Patents Examined by Khalil Naghdali
  • Patent number: 10599828
    Abstract: Systems, methods, and computer-readable media are disclosed for authenticating access to a service provider system, or more specifically, to a user account maintained on the service provider system, using a single key authentication mechanism. The service provider system may receive an authentication image from a user application executing on a user device. The authentication image may include first data generated in response to user input to the user device, second data generated by the user application, and third data generated by the service provider system. The service provider system may then authenticate access to the user account based at least in part on the authentication image and send an indication to the user device that access to the user account has been authenticated. Authenticating access to the user account includes determining that the first data, second data, and third data match respective data expected by the service provider system.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: March 24, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
  • Patent number: 10601861
    Abstract: An exemplary computer-implemented method includes obtaining at least one teleportation invite block that records a virtual universe teleportation invite marked by at least one parameter. The teleportation invite identifies a virtual universe user as an invitee. Responsive to the parameter, assess whether the virtual universe teleportation invite is potentially malicious, and alert the invitee in case the virtual universe teleportation invite is potentially malicious.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: March 24, 2020
    Assignee: International Business Machines Corporation
    Inventors: James R. Kozloski, Clifford A. Pickover, Komminist Weldemariam
  • Patent number: 10594473
    Abstract: A database server stores encrypted vector data in which each of a plurality of elements is encrypted by encryption maintaining semi-homomorphism between calculation before encryption and calculation after encryption. The database server receives an obfuscated query (N-randomized query) from a terminal device, performs calculation for each of a plurality of segments of vectors of the obfuscated query with a segment of the encrypted vector data, and transmits the calculation to the terminal device in reply. The terminal device may acquire a result of decryption calculation transmitted in reply by a decryption device.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: March 17, 2020
    Assignee: KABUSHIKIKAISHA RNAi
    Inventors: Tomoyuki Yamada, Masahiro Hattori
  • Patent number: 10594700
    Abstract: A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at a manufacturer of building control devices, where the user account may be associated with one or more of the user's building control devices from the manufacturer. The third party may be a demand response provider, an aggregator of building control devices, or a different entity. The building control devices may be connected to a network. The system may be implemented over one or more networks with a server, an application programming interface (API), and/or a service bus.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: March 17, 2020
    Assignee: Ademco Inc.
    Inventors: Sorabh Khurana, Ivo Kubita, Thomas Yang
  • Patent number: 10595203
    Abstract: A method of establishing a secure connection between a user equipment, UE, and a media gateway, MGw, at setup of a communication session between the UE and another party. The MGw is controlled by a control server and the setup of the communication session comprises a security handshake procedure. The method comprising, prior to receiving a communication session set-up request, determining by the control server whether the MGw supports a procedure for early commencement of the security handshake and providing by the UE to the control server an indication that the UE supports the procedure for early commencement of the security handshake procedure and connection parameters for use in the security handshake. On receiving, by the control server, a communication session setup request from the other party, if both the UE and the MGw support the procedure for early commencement of the security handshake procedure, an instruction is sent to the Media gateway to commence the security handshake procedure.
    Type: Grant
    Filed: January 21, 2015
    Date of Patent: March 17, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: Huoming Dong
  • Patent number: 10587629
    Abstract: This disclosure describes a bot detection system that distinguishes bot transactions from human transactions. The system utilizes an anomaly-based filter process to reduce the number of false positives as determined by the system. The filter process includes maintaining a database of anomaly patterns, wherein the patterns are encoded as anomaly pattern strings. As anomalies are detected, they are encoded in the anomaly pattern strings, and the database is updated by maintaining counts on the occurrences of the strings. When a particular pattern string as reflected in the database has a count that exceeds a threshold, the string is determined to be associated with a bot as opposed to a human user.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: March 10, 2020
    Assignee: Akamai Technologies, Inc.
    Inventors: Sreenath Kurupati, Sridhar Machiroutu, Prajakta Bhurke, Tu Vuong
  • Patent number: 10587622
    Abstract: A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at a manufacturer of building control devices, where the user account may be associated with one or more of the user's building control devices from the manufacturer. The third party may be a demand response provider, an aggregator of building control devices, or a different entity. The building control devices may be connected to a network. The system may be implemented over one or more networks with a server, an application programming interface (API), and/or a service bus.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: March 10, 2020
    Assignee: Ademco Inc.
