Patents Examined by Jenise Jackson
  • Patent number: 10911437
    Abstract: Computerized systems and methods facilitate detection of anomalous activity during the authentication of login attempts. When a login attempt is made, credentials (e.g., a username and password) are provided. A function call is made to check for anomalous activity. A count of unique usernames attempted during a given time period is compared against a unique username threshold. In some embodiments, a count of login attempts for the current username is also compared against a login attempt threshold. If either (or both) threshold is met or exceeded, an abnormal state is returned, and one or more enhanced authentication requirements are invoked. Alternatively, a normal state is returned, and the credentials are validated. If the login attempt is successful, the username is removed from consideration for anomalous activities checks for other login attempts.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: February 2, 2021
    Assignee: CERNER INNOVATION, INC
    Inventors: Matthew Allen Randall, Thomas Reaves Boettcher
  • Patent number: 10671738
    Abstract: Systems and methods are disclosed herein for publishing sensitive content at a future time, where prior to the future time, receiving an encrypted version of the sensitive content is received and a sequence of proof rules are applied to random portions of the encrypted version of the sensitive content. Upon successful application of the sequence of proof rules, the encrypted version of the sensitive content is prepared for publication and optionally published in encrypted form. At the future time, an encryption key is received for the encrypted version of the sensitive content and the encrypted version of the sensitive content is decrypted with the encryption key to produce the sensitive content.
    Type: Grant
    Filed: December 18, 2018
    Date of Patent: June 2, 2020
    Assignee: Adobe, Inc.
    Inventors: Antonio Sanso, Philipp Suter
  • Patent number: 10657235
    Abstract: The present disclosure discloses a display device comprising a display control module and a display module connected to the display control module, wherein the display control module comprises a display drive component and a security component connected to each other. The security component is configured to enable the display device to enter a secure and trusty display mode, and encrypt and decrypt displayed information in the secure and trusty display mode. A mobile device comprising the display device and a method for display using the mobile device are disclosed.
    Type: Grant
    Filed: January 13, 2016
    Date of Patent: May 19, 2020
    Assignee: BOE TECHNOLOGY GROUP CO., LTD.
    Inventors: Guilong Yang, Miao Liu
  • Patent number: 10204224
    Abstract: The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing static analysis of the samples, determining latent logic execution path information regarding the samples, classifying the samples, and/or providing intelligent report information regarding the samples.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: February 12, 2019
    Assignee: McAfee Ireland Holdings Limited
    Inventor: Lixin Lu
  • Patent number: 10153907
    Abstract: Methods, systems, and devices are provided for authenticating API messages using PKI-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an API message using the private key of the private/public key pair and a PKI-based cryptographic algorithm, before sending the signed API message to a server system. The server system (e.g., operated by a service provider) can authenticate the incoming signed API message using a proxy authenticator located in less trusted zone (e.g., a perimeter network) of the server system. In particular, the proxy authenticator can be configured to verify the signature of the signed API message using the public key corresponding to the private key and the same cryptographic algorithm. The authenticated API message can then be forwarded to a more trusted zone (e.g., an internal network) of the server system for further processing.
    Type: Grant
    Filed: October 30, 2017
    Date of Patent: December 11, 2018
    Assignee: Visa International Service Association
    Inventors: Minghua Xu, Jose Rios Trevino, Ying Hao
  • Patent number: 10129254
    Abstract: Certain embodiments disclose a method of provisioning security services for a domain or set of domains. The method comprises sending an electronic message to the domain or set of domains. The electronic message comprising a secret message. The secret message is encrypted using a public key that a certificate server associates with the domain or set of domains. The method further comprises receiving a response from the domain or set of domains. The response comprises data derived by decrypting the secret message using a private key of the domain or set of domains. In response to a determination that the received data corresponds to the secret message sent in the electronic message, the method initiates the provisioning of the security services for the domain or set of domains.
    Type: Grant
    Filed: June 1, 2016
    Date of Patent: November 13, 2018
    Assignee: ZixCorp Systems, Inc.
