Patents Examined by Khalil Naghdali
  • Patent number: 10970375
    Abstract: Methods, systems, and devices are provided for generating biometric signatures. The system can detect, at an electronic device, one or more biometric acoustic signals. The system can generate a biometric signal input of the one or more biometric acoustic signals. The system can apply a machine learning model to conduct feature extraction of the biometric signal input having one or more biometric acoustic signals. The system can generate a biometric user signature of the user from the machine learning model. The system can perform one or more privacy preserving hashing functions to the biometric user signature to generate a hashed biometric user signature. The system can determine whether the hashed biometric user signature satisfies a predetermined threshold with an enrollment hashed signature of the user. And the system can authenticate an identity of the user upon detecting that the hashed biometric user signature satisfies the predetermined threshold.
    Type: Grant
    Filed: September 26, 2019
    Date of Patent: April 6, 2021
    Assignee: Inc.
    Inventors: Devu Manikantan Shila, Adriaan Joris H. Larmuseau
  • Patent number: 10970392
    Abstract: A first mobile application is received. A reversing operation is performed on the first mobile application. A static analysis engine is used to determine a plurality of libraries included in the mobile application. Each library included in the plurality of libraries is categorized. A determination that the first mobile application is similar to a second mobile application based at least in part on a comparison of the respective categorizations of the respective libraries included in the respective first and second mobile applications. Commonality in the libraries of the two mobile applications can be used for a variety of purposes including detecting repackaging and also common authorship.
    Type: Grant
    Filed: August 26, 2019
    Date of Patent: April 6, 2021
    Assignee: Palo Alto Networks, Inc.
    Inventors: Zhi Xu, Zihang Xiao
  • Patent number: 10956553
    Abstract: A method of unlocking an electronic device, an unlocking device and system and a storage medium are provided. The method includes: acquiring at least one image to be authenticated, in which the image to be authenticated is an RGB image or an infrared image; obtaining an RGB image authentication result of the image to be authenticated by RGB object authentication of the image to be authenticated in a case where the image to be authenticated is the RGB image, and obtaining an infrared image authentication result of the image to be authenticated by infrared object authentication of the image to be authenticated in a case where the image to be authenticated is the infrared image; and determining whether to unlock the electronic device according to at least one of the RGB image authentication result and the infrared image authentication result.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: March 23, 2021
    Inventor: Yuan Kong
  • Patent number: 10958635
    Abstract: A device may collect environmental information surrounding the device. Based on the collected environmental information, the device may automatically identify a potentially secured location that has lower security risk. When a potentially secured location is identified, the device may prompt the user to setup a security profile having reduced security requirement for the secured location. The device may store and associate the security profile with the secured location. The device may activate the security profile with reduced security requirement when the device is in the secured area. Further, the security profile may require that certain features of the device be disabled when the device is in the secured location.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: March 23, 2021
    Assignee: PAYPAL, INC.
    Inventors: Nate L. Lyman, Roy L. Camp, Eric J. Farraro, John R. Tapley
  • Patent number: 10959096
    Abstract: A data communication method for wireless power charging and an electronic device using the same is provided. An electronic device performing authentication for wirelessly receiving power supplied from an external electronic device includes a wireless charging receiver module and a processor configured to control the wireless charging receiver module to exchange authentication data with the external electronic device and receive the wireless power supplied from the external electronic device based on a result of the authentication, the authentication data being split into at least one packet. Other embodiments are possible.
    Type: Grant
    Filed: July 11, 2018
    Date of Patent: March 23, 2021
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Seho Park
  • Patent number: 10958665
    Abstract: Methods and systems for tag-based identification include receiving a set of parameters at a user device from a remote server. A counterfeit-proof identification tag is read using a sensor in the user device using the set of parameters. Features of the counterfeit-proof identification tag are extracted in accordance with a feature extraction function, using a processor, to generate a tag bit sequence. A challenge function is applied to the extracted features to generate a result. The result is transmitted to the remote server to authenticate the counterfeit-proof identification tag. The counterfeit-proof identification tag is authenticated with a tag database at the remote server.