    Inventors: Sorabh Khurana, Ivo Kubita
  • Patent number: 10586031
    Abstract: The present invention relates to an electronic device. In particular, the present invention relates to an electronic device comprising a first and a second biometric sensor and processing circuitry arranged to authenticate the user of the electronic device. The present invention also relates to a corresponding method and computer program for authenticating the user of an electronic device.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: March 10, 2020
    Assignee: Fingerprint Cards AB
    Inventors: Markus Andersson, Olis Olofsson
  • Patent number: 10581859
    Abstract: Embodiments of the present invention provide systems and methods for thwarting attempts at the unauthorized access to the restricted resources within the target server in a multi-node system. Real-time detection of the user ID and thread ID associated with attempts to access the restricted resources within the target server in a multi-node system is achieved by analyzing causality, message queue, and event-driven patterns.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ashish Kundu, Byung Chul Tak
  • Patent number: 10579816
    Abstract: A flexible policy system allows compliant apps on a mobile device to interact with a secure container memory space to ensure that data leak prevention policies are being enforced. Third-party applications can include an SDK or application wrapper that provide policy enforcement via agent functionality. An administrator can define policies via a web-based portal, allowing a server to identify appropriate users and devices and to distribute policies to those devices to be enforced within the secure container on each device. Policies can identify the datatypes and security levels, and the related applications and users that have authority to access that data. The agent or application wrapper enforces these policies on the mobile device before applications can access data in the secure memory space.
    Type: Grant
    Filed: December 6, 2018
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jatin Malik, Joshua Lambert, Sumeet Singh, Srungarakavi Venkat Samba Naresh
  • Patent number: 10581706
    Abstract: Embodiments of the present invention provide systems and methods for monitoring action records in virtual space. The systems and methods for monitoring action records in virtual space display recorded activity on an avatar within the virtual space by communicating in a virtual space with a user account. The recorded activity is analyzed and processed in order to compile information on the avatar and display an avatar (which is a reflection of the compiled information).
    Type: Grant
    Filed: November 14, 2018
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventor: Yuji Sugiyama
  • Patent number: 10574660
    Abstract: Continuous sensitive content authentication is described. In one example, a request to open content, such as a photograph, spreadsheet, or text-based document, among other types of content, is received. Based on a sensitivity level or access profile rule associated with the content, an individual can be prompted to perform an authentication procedure before the content is displayed. The content can be displayed in response to a verification using the authentication procedure or removed (or not displayed) in response to a rejection using the authentication procedure. Additionally, the authentication procedure can be continuously polled to confirm the verification while the content is displayed. While the content is being displayed, the content can be removed from display at any time if the authentication procedure no longer produces the verification result. In some cases, the content can also be deleted after a rejection is detected using the authentication procedure.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: February 25, 2020
    Assignee: AirWatch, LLC
    Inventor: Erich Stuntebeck
  • Patent number: 10574663
    Abstract: A method for operating a field device is disclosed, the field device having settings and/or functions classified into different security levels, where one of the settings and/or functions of the field device is selected by a user, at least one security measure is implemented depending upon the security level with which the selected setting and/or function is associated, and the security measure determines whether the selected setting and/or function of the field device is released for the user.
    Type: Grant
    Filed: July 16, 2015
    Date of Patent: February 25, 2020
    Assignee: Endress+Hauser Process Solutions AG
    Inventors: Johannes Sprenger, Thomas Jögel, Holger Eberhard, Marco Colucci
  • Patent number: 10564714
    Abstract: Systems and methods are provided for discerning the intent of a device wearer primarily based on movements of the eyes. The system may be included within unobtrusive headwear that performs eye tracking and controls screen display. The system may also utilize remote eye tracking camera(s), remote displays and/or other ancillary inputs. Screen layout is optimized to facilitate the formation and reliable detection of rapid eye signals. The detection of eye signals is based on tracking physiological movements of the eye that are under voluntary control by the device wearer. The detection of eye signals results in actions that are compatible with wearable computing and a wide range of display devices.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: February 18, 2020
    Assignee: GOOGLE LLC
    Inventors: Lewis James Marggraff, Nelson George Publicover, Spencer James Connaughton, Nathan Lord, Peter Milford, Ivan Maleev
  • Patent number: 10567349
    Abstract: Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL) value. A determination is made that the first time-to-live value has not been exceeded. The determination is made at least in part by obtaining an external master clock time. In response to the determination, access is allowed to the message.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: February 18, 2020
    Assignee: Wickr Inc.
    Inventors: Robert Statica, Christopher A. Howell, Kara Lynn Coppa
  • Patent number: 10567381
    Abstract: Security credentials issued by an entity, such as an identity broker, can have a limited lifetime. Access to resources or content under those credentials then can only be obtained for a limited period of time, limiting the ability of an unauthorized entity obtaining the credentials to utilize those credentials for access. Along with the credentials, a refresh token can be issued to a requesting client that can enable the limited lifetime of the credentials to be renewed up to a maximum lifetime of the credentials and/or the token. A service providing access can determine that the client has a valid copy of the refresh token when the credