from analyzing crowdsourced user interaction data. Based on a statistical analysis of user interactions in relation to various features or events, development efforts with respect to application behavior may be refined or enhanced. For example, user interactions in relation to the presentation of content such as content from online sources may be analyzed. Accordingly, presentation settings or preferences may be defined based on the crowdsourced user interaction data.Type: GrantFiled: November 7, 2017Date of Patent: September 15, 2020Assignee: Apple Inc.Inventors: Kevin W. Decker, Conrad Shultz, Steve Falkenburg, Mateusz Rajca, Abhishek Bhowmick, Andrew H. Vyrros, Umesh S. Vaishampayan
-
Patent number: 10756899Abstract: A computing device stores a set of executable code comprising first, second and third subsets of data. The first and second subsets of data comprise first and second encrypted data, respectively. Responsive to receipt of first authentication data for authenticating a respective user, the computing device is arranged to decrypt one of the first and second encrypted data to generate decrypted data, and to configure the third subset of data based on the decrypted data. The third subset of data, having been so configured, is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the respective user. Thus an application-level log in is provided.Type: GrantFiled: September 23, 2015Date of Patent: August 25, 2020Assignee: BlackBerry LimitedInventors: Haniff Somani, Siavash James Joorabchian Hawkins
-
Patent number: 10749791Abstract: Embodiments of the present invention provide a system for rerouting electronic data transmissions based on generated solution data models. The system is typically configured for generating one or more solution data models comprising a plurality of asset systems and a plurality of users and storing the one or more solution data models in a model database, determine occurrence of an event associated with at least a first asset of the plurality of asset systems, extracting a first solution model associated with the first asset from the model database, determining one or more asset systems connected with the first asset based on the one or more relationships, identifying electronic data transfer jobs associated with the first asset and the one or more asset systems, and cancelling the electronic data transfer jobs associated with the first asset and the one or more asset systems.Type: GrantFiled: November 15, 2017Date of Patent: August 18, 2020Assignee: Bank of America CorporationInventors: Aaron Dion Kephart, Katy Leigh Huneycutt, Richard LeRoy Hayes
-
Patent number: 10749685Abstract: Provisioning a data rate includes receiving a digitally signed request from a requester device for data and appending the request to a distributed ledger. At least one set of digitally signed data is received from at least one data provider system. Each data set is appended to the ledger and a particular data set is selected from the at least one data set. The selected data set is provided to the requester device. A digitally signed command to provision the selected data set is received from the requester device. The command is digitally signed using the public key of the requester device. The command to provision the selected data set is appended to the ledger, causing the data provider system to be notified, and the selected data set is provisioned.Type: GrantFiled: December 4, 2017Date of Patent: August 18, 2020Assignee: First Data CorporationInventors: John Staple, Brian Frey, Lee Korotzer, Guillaume Lebleu
-
Patent number: 10742629Abstract: A cloud resource protection method, system, and computer program product include authenticating a user on a first computer that is part of a distributed system, based on the authentication, assigning to the user, on the first computer, a token indicating a set of permissions, receiving a directive from the user to initiate, via the first computer, the execution of a process associated with a class, based on the token, initiating, on a second computer, the execution of the process, with no further authentication, granting the process access to a data set, access to which is restricted to one or more of the plurality of classes, and providing a data item from the data set to the user.Type: GrantFiled: February 28, 2017Date of Patent: August 11, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Kirk J. Krauss
-
Patent number: 10721244Abstract: A traffic feature information extraction method including a regular expression process, a clustering process, and a feature information extraction process. The regular expression process extracts an item set in advance from a traffic log and represents a partial character string included in the item in a regular expression based on a predetermined rule. The clustering process clusters an entry of the traffic log represented in the regular expression. The feature information extraction process extracts, as traffic feature information of each of clusters, an entry having a minimum total sum of distances among entries included in the clustered traffic logs.Type: GrantFiled: March 12, 2015Date of Patent: July 21, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Daiki Chiba, Takeshi Yagi, Tohru Sato, Kazunori Kamiya, Kensuke Nakata
-
