Patents Examined by Karl L Schmidt
-
Patent number: 10958640Abstract: Methods and systems for faster and more efficient smart card logon in a remote computing environment are described herein. Fast smart card logon may be used to reduce latency and improve security. For example, the system may reduce the number of operations (e.g., interactions) between a server device used for authentication and the client device. A remoting channel may be established between the server device and the client device. The server may receive, from the client device and/or via a personal computer/smart card (PC/SC) protocol, a message comprising an identifier for a smart card. The server device may replace the identifier for the smart card with a substitute identifier. Based on the substitute identifier, the server may determine one or more cryptographic service providers to use for one or more cryptographic operations associated with the smart card.Type: GrantFiled: August 24, 2018Date of Patent: March 23, 2021Assignee: Citrix Systems, Inc.Inventors: Hubert Divoux, David Williams
-
Patent number: 10956593Abstract: A solution is proposed for managing containers isolating corresponding application environments from one or more shared operating systems in a computing system. One or more relevant groups are determined among one or more candidate groups (each comprising private data in common among a plurality of the containers); the candidate groups are determined according to corresponding access commands submitted by the containers and the relevant groups are determined according to one or more relevance policies. The private data of the relevant groups are consolidated into corresponding shared data.Type: GrantFiled: February 15, 2018Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Sandro Piccinini, Ilaria Gorga, Fabio Barillari, Francesca Ziantoni
-
Patent number: 10762193Abstract: In an example computer-implemented method, a trusted root certificate for an application running in a container is dynamically generated. The generated trusted root certificate is injected at runtime. The generated certificate is dynamically added to a list of trusted root certificates. A proxy associated with the application instance is authenticated based on the generated root trust certificate.Type: GrantFiled: May 9, 2018Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventor: Etai Lev-Ran
-
Patent number: 10749682Abstract: An anti-counterfeit method includes: obtaining raw data to be encoded; collecting fingerprint data by analogue acquisition to obtain initial fingerprint feature information and encrypting the initial fingerprint feature information to obtain a random feature secret key, the random feature secret key comprising a first sub secret key and a second sub secret key and the first sub secret key is encoded into a micro-texture image while the second sub secret key is embedded in an encryption program; encrypting, through the random feature secret key, the raw data to be encoded to generate an information code image, the information code image comprising the micro-texture image; passing an anti-counterfeit authentication when an image sensor succeeds in integrating the first sub secret key and the second sub secret key to generate the random feature secret key; and succeeding in decrypting, by the image sensor, the information code image through the random feature secret key.Type: GrantFiled: September 13, 2016Date of Patent: August 18, 2020Assignee: SHENZHEN QIANHAI QUANTUM CLOUD TECHNOLOGY CO., LTD.Inventors: Tao Jiang, Ye Cheng, Qiaoti Tang
-
Patent number: 10657245Abstract: Access to devices can be controlled dynamically. A device control driver can function as an upper filter driver so that it can intercept I/O requests that target a particular device. The device control driver can be configured to communicate with a device control server to dynamically determine whether the current user is allowed to access the particular device. The device control server can employ policy or administrator input to determine whether access should be allowed and can then notify the device control driver accordingly. When access is granted, the device control driver can pass I/O requests down the device driver stack. Otherwise, the device control driver can block the I/O requests. Also, when access is granted, the device control server can specify a permission expiration time after which the device control driver should again resume blocking I/O requests.Type: GrantFiled: March 14, 2017Date of Patent: May 19, 2020Assignee: Wyse Technology L.L.C.Inventors: Puneet Kaushik, Salil Joshi
-
Patent number: 10623432Abstract: Provided are techniques for mitigating security risks utilizing continuous device image reload with data integrity. Continuous reload of a first image on a device in an Internet of Things (IoT) group of devices coupled to an IoT service is performed based on triggers. A trigger from the triggers is received that indicates one of that a period of time has expired, that notification of a known infection has been received, and that there has been failure of an internal onboard security check. A second image is obtained that is not infected from the IoT service. The device is reloaded with the second image to replace the first image with the second image.Type: GrantFiled: June 21, 2017Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Marc A. Dickenson, Timothy J. Hahn
-
