Patents Examined by Josnel Jeudy
  • Patent number: 10708267
    Abstract: The present invention provides method and associated processor for authentication, e.g., log-in, with a remote application server by the processor of a user equipment, including: by the processor, achieving a bootstrapping authorization with a remote operator, obtaining a username and a password for logging in the remote application server according to the bootstrapping authorization, composing a log-in message according to the username and the password, and sending the log-in message to the remote application server.
    Type: Grant
    Filed: July 19, 2017
    Date of Patent: July 7, 2020
    Assignee: MEDIATEK INC.
    Inventor: Jing-Fu Chen
  • Patent number: 10708249
    Abstract: In an embodiment, a computer system configured to: generate a first challenge credential to be sent to a client computer; render one or more first dynamic-credential instructions, which when executed by the client computer, cause the client computer to generate a first dynamic credential that corresponds to the first challenge credential; modify a first set of instructions, which define one or more original operations, to produce a second set of instructions, wherein the second set of instructions include the first challenge credential and the one or more first dynamic-credential instructions, and which when executed by the client computer, cause the first challenge credential to be included in the one or more requests sent from the client computer; send the second set of instructions to a second computer.
    Type: Grant
    Filed: February 16, 2016
    Date of Patent: July 7, 2020
    Assignee: SHAPE SECURITY, INC.
    Inventors: Ariya Hidayat, Justin Call
  • Patent number: 10701101
    Abstract: A method for averting a manipulation on a CAN bus using a first node connected to the bus by a CAN controller includes a secured transmit module of the first node monitoring the bus; the transmit module recognizing transmission processes of the CAN controller in a normal operation of the first node; the transmit module recognizing a message transmitted impermissibly on the bus in a manner deviating from the normal operation; and, in the event the transmit module recognizes the message, the transmit module initiating countermeasures provided against the manipulation.
    Type: Grant
    Filed: October 10, 2016
    Date of Patent: June 30, 2020
    Assignee: Robert Bosch GmbH
    Inventors: Andreas Soenkens, Arthur Mutter, Florian Hartwich, Thomas Keller, Timo Lothspeich
  • Patent number: 10699019
    Abstract: A management apparatus (10) includes: an identification unit (110) that identifies a kind of operation information corresponding to a measure applicable to an apparatus to be managed having a security risk by using measure information indicating a measure applicable to the apparatus to be managed having the security risk and definition information defining a correspondence relationship between the kind of operation information of the apparatus to be managed and the measure against the security risk; an acquisition unit (120) that acquires operation information of the identified kind; and a display processing unit (130) that displays the acquired operation information in association with the measure applicable to the apparatus to be managed having the security risk on a display apparatus.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: June 30, 2020
    Assignee: NEC CORPORATION
    Inventor: Michitomo Kuroda
  • Patent number: 10699116
    Abstract: According to an example of the present disclosure, an image collection is loaded. At least one image property of the image collection is randomized, and the image collection is displayed. A registered sequence of images is accessed. At least one eye gaze and at least one eye gaze time interval are captured. A selection sequence of images in the randomized image collection is determined based on the at least one eye gaze and the at least one eye gaze time interval, and a further determination is made as to whether the selection sequence of the images in the randomized image collection matches the registered sequence of images.
    Type: Grant
    Filed: February 20, 2015
    Date of Patent: June 30, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Syed S. Azam, James R. Waldron, Kent E. Biggs, Richard E. Hodges
  • Patent number: 10681202
    Abstract: Exemplary embodiments relate to techniques for transmitting ephemeral content messages. A sending client may establish an end-to-end encrypted session with possible recipients of the message, using a first decryption key during initial session setup. The client may send an ephemeral content message, including encrypted content and a second key, to the recipients through a server. The server may be unable to retrieve the encrypted content due to a lack of the second key. The server may filter a list of intended recipients, and may forward the ephemeral content message to the recipients on the filtered list. The recipients may retrieve the second key from the message, and use the first and second keys to decrypt the encrypted content. The sending client may change the second key each time the recipient list changes from the perspective of the sending client, as determined at the time the ephemeral content message is transmitted.
    Type: Grant
    Filed: September 15, 2017
    Date of Patent: June 9, 2020
    Assignee: WHATSAPP INC.
    Inventors: Randall Sarafa, Eugene Fooksman, Brian Acton, Jan Koum, Michael B. Donohue, Ehren Andrew Kret
  • Patent number: 10681013
    Abstract: A retrieving system for retrieving information concealed within a sequence of symbols. The system includes a decoder configurable using rule information and operable when so configured to retrieve the information concealed within the sequence of symbols by applying to the sequence of symbols at least one decoder rule determined by the configuration of the encoder.