Patent number: 10708233Abstract: Systems and methods of identifying and processing certificate pinned applications through a cloud based security system include monitoring traffic associated with a connection; developing a profile of an application associated with the traffic based on the monitoring, wherein the profile comprises whether or not the application is a certificate pinned application which requires a predefined set of criterion to be matched against an advertised certificate; and selectively performing SSL interception of the connection in the cloud based security system based on the profile. The monitoring can include monitoring handshake messages between a client and a server to determine a handshake status and a certificate status.Type: GrantFiled: May 25, 2017Date of Patent: July 7, 2020Assignee: Zscaler, Inc.Inventors: Rohit Goyal, Abhinav Bansal
-
Patent number: 10708240Abstract: Computing apparatus includes a host processor, which runs a virtual machine monitor (VMM), which supports a plurality of virtual machines and includes a cryptographic security software module. A network interface controller (NIC) links the host processor to a network so as to transmit and receive data packets from and to the virtual machines and includes a cryptographic security hardware logic module, which when invoked by the VMM, applies the cryptographic security protocol to the data packets while maintaining a state context of the protocol with respect to each of the virtual machines. Upon encountering an exception in applying the cryptographic security protocol, the NIC transfers the data packet, together with the state context of the cryptographic security protocol with respect to the given virtual machine, to the cryptographic security software module for processing.Type: GrantFiled: December 14, 2017Date of Patent: July 7, 2020Assignee: MELLANOX TECHNOLOGIES, LTD.Inventors: Adi Menachem, Liran Liss, Boris Pismenny
-
Patent number: 10686604Abstract: Registered network-based identification corresponding to any of networks is stored in a key device 12. A terminal device 11 sends ciphertext and network-based identification to the key device 12, using a network. The key device 12 receives the sent ciphertext and network-based identification and outputs response information corresponding to a decrypted value of the ciphertext when the network-based identification corresponds to the registered network-based identification. The terminal device 11 obtains the decrypted value from the response information.Type: GrantFiled: October 7, 2014Date of Patent: June 16, 2020Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Tsunekazu Saito, Go Yamamoto, Tetsutaro Kobayashi
-
Patent number: 10680828Abstract: Implementations of the present disclosure include obtaining, by a computing system, a unified blockchain domain name (a UBCDN) message of a blockchain instance, wherein the UBCDN message includes a UBCDN of the blockchain instance, a digital signature of an owner of the UBCDN of the blockchain instance (a UBCDN owner) on the UBCDN, and a domain certificate of the UBCDN; verifying whether the domain certificate of the UBCDN is issued by a trusted certificate authority (CA) using a public key of the CA; and verifying whether the UBCDN is issued by the UBCDN owner using a public key of the UBCDN owner. The UBCDN message includes a blockchain domain name and a chain identifier of the blockchain instance uniquely corresponding to the blockchain domain name.Type: GrantFiled: April 22, 2019Date of Patent: June 9, 2020Assignee: Alibaba Group Holding LimitedInventor: Honglin Qiu
-
Patent number: 10673975Abstract: A content streaming service method for reducing communication cost and a system therefore are provided. The method includes receiving, by an electronic device, a file of content in a streaming scheme from a server through a network, and reproducing the content through an application driven in the electronic device, storing, by the electronic device, the received file in a local storage, generating, by the electronic device, a local server, the local server configured to operate in association with a memory of the electronic device, retrieving, by the electronic device, the file stored in the local storage according to the streaming scheme through the local server, and re-reproducing the content through the application.Type: GrantFiled: June 23, 2016Date of Patent: June 2, 2020Assignee: LINE CorporationInventors: Sang Min Chung, DaeWon Ryu, JeeHong Lee, Cheol-Won Oh, Eunjin Joo
-
Patent number: 10623372Abstract: Certain embodiments described herein are generally directed to load balancing IPSec tunnels at an extended Berkeley Packet Filter (eBPF) module of a destination tunnel endpoint for encapsulated ESP encrypted data packets for encapsulated encrypted data packets based on a security parameter index value of the encapsulated encrypted data packets.Type: GrantFiled: December 6, 2017Date of Patent: April 14, 2020Assignee: Nicira, Inc.Inventors: Yong Wang, Brenden Blanco, Ly Loi
-
Patent number: 10616252Abstract: Automated malware detection for application file packages using machine learning (e.g., trained neural network-based classifiers) is described. A particular method includes generating, at a first device, a first feature vector based on occurrences of character n-grams corresponding to a first subset of files of multiple files of an application file package. The method includes generating, at the first device, a second feature vector based on occurrences of attributes in a second subset of files of the multiple files. The method includes sending the first feature vector and the second feature vector from the first device to a second device as inputs to a file classifier. The method includes receiving, at the first device from the second device, classification data associated with the application file package based on the first feature vector and the second feature vector. The classification data indicates whether the application file package includes malware.Type: GrantFiled: June 30, 2017Date of Patent: April 7, 2020Assignee: SPARKCOGNITION, INC.Inventors: Lucas McLane, Jarred Capellman