    Type: Grant
    Filed: September 6, 2019
    Date of Patent: March 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jean-Olivier Plouchart, Wendy Chong, Alberto Valdes Garcia, Petros Zerfos
  • Patent number: 10951618
    Abstract: Security credentials issued by an entity, such as an identity broker, can have a limited lifetime. Access to resources or content under those credentials then can only be obtained for a limited period of time, limiting the ability of an unauthorized entity obtaining the credentials to utilize those credentials for access. Along with the credentials, a refresh token can be issued to a requesting client that can enable the limited lifetime of the credentials to be renewed up to a maximum lifetime of the credentials and/or the token. A service providing access can determine that the client has a valid copy of the refresh token when the credentials are about to expire, and if so can cause the lifetime of the credentials to be extended another credential lifetime. This renewal can be done transparent to a user and without again contacting the identity broker.
    Type: Grant
    Filed: December 5, 2019
    Date of Patent: March 16, 2021
    Inventors: Graeme David Baer, Dmitry Frenkel, Marc R. Barbour
  • Patent number: 10944791
    Abstract: A system for predicting vulnerability of network resources is provided. The system can calculate an initial vulnerability score for each of the network resources and use the initial vulnerability scores along with activity data of the network resources to train a vulnerability model. After training, the vulnerability model can predict the vulnerability of the network resources based on new activity data collected from the network resources. Based on the predicted vulnerability, vulnerable network resources can be identified. Further analysis can be performed by comparing the activities of the vulnerable network resources and other network resources to identify activity patterns unique to the vulnerable network resources as attack patterns. Based on the attack patterns, one or more actions can be taken to increase the security of the vulnerable network resources to avoid further vulnerability.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: March 9, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yotam Livny, Mathias Abraham Marc Scherman, Moshe Israel, Ben Kliger, Ram Haim Pliskin, Roy Levin, Michael Zeev Bargury
  • Patent number: 10944780
    Abstract: Dynamic Software Defined Networking (DSDN) systems and methods provide secure and isolated subnetworks within a larger network. Each subnetwork may be formed with varied policies and communication restrictions based on at least device type, device grouping, and risk level. The DSDN systems and methods may also be applied to form a network, with or without subnetworks, of devices that are spatially separated, thereby reducing the attack surface of the DSDN-formed network.
    Type: Grant
    Filed: October 2, 2019
    Date of Patent: March 9, 2021
    Assignee: Cable Television Laboratories, Inc.
    Inventor: Michael Glenn
  • Patent number: 10942991
    Abstract: Parental control of child's web-based digital content experience, which can be applied to other contexts such as education, the workplace or other organizations. Trust relationships authorize specified users or organizations to permit access to content or resources by other users. Collection curation including content reputation and age appropriate ratings disclosed.
    Type: Grant
    Filed: April 1, 2019
    Date of Patent: March 9, 2021
    Assignee: Kiddofy, LLC
    Inventor: Eric D. Kidd
  • Patent number: 10938841
    Abstract: A guard sensor injects a multi-GHz (multi giga-bit) guard signal along a guard signal transmission path above an observable knee in the amplitude response of the path to define a guarded region and to detect physical or electromagnetic intrusions of that guarded region. At frequencies above the knee, the signal transmission path exhibits increasingly non-linear and even chaotic behavior that improves the overall sensitivity of the sensor and its ability to detect slight changes in the distributed transmission parameters that characterize circuit devices, signal paths and signals. The guarded region may be used to protect a combination of circuit devices, physical connections, interfaces, high and low frequency signal transmission paths and signals.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: March 2, 2021
    Assignee: Raytheon Company
    Inventors: William Jennings, John Hoffman
  • Patent number: 10938807
    Abstract: A computing system includes a virtualization server to provide a virtual session, and a client device communicating with the virtualization server and displaying the virtual session. The client device includes a camera for generating user images of a user of the client device. A user validator includes a policy database for security enforcement, and analyzes the user images and selects at least one policy from the policy database based on the analyzed images. The at least one policy provides at least one action to be taken by the computing system to protect the virtual session.
    Type: Grant
    Filed: July 11, 2018
    Date of Patent: March 2, 2021
    Assignee: CITRIX SYSTEMS, INC.
    Inventor: Hao Wu
  • Patent number: 10929530
    Abstract: Systems and methods for monitoring activity within High Definition Multimedia Interface (HDMI) enabled consumer electronics control (CEC) devices and their networks and identifying unexpected and/or suspicious activity within the network are provided. CEC message packets and packet attribute analysis can be used to identify unexpected and/or suspicious CEC activity within two or more interconnected HDMI devices. Three fundamental steps can be used: a data collection step can capture CEC activity occurring within an HDMI distribution; a data processing step can correlate data into a packet analysis process to create a model later used for evaluation; and a decision process step can use the model created in the data processing step to determine if activity occurring within the HDMI distribution is expected or unexpected.
    Type: Grant
    Filed: July 27, 2020
    Date of Patent: February 23, 2021
    Assignee: The Florida International University Board of Trustees
    Inventors: Luis C. Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac
  • Patent number: 10922416
    Abstract: A device includes processing circuitry configured to receive node data including attributes from at least one computing device, organize the node data into one or more node groupings, wherein each node grouping includes nodes of the node data having one or more shared attributes, determine a node grouping processing scheme based on one or more transient event detection priorities, and detect, in response to executing the node grouping processing scheme for each of the one or more node groupings, one or more transient event occurrences within the one or more node groupings.
    Type: Grant
    Filed: May 9, 2017
    Date of Patent: February 16, 2021
    Inventor: Dylan Nielson
  • Patent number: 10915645
    Abstract: A system for secure storage audit verification includes a transaction pool and a processor. The transaction pool stores transactions records for a Key Release System (KRS) Audit Agent or a Key Management System (KMS) Audit Agent. The processor is configured to select a transaction, wherein the transaction is awaiting verification in the transaction pool; determine whether the transaction is old; in response to the transaction not being old, select a new transaction; and in response to the transaction being old, indicate to suspend processing of the transaction.
    Type: Grant
    Filed: September 19, 2019
    Date of Patent: February 9, 2021
    Assignee: Workday, Inc.
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Patent number: 10911457
    Abstract: Policy changes are propagated to access control devices of a distributed system. The policy changes are given immediate effect without having to wait for the changes to propagate through the system. A token comprises the policy change and can be provided in connection with access requests. Before an access control device has received a propagated policy change, the access control device can evaluate a token provided in connection with a request to determine, consistent with the policy change, whether to fulfill the request.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: February 2, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Matthew James Wren
  • Patent number: 10902098
    Abstract: A method for encrypting logic includes generating, by a computing system, locking logic for inclusion in a logic circuit. The locking logic is generated based at least in part on an error rate and an attack complexity. The method also includes inserting, by the computing system, a one-way function into the locking logic. The method further includes applying, by the computing system, obfuscation logic to the logic circuit, where the obfuscation logic is applied on top of the locking logic.
    Type: Grant
    Filed: July 11, 2018
    Date of Patent: January 26, 2021
    Assignee: Northwestern University
    Inventor: Hai Zhou
  • Patent number: 10891358
    Abstract: Methods, systems, and computer-readable media for industrial control software execution management. For example, there is provided a method for enabling a software module included in a plurality of software modules of an application package installed on a computing device configured to control a turbomachine of an industrial plant. The method can include receiving, by a processor of the computing device, a request for executing the software module. The method can include generating and sending an activation request to a remote server. The method can include generating, by the remote server, an activation code if a verification protocol is successfully completed. The method can include forwarding the activation code to the computing device. The method can include activating the software module when the activation code is received by the processor.
    Type: Grant
    Filed: January 13, 2017
    Date of Patent: January 12, 2021
    Inventors: Stefano Truschi, Virginia Castelli, Carlo Snickars
  • Patent number: 10893024
    Abstract: Methods and apparatus for private network peering in virtual network environments in which peerings between virtual client private networks on a provider network may be established by clients via an API to a peering service. The peering service and API 104 may allow clients to dynamically establish and manage virtual network transit centers on the provider network at which virtual ports may be established and configured, virtual peerings between private networks may be requested and, if accepted, established, and routing information for the peerings may be specified and exchanged. Once a virtual peering between client private networks is established, packets may be exchanged between the respective client private networks via the peering over the network substrate according to the overlay network technology used by the provider network, for example an encapsulation protocol technology.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: January 12, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Bashuman Deb, Andrew Bruce Dickinson, Christopher Ian Hendrie
  • Patent number: 10893060
    Abstract: A system and a method are disclosed for determining that a first electronic communication, received in a first private repository of a user, has been identified (e.g., flagged) as including a threat, and determining a probability that the first electronic communication includes the threat. In response to determining that the probability exceeds a threshold probability, the system monitors monitoring for a second electronic communication, received in a second private repository, that includes contents that match the contents of the first electronic communication.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: January 12, 2021
    Inventors: Ryan M. Noon, Abhishek Agrawal, Christopher J. Park