    Type: Grant
    Filed: February 21, 2019
    Date of Patent: June 9, 2020
    Inventors: Dilipsinhji Jadeja, Anita Jadeja
  • Patent number: 10664604
    Abstract: The subject matter discloses a method operated on a computerizing system comprising generating two secret shares of at least some of the data fields in a database, loading data fields of the database into two database copies, wherein one secret share of the two secret shares is loaded into one database copy and another secret share of the two secret shares is loaded into another database copy, receiving a request to perform a query in the database, processing said query on the database copies, wherein the database fields employed by the query process and the query results remain secret during processing, and revealing the secret query results.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: May 26, 2020
    Assignees: UNBOUND TECH LTD., BAR-ILAN UNIVERSITY
    Inventors: Yehuda Lindell, Guy Pe'er, Michael Kraitsberg, Valery Osheter, Alex Presman
  • Patent number: 10659443
    Abstract: A method, performed by a server, for determining token scope information so that a client can obtain a scoped token for a cloud service is disclosed. The method comprises requesting and receiving data of a cloud service from another server, receiving a token scope information request for an operation of the cloud service from a client and deriving token scope information based on the data for said operation. The method further comprises sending token scope information to the client so that the client can request a scoped token with capabilities enabling them to access the operation of the cloud service.
    Type: Grant
    Filed: January 23, 2015
    Date of Patent: May 19, 2020
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventor: Abu Shohel Ahmed
  • Patent number: 10652241
    Abstract: Disclosed embodiments relate to systems and methods for dynamically providing coupling between auxiliary computing devices and secure endpoint computing resources. Techniques include identifying a request for an identity to access an endpoint computing resource; obtaining a unique session identifier in response to the request; transmitting the unique session identifier via short-range communications from the endpoint computing resource to an auxiliary computing device associated with the identity; obtaining, in response to the auxiliary computing device transmitting the unique session identifier and the identification data, authentication data sufficient to comply with the authentication requirement of the endpoint computing resource; and dynamically coupling the identity to the endpoint computing resource based on the authentication data and consistent with the authentication requirement.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: May 12, 2020
    Assignee: CyberArk Software Ltd.
    Inventor: Arthur Bendersky
  • Patent number: 10652733
    Abstract: In order for supporting separate ciphering at an MeNB (20) and an SeNB (30), the MeNB (20) derives separate first and second keys (KUPenc-M, KUPenc-S) from a third key (KeNB). The first key (KUPenc-M) is used for confidentially protecting first traffic transmitted over U-Plane between the MeNB (20) and a UE (10). The first key (KUPenc-M) may be the same as current KUPenc or a new key. The second key (KUPenc-S) is used for confidentially protecting second traffic transmitted over the U-Plane between the UE (10) and the SeNB (30). The MeNB (20) sends the second key (KUPenc-S) to the SeNB (30). The UE (10) negotiates with the MeNB (20), and derives the second key (KUPenc-S) based on a result of the negotiation.
    Type: Grant
    Filed: November 20, 2014
    Date of Patent: May 12, 2020
    Assignee: NEC Corporation
    Inventors: Xiaowei Zhang, Anand Raghawa Prasad
  • Patent number: 10645071
    Abstract: Embodiments of systems and methods as disclosed herein may determine that an initiator of a communication on a distributed computer network is an automated script or the like. More particularly, in one embodiment, a web page including a hidden field may be generated in response to a request for the web page. This hidden field is a field included in the web page that is not visible to a human user when the web page is rendered by a browser and presented to the user. By comparing a received value for such a hidden field with an associated value for the hidden field as provided in the web page, the use of an automated script may be detected.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: May 5, 2020
    Assignee: GIVEGAB, INC.
    Inventors: James Randall Ryan, Ruhul Alam, James Edward Sylvana, Conleth S. O'Connell, Jr.
  • Patent number: 10630720
    Abstract: A method and a corresponding apparatus are provided for securing access to a network, in particular a local area network. The method includes authenticating a supplicant with an authenticator using an authentication protocol. The method determines a transit time of a message between the supplicant and the authenticator. The method controls access to the Ethernet network by the supplicant canton the basis of the authentication which has been carried out and the transit time determined.
    Type: Grant
    Filed: July 14, 2016
    Date of Patent: April 21, 2020
    Assignee: Bayerische Motoren Werke Aktiengesellschaft
    Inventors: Lars Voelker, Max Turner, Georg Hoiss
  • Patent number: 10614244
    Abstract: Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed using aliases representing sensitive data elements. In another embodiment, the sensitive data elements are stored in an encrypted form for use from a secure access, while the alias is available for standard access.
