Patents Examined by Karl L Schmidt
  • Patent number: 10230743
    Abstract: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.
    Type: Grant
    Filed: May 12, 2016
    Date of Patent: March 12, 2019
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Matthew John Block, Adam Sheesley, Jon Matthew Welborn, James Robert Borecky, Jennifer A. Holton, Douglas S. Rodgers
  • Patent number: 10225277
    Abstract: Verifying that influence of a user data point has been removed from a machine learning classifier. In some embodiments, a method may include training a machine learning classifier using a training set of data points that includes a user data point, calculating a first loss of the machine learning classifier, updating the machine learning classifier by updating parameters of the machine learning classifier to remove influence of the user data point, calculating a second loss of the machine learning classifier, calculating an expected difference in loss of the machine learning classifier, and verifying that the influence of the user data point has been removed from the machine learning classifier by determining that the difference between the first loss and the second loss is within a threshold of the expected difference in loss.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: March 5, 2019
    Assignee: SYMANTEC CORPORATION
    Inventors: Saurabh Shintre, Jasjeet Dhaliwal
  • Patent number: 10205731
    Abstract: Technologies are described herein for providing contextually-aware location sharing services for computing devices. In some configurations, the techniques disclosed herein can involve a number of computing devices configured to select and utilize location data from one or more resources based on one or more factors. An analysis of contextual data including, but not limited to, the capabilities of the individual devices, a status of one or more components, or the availability or cost of data, allows individual devices to dynamically select and utilize location data or a source of location data to accommodate a range of scenarios. Techniques disclosed herein can also detect the presence of a changed scenario and take one or more actions based, at least in part, on data defining the changed scenario.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: February 12, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hiep V. Khuu, Ashish Vijay Gadre, Lisa Hwei-Min Ong
  • Patent number: 10148625
    Abstract: A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark protected multimedia content legally stored on the protected memory device. The protected multimedia content is moved from the source device to another device, such as a target device used to aggregated protected content in a library. Moving the protected multimedia content involves replacing a source-specific header, comprising digital rights management metadata and/or other security metadata allowing only a device having the source device signature access to the content, with a target-specific header comprising digital rights management metadata and/or other security metadata allowing only a device having the target device signature access to the content. The transfer is done using one of a variety of transfer methods with either a trusted or un-trusted host system connecting the source device to the target device.
    Type: Grant
    Filed: May 9, 2017
    Date of Patent: December 4, 2018
    Assignee: MO-DV, INC.
    Inventors: Robert D. Widergren, Martin Paul Boliek
  • Patent number: 10129250
    Abstract: A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform; messaging the authority device with the transaction request; receiving an authority agent response from the authority device to the auth platform; if the authority agent response confirms the transaction, communicating a confirmed transaction to the initiator; and if the authority agent response denies the transaction, communicating a denied transaction to the initiator.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: November 13, 2018
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Patent number: 10095846
    Abstract: A method and system for generating a protected version of the digital content is disclosed. The method includes obfuscating the digital content to yield a functionally equivalent obfuscated digital content, encrypting the obfuscated digital content using at least one device or non-device parameter, generating a decryption logic to be used for generating a decryption key based upon the at least one device or non-device parameter, and concatenating the encrypted digital content and the decryption logic to generate the protected version of the digital content.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: October 9, 2018
    Assignee: JSCRAMBLER S.A.
    Inventors: Antonio Pedro Freitas Fortuna dos Santos, Rui Miguel Silvares Ribeiro, Filipe Manuel Gomes Silva
  • Patent number: 10070312
    Abstract: Configuration and credential data associated with a wireless network can be stored by the wireless network or by a gateway device associated with the wireless network. The configuration and credential data can be accessed via a user profile and pushed to unauthenticated wireless devices to authenticate the unauthenticated wireless devices for the wireless network. The configuration and credential data can be backed up via a manual, automatic, or semi-automatic back-up process.
    Type: Grant
    Filed: January 9, 2017
    Date of Patent: September 4, 2018
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Eric B. Wolbach, Robert W. Bickerstaff, Michael Frias
  • Patent number: 10063998
    Abstract: Systems, methods, and non-transitory computer-readable storage media for using mobile network authentication factors to authenticate a mobile device.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: August 28, 2018
    Assignee: Tevnos LLC
    Inventors: Stuart Alexander Jacobson, Joshua Goldbard
  • Patent number: 7716495
    Abstract: Security mechanisms detect and intervene in a malicious attack against a runtime function, even in the presence of a coding flaw such as a buffer overrun or overflow. One such exemplary mechanism uses a predetermined security list of the valid targets for a first runtime function (such as longjmp). For every call to a second runtime function (e.g., setjmp) that prepares for a later invocation of the first runtime function, the dispatcher finds and stores a reference to this list. When a subsequent attack targets the runtime functions by creating an attacker-provided setjmp target address (e.g., the attack overwrites the longjmp target address so that the pointer points somewhere else, such as code provided by the attacker or code that already exists that will eventually pass control to code provided by the attacker), the new (attacker provided) target address is compared to a reference list of the real (valid) target addresses. The list of real target addresses is stored in memory.
    Type: Grant
    Filed: December 31, 2003
    Date of Patent: May 11, 2010
    Assignee: Microsoft Corporation
    Inventors: Richard M. Shupak, Philip M. Lucido
  • Patent number: 7712131
    Abstract: A method, an apparatus, and a computer program are provided to secure diagnostic software from a software or hardware manufacturer for a computer. Traditionally, diagnostic software was distributed to professionals and other personnel in limited numbers. However, it was still possible to obtain unauthorized copies of the diagnostic software. Therefore, to alleviate the possibility of having unauthorized copies, a Universal Serial Bus (USB) memory device containing identification number can be used and a hidden partition that is inaccessible by an end-user where an encrypted version of the identification number is stored. In order to use diagnostic software, the specific USB memory device must be physically interfacing a computer. Hence, by limiting the number of USB memory devices, unauthorized copies can be prevented.
    Type: Grant
    Filed: February 9, 2005
    Date of Patent: May 4, 2010
    Inventor: David Lethe
  • Patent number: 7584351
    Abstract: A method of transferring digital certificates from a digital-certificate transferring apparatus to a communications counterpart. The method includes authenticating the communications counterpart using a common certificate and transferring a normal certificate to the communications counterpart when the authenticating succeeds. The method further includes receiving a first normal certificate at an address from said communications counterpart, and when, it is determined to be necessary, transferring to the communications counterpart a second normal certificate along with the information identifying the communications counterpart and an address corresponding to a second normal certificate. The second normal certificate is of a different type than the first normal certificate.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: September 1, 2009
    Assignee: Ricoh Company, Ltd.
    Inventor: Hiroshi Kakii