Patent number: 10592654Abstract: Determining a group of figures for use in a vision test to distinguish computers from humans. An image is obtained and segmented into a plurality of parts. Based on the plurality of parts, a group of figures is determined to enable the group of figures to be displayed at a certain rate for a user to recognize the image.Type: GrantFiled: September 21, 2017Date of Patent: March 17, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xu Feifei, Zhuang Liang, Xin Hui CP Pan, Yu Wenzhi
-
Patent number: 10516542Abstract: A certificate authority receives a request to issue a digital certificate from a customer. In response to the request, the certificate authority determines a network endpoint to be specific to the digital certificate that is to serve information usable to determine whether the digital certificate is valid. The certificate authority issues, to the customer, a digital certificate that specifies a network address for the network endpoint and records information about requests made to the network endpoint to obtain the information usable to determine whether the digital certificate is valid.Type: GrantFiled: March 8, 2017Date of Patent: December 24, 2019Assignee: Amazon Technologies, Inc.Inventors: Marcel Andrew Levy, Peter Zachary Bowen, Jonathan Kozolchyk, Nicholas Wexler
-
Patent number: 10469471Abstract: A third-party can subscribe to one or more electronic message group lists without joining the group lists by creating a trust relationship between the subscriber and a group list member. In particular, the subscriber can send a trust indicator to the group member, who can then determine whether to accept the trust indicator for all or specific groups that are associated with the group member, as appropriate. In at least one embodiment, the group member can send a trust indicator acceptance message to the subscriber that identifies the group member, and any or all group lists associated with the group member. The subscriber can then receive messages directed to the trusted group member or group lists, and can send group messages to the group lists subject to a receive setting associated with the group lists or group members of the group lists.Type: GrantFiled: September 14, 2012Date of Patent: November 5, 2019Assignee: Facebook, Inc.Inventor: Richard A. Landsman
-
Patent number: 10397266Abstract: Verifying that influence of a user data point has been removed from a machine learning classifier. In some embodiments, a method may include training a machine learning classifier using a training set of data points that includes a user data point, calculating a first loss of the machine learning classifier, updating the machine learning classifier by updating parameters of the machine learning classifier to remove influence of the user data point, calculating a second loss of the machine learning classifier, calculating an expected difference in loss of the machine learning classifier, and verifying that the influence of the user data point has been removed from the machine learning classifier by determining that the difference between the first loss and the second loss is within a threshold of the expected difference in loss.Type: GrantFiled: January 17, 2019Date of Patent: August 27, 2019Assignee: SYMANTEC CORPORATIONInventors: Saurabh Shintre, Jasjeet Dhaliwal
-
Patent number: 10341391Abstract: A processing device in one embodiment comprises a processor coupled to a memory and is configured to obtain data characterizing a plurality of network sessions for a given user identifier. The network sessions are initiated from one or more user devices over at least one network and may comprise respective virtual private network (VPN) sessions. The processing device is further configured to extract features from the obtained data, to detect at least one potentially anomalous network session among the plurality of network sessions for the given user identifier by applying the extracted features to a support vector machine model, and to apply a rules-based verification process to the detected potentially anomalous network session in order to verify that the detected potentially anomalous network session is an anomalous network session. An alert is generated based on a result of the rules-based verification process and transmitted to a security agent.Type: GrantFiled: May 16, 2016Date of Patent: July 2, 2019Assignee: EMC IP Holding Company LLCInventors: Shikhar Pandey, Kartikeya Putturaya, Chandra Sekar Rao Munaganuri Venkata, Gupta Abhishek
-
Patent number: 10230743Abstract: Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.Type: GrantFiled: May 12, 2016Date of Patent: March 12, 2019Assignee: WELLS FARGO BANK, N.A.Inventors: Matthew John Block, Adam Sheesley, Jon Matthew Welborn, James Robert Borecky, Jennifer A. Holton, Douglas S. Rodgers
-
Patent number: 10225277Abstract: Verifying that influence of a user data point has been removed from a machine learning classifier. In some embodiments, a method may include training a machine learning classifier using a training set of data points that includes a user data point, calculating a first loss of the machine learning classifier, updating the machine learning classifier by updating parameters of the machine learning classifier to remove influence of the user data point, calculating a second loss of the machine learning classifier, calculating an expected difference in loss of the machine learning classifier, and verifying that the influence of the user data point has been removed from the machine learning classifier by determining that the difference between the first loss and the second loss is within a threshold of the expected difference in loss.Type: GrantFiled: June 8, 2018Date of Patent: March 5, 2019Assignee: SYMANTEC CORPORATIONInventors: Saurabh Shintre, Jasjeet Dhaliwal
-
Patent number: 10205731Abstract: Technologies are described herein for providing contextually-aware location sharing services for computing devices. In some configurations, the techniques disclosed herein can involve a number of computing devices configured to select and utilize location data from one or more resources based on one or more factors. An analysis of contextual data including, but not limited to, the capabilities of the individual devices, a status of one or more components, or the availability or cost of data, allows individual devices to dynamically select and utilize location data or a source of location data to accommodate a range of scenarios. Techniques disclosed herein can also detect the presence of a changed scenario and take one or more actions based, at least in part, on data defining the changed scenario.Type: GrantFiled: September 25, 2015Date of Patent: February 12, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Hiep V. Khuu, Ashish Vijay Gadre, Lisa Hwei-Min Ong
-
Patent number: 10148625Abstract: A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark protected multimedia content legally stored on the protected memory device. The protected multimedia content is moved from the source device to another device, such as a target device used to aggregated protected content in a library. Moving the protected multimedia content involves replacing a source-specific header, comprising digital rights management metadata and/or other security metadata allowing only a device having the source device signature access to the content, with a target-specific header comprising digital rights management metadata and/or other security metadata allowing only a device having the target device signature access to the content. The transfer is done using one of a variety of transfer methods with either a trusted or un-trusted host system connecting the source device to the target device.Type: GrantFiled: May 9, 2017Date of Patent: December 4, 2018Assignee: MO-DV, INC.Inventors: Robert D. Widergren, Martin Paul Boliek
-
Patent number: 10129250Abstract: A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform; messaging the authority device with the transaction request; receiving an authority agent response from the authority device to the auth platform; if the authority agent response confirms the transaction, communicating a confirmed transaction to the initiator; and if the authority agent response denies the transaction, communicating a denied transaction to the initiator.Type: GrantFiled: May 4, 2018Date of Patent: November 13, 2018Assignee: Duo Security, Inc.Inventors: Jon Oberheide, Douglas Song, Adam Goodman
-
Patent number: 10095846Abstract: A method and system for generating a protected version of the digital content is disclosed. The method includes obfuscating the digital content to yield a functionally equivalent obfuscated digital content, encrypting the obfuscated digital content using at least one device or non-device parameter, generating a decryption logic to be used for generating a decryption key based upon the at least one device or non-device parameter, and concatenating the encrypted digital content and the decryption logic to generate the protected version of the digital content.Type: GrantFiled: May 30, 2014Date of Patent: October 9, 2018Assignee: JSCRAMBLER S.A.Inventors: Antonio Pedro Freitas Fortuna dos Santos, Rui Miguel Silvares Ribeiro, Filipe Manuel Gomes Silva
-
Patent number: 10070312Abstract: Configuration and credential data associated with a wireless network can be stored by the wireless network or by a gateway device associated with the wireless network. The configuration and credential data can be accessed via a user profile and pushed to unauthenticated wireless devices to authenticate the unauthenticated wireless devices for the wireless network. The configuration and credential data can be backed up via a manual, automatic, or semi-automatic back-up process.Type: GrantFiled: January 9, 2017Date of Patent: September 4, 2018Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Eric B. Wolbach, Robert W. Bickerstaff, Michael Frias
-
Patent number: 10063998Abstract: Systems, methods, and non-transitory computer-readable storage media for using mobile network authentication factors to authenticate a mobile device.Type: GrantFiled: November 5, 2015Date of Patent: August 28, 2018Assignee: Tevnos LLCInventors: Stuart Alexander Jacobson, Joshua Goldbard
-
Patent number: 7716495Abstract: Security mechanisms detect and intervene in a malicious attack against a runtime function, even in the presence of a coding flaw such as a buffer overrun or overflow. One such exemplary mechanism uses a predetermined security list of the valid targets for a first runtime function (such as longjmp). For every call to a second runtime function (e.g., setjmp) that prepares for a later invocation of the first runtime function, the dispatcher finds and stores a reference to this list. When a subsequent attack targets the runtime functions by creating an attacker-provided setjmp target address (e.g., the attack overwrites the longjmp target address so that the pointer points somewhere else, such as code provided by the attacker or code that already exists that will eventually pass control to code provided by the attacker), the new (attacker provided) target address is compared to a reference list of the real (valid) target addresses. The list of real target addresses is stored in memory.Type: GrantFiled: December 31, 2003Date of Patent: May 11, 2010Assignee: Microsoft CorporationInventors: Richard M. Shupak, Philip M. Lucido