    Type: Grant
    Filed: December 4, 2018
    Date of Patent: April 7, 2020
    Assignee: Appriss Retail Information, LLC
    Inventors: David A. Duhaime, Brad J. Duhaime
  • Patent number: 10616265
    Abstract: Disclosed is a cyber-security system that is configured to aggregate and unify data from multiple components and platforms on a network. The system allows security administrators can to design and implement a workflow of device-actions taken by security individuals in response to a security incident. Based on the nature of a particular threat, the cyber-security system may initiate an action plan that is tailored to the security operations center and their operating procedures to protect potentially impacted components and network resources.
    Type: Grant
    Filed: November 9, 2018
    Date of Patent: April 7, 2020
    Assignee: FireEye, Inc.
    Inventors: Bernard Thomas, David Scott, Fred Brott, Paul Smith
  • Patent number: 10601815
    Abstract: It is disclosed a method of establishing a secure connection between a device and a network-based entity, NAF, via an access gateway, where the device and a network-based bootstrapping server, BSF, have a pre-established trust relationship. The method comprises the access gateway acting as a proxy between the device and the BSF. A reference to a NAF received from the BSF is used to securely authenticate the device to the NAF. An identity of the access gateway is sent to the NAF and the identity is used to authorise the device to use the access gateway. The access gateway identity is authenticated at the BSF and/or the NAF. The access gateway may relay messages to the device over a non-HTTP link.
    Type: Grant
    Filed: November 15, 2013
    Date of Patent: March 24, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Patrik Salmela, Mohit Sethi, Ari Keränen
  • Patent number: 10586034
    Abstract: [Objective] To provide a technique for allowing, in a network communication system consisting of a first server for sending contents to a client and a second server for executing an application upon being called from the client, the first server to appropriately detect that the second server is called. [Solution Means] In a communication method in a network communication system composed of a first server, a second server, and a client, when predetermined contents are sent to the client from the first server, API information for executing an application program of the second server is included in the contents, and the application is executed on the second server by an API call from the client. During this, the second server generates execution certification information on the basis of dynamic common information that changes dynamically, and sends to the client the execution certification information along with the application execution result.
    Type: Grant
    Filed: March 29, 2016
    Date of Patent: March 10, 2020
    Assignee: SecureBrain Corporation
    Inventor: Masata Nishida
  • Patent number: 10580724
    Abstract: Systems and methods for screening applicants are disclosed herein. A method of screening applicants is performed by a screening server. The server begins by receiving a selection of screening services and an applicant profile that identifies an applicant. The screening continues by generating screening results specified by the selection of screening services based on the applicant profile. A property manager is then notified that the screening results are available for the applicant based upon the applicant profile. The screening results are then provided to the property manager based upon the applicant profile. Based on these screening results, the screener or property manager can make a decision about the applicant and communicate a decision action to the applicant.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: March 3, 2020
    Assignee: TRANSUNION RENTAL SCREENING SOLUTIONS, INC.
    Inventors: Michael A. Britti, Robert D. Thornley, Joel R Springer, Michael J. Mauseth, Michael J. Collins
  • Patent number: 10581919
    Abstract: A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.
    Type: Grant
    Filed: April 13, 2018
    Date of Patent: March 3, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: William Frederick Hingle Kruse, Bharath Mukkati Prakash, Ashish Rangole, Nima Sharifi Mehr, Jeffrey John Wierer, Kunal Chadha, Chenxi Zhang, Hardik Nagda, Kai Zhao
  • Patent number: 10572684
    Abstract: Systems, computer-readable media, and methods for improving both data privacy/anonymity and data value, wherein data related to a data subject can be used and stored, e.g., in a distributed ledger data structure, such as a blockchain, while minimizing re-identification risk by unauthorized parties and enabling data, including quasi-identifiers, related to the data subject to be disclosed to any authorized party by granting access only to the data relevant to that authorized party's purpose, time period, place and/or other criterion via the obfuscation of specific data values, e.g., pursuant to the European Union's General Data Protection Regulation (GDPR) or other similar regulatory schemes. The techniques described herein maintain this level of privacy/anonymity while still satisfying the immutability, auditability, and verification mandated by blockchain and other distributed ledger technologies (DLTs) for the decentralized storage of transactional data.
    Type: Grant
    Filed: April 26, 2018
    Date of Patent: February 25, 2020
    Assignee: Anonos Inc.
    Inventors: Malcolm Gary LaFever, Ted N. Myerson, Steven Mason