-
Patent number: 10601852Abstract: Provided is an information processing device that includes a processor and has a capability to detect abnormalities on an in-vehicle network that may be caused by an attack. The processor receives input of data elements to be used as training data, normalizes the training data so as to be distributed within a first region, divides a multi-dimensional second region that encompasses the first region into third regions that are hypercubes of equal sizes, obtains S data elements that are contained by each of the third regions, and for each third region that includes a number of data elements that is less than a first threshold value T, adds noise elements that are vectors with a uniform distribution to the third regions, generates noise-added training data including the vectors in the second region, and generates and outputs Isolation Forest learning model data by using the generated noise-added training data.Type: GrantFiled: January 24, 2019Date of Patent: March 24, 2020Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICAInventors: Ryota Takahashi, Takamitsu Sasaki
-
Patent number: 10601577Abstract: Embodiments of the present application disclose an operation method. The method includes: obtaining, by the input/output interface, an input ciphertext; performing, by the decryption circuit, a modular exponentiation operation according to the ciphertext and a preset operation parameter; and using, by the microprocessor, an operation result obtained after the modular exponentiation operation as a plaintext obtained after decryption.Type: GrantFiled: January 25, 2019Date of Patent: March 24, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Cui Hu, ZhuFeng Tan, Shaojie Sun
-
Patent number: 10567427Abstract: Some embodiments provide techniques for mitigating against layer 7 distributed denial of service attacks. Some embodiments submit a computational intensive problem, also referred to as a bot detection problem, in response to a user request. Bots that lack sophistication needed to render websites or are configured to not respond to the server response will be unable to provide a solution to the problem and their requests will therefore be denied. If the requesting user is a bot and has the sophisticated to correctly solve the problem, the server will monitor the user request rate. For subsequent requests from that same user, the server can increase the difficulty of the problem when the request rate exceeds different thresholds. In so doing, the problem consumes greater resources of the user, slowing the rate at which the user can submit subsequent requests, and thereby preventing the user from overwhelming the server.Type: GrantFiled: April 17, 2018Date of Patent: February 18, 2020Assignee: Verizon Digital Media Services Inc.Inventors: Derek Shiell, Amir Reza Khakpour, Robert J. Peters, David Andrews
-
Patent number: 10555174Abstract: Embodiments related to a restricted-use authentication code are disclosed. One disclosed embodiment provides a method of generating a representation of a restricted-use authentication code for detection by another computing device to authenticate the other computing device to a remote service. The method includes receiving authentication information, the authentication information comprising a restricted-use authentication code and generating a representation of the authentication information. The method further includes presenting the representation of the authentication information to a sensor system of the other computing device for authentication.Type: GrantFiled: August 3, 2018Date of Patent: February 4, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Jeffrey David Henshaw, Marc R. Whitten, Michael Palotas, Mark Plagge
-
Patent number: 10528726Abstract: A threat-aware microvisor may be deployed in a malware detection appliance architecture and execute on a malware detection system (MDS) appliance to provide exploit and malware detection within a network environment. The microvisor may underlie an operating system kernel of the MDS appliance and execute in kernel space of the architecture to control access to kernel resources of the appliance for any operating system process. A type 0 virtual machine monitor may be disposed over the microvisor and execute in user space of the architecture as a pass-through module configured to expose the kernel resources of the appliance to the operating system kernel. One or more hypervisors, e.g., type 1 VMM, may be further disposed over the microvisor and execute in user space of the architecture under control of the microvisor to support execution of one or more guest operating systems inside one or more full virtual machines.Type: GrantFiled: April 2, 2018Date of Patent: January 7, 2020Assignee: FireEye, Inc.Inventor: Osman Abdoul Ismael
-
Patent number: 10511630Abstract: This invention provides secure, policy-based separation of data and applications on computer, especially personal computers that operate in different environments, such as those including personal applications and corporate applications, so that both types of applications can run simultaneously while complying with all required policies. The invention enables employees to use their personal devices for work purposes, or work devices for personal purposes. The secure, policy-based separation is created by dividing the data processing device into two or more “domains,” each with its own policies. These policies may be configured by the device owner, an IT department, or other data or application owner.Type: GrantFiled: December 10, 2012Date of Patent: December 17, 2019Assignee: Cellsec, Inc.Inventors: Yoav Weiss, David Goldschlag, Karl Ginter, Michael Bartman