    Inventors: John Kalan, Charles A. Rego
  • Patent number: 10116663
    Abstract: Techniques to provide secure access to a cloud-based service are disclosed. In various embodiments, a request is received from a client app on a device to connect to a security proxy associated with the cloud-based service. A secure tunnel connection between the device and a node with which the security proxy is associated is used to establish the requested connection to the security proxy. Information associated with the secure tunnel is used to determine that the requesting client app is authorized to access the cloud-based service from the device and to obtain from an identity provider associated with the cloud-based service a security token to be used by the client app to authenticate to the cloud-based service.
    Type: Grant
    Filed: April 25, 2018
    Date of Patent: October 30, 2018
    Assignee: MOBILE IRON, INC.
    Inventors: Kumara Das Karunakaran, Vijay Pawar, Jian Liu
  • Patent number: 10108808
    Abstract: Data access sharing may be provided. Requests may be received to display an data item associated with a list of data items. Upon determining whether a property of the data item is restricted by an access control policy, the property may be modified prior to rendering a display of the data item.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: October 23, 2018
    Assignee: AIRWATCH LLC
    Inventor: Erich Stuntebeck
  • Patent number: 10091240
    Abstract: An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server. To provide the forward secrecy for this particular leg, the edge server selects an ephemeral value, and applies a cryptographic hash the value to compute a server random value, which is then transmitted back to the requesting client. That server random value is later re-generated at the cryptographic server to enable the cryptographic server to compute a master secret. The forward secrecy is enabled by ensuring that the ephemeral value does not travel on the wire.
    Type: Grant
    Filed: January 22, 2018
    Date of Patent: October 2, 2018
    Assignee: Akamai Technologies, Inc.
    Inventors: Charles E. Gero, Philip A. Lisiecki
  • Patent number: 10063565
    Abstract: A method of geolocation verification, including obtaining the geolocation of an operating system, generating a unique system ID for an installed operating system, and transmitting the geolocation of the operating system and a system ID to a data repository. The method further includes receiving a request to either initiate deployment of, or grant access to, a computer object associated with the operating system, identifying if the computer object requires geolocation verification, then identifying an object ID associated with the computer object and communicating each of the object ID, the geolocation of the operating system, and the system ID, to a domain controller for assessment. The method also includes searching the data repository to identify one or more geolocation object resource claims associated with the object ID, and comparing the geolocation resource claims with the communicated geolocation of the operating system.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: August 28, 2018
    Assignee: SYNC-N-SCALE, LLC
    Inventor: Son VoBa
  • Patent number: 10063561
    Abstract: Provided is authentication and authorization without the use of supplicants. Authentication and authorization includes generating a profile for a device based on at least one characteristic observed during a successful attempt by the device to access an 802.1X network infrastructure. Expected characteristics for a next attempt to access the infrastructure by the device are determined. A characteristic of the next access attempt is matched to the expected characteristic and access to the network is selectively controlled as a result of the matching. This is achieved without a supplicant being installed on the device.
    Type: Grant
    Filed: March 27, 2018
    Date of Patent: August 28, 2018
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Ryan B. Benskin, Lawrence T. Belton, Jr., Christopher Houser, Peter A. Makohon, Timothy Morris, Omar Bracey
  • Patent number: 10038705
    Abstract: A method and information handling system (IHS) for identifying communication threats in an IHS. The method includes triggering a board management controller (BMC) to transmit a plurality of memory addresses identifying where a plurality of network packets received by the IHS are stored. A field programmable gate array (FPGA) within a processor receives the memory addresses of the network packets and retrieves the network packets. The network packets are analyzed by comparing at least one threat signature that is associated with undesired network behavior with the contents of the network packets. In response to the at least one threat signature matching the contents of at least one of the network packets, an intrusion alert is transmitted to the BMC.
    Type: Grant
    Filed: October 12, 2015
    Date of Patent: July 31, 2018
    Assignee: Dell Products, L.P.
    Inventors: Elie Antoun Jreij, Chitrak Gupta, Wade Andrew Butcher, Sushma Basavarajaiah, Rama Rao Bisa
  • Patent number: 10003600
    Abstract: Techniques to provide secure access to a cloud-based service are disclosed. In various embodiments, a request is received from a client app on a device to connect to a security proxy associated with the cloud-based service. A secure tunnel connection between the device and a node with which the security proxy is associated is used to establish the requested connection to the security proxy. Information associated with the secure tunnel is used to determine that the requesting client app is authorized to access the cloud-based service from the device and to obtain from an identity provider associated with the cloud-based service a security token to be used by the client app to authenticate to the cloud-based service.
    Type: Grant
    Filed: January 26, 2016
    Date of Patent: June 19, 2018
    Assignee: MOBILE IRON, INC.
    Inventors: Kumara Das Karunakaran, Vijay Pawar, Jian Liu
  • Patent number: 9996693
    Abstract: Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature.
    Type: Grant
    Filed: June 1, 2012
    Date of Patent: June 12, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ning Sun, Patrick Winkler, Chengyun Chu, Hong Jia, Jason Geffner, Tony Lee, Jigar Mody, Frank Swiderski
  • Patent number: 9998456
    Abstract: Disclosed are a system and a method for one-time password (OTP)-based authentication. The system for OTP-based authentication includes a transceiver module configured to receive an authentication request from a client and transmit a result of the authentication according to the authentication request to the client, an authentication accumulation management module configured to provide statistical information about authentication success of the client for each time interval within a predetermined effective range of time, an OTP generation module configured to generate a server-side OTP using previously stored authentication information and time information that is acquired from the statistical information about authentication success, and an authentication module configured to authenticate the client by comparing a client-side OTP included in the authentication request with the server-side OTP.
    Type: Grant
    Filed: October 13, 2015
    Date of Patent: June 12, 2018
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Hyun-Woo Noh, Sung-Duck Kim, Hak-Hyun Nam, Geun-Young Choi
  • Patent number: 9954875
    Abstract: Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application. A newly generated secure virtual machine is obtained from one of a network server or a cloud computing service. The one of the email attachment or the web site link is sent to the newly generated secure virtual machine for processing.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventor: Richard H. Boivie
  • Patent number: 9954869
    Abstract: Provided is authentication and authorization without the use of supplicants. Authentication and authorization includes generating a profile for a device based on at least one characteristic observed during a successful attempt by the device to access an 802.1X network infrastructure. Expected characteristics for a next attempt to access the infrastructure by the device are determined. A characteristic of the next access attempt is matched to the expected characteristic and access to the network is selectively controlled as a result of the matching. This is achieved without a supplicant being installed on the device.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: April 24, 2018
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Ryan B. Benskin, Lawrence T. Belton, Jr., Christopher Houser, Peter A. Makohon, Timothy Morris, Omar Bracey
  • Patent number: 9940265
    Abstract: A computing system including a memory that is shared by a plurality of components of the computing system in order to exchange data between the plurality of components; and a controller configured to control the plurality of components to encrypt the data and to record the encrypted data in the memory.
    Type: Grant
    Filed: August 30, 2012
    Date of Patent: April 10, 2018
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Suk-Jin Yun, Jun-bum Shin, Moon-gyu Jung, Byung-ho Cha
  • Patent number: 9910983
    Abstract: A method of detecting suspicious code that has been injected into a process. The method includes identifying suspicious executable memory areas assigned to the process and, for each thread in the process, inspecting a stack associated with the thread to identify a potential return address; determining whether or not the potential return address is located within a suspicious memory area; and, if the potential return address is located within a suspicious memory area, determining whether or not the instruction at the address preceding the potential return address is a function call and, if yes, determining that the potential return address is a true return address and identifying the thread and associated code as suspicious.
    Type: Grant
    Filed: January 28, 2014
    Date of Patent: March 6, 2018
    Assignee: F-Secure Corporation
    Inventor: Mikko Suominen
  • Patent number: 9900771
    Abstract: This invention allows connection of an apparatus with a low security level without lowering the security level of a network even when such apparatus issues a connection request. This invention is directed to an access point which makes wireless communications with a station using an encryption method (AES). Upon reception of a connection request message including information indicating an encryption method (WEP) that can be used by a station, the access point checks if the encryption method (WEP) recognized based on the received connection request message is different from the encryption method (AES). When it is determined that the two encryption methods are different, the access point launches a controller which makes wireless communications with the station using that encryption method (WEP).
    Type: Grant
    Filed: December 6, 2013
    Date of Patent: February 20, 2018
    Assignee: Canon Kabushiki Kaisha
    Inventor: Nobuhiro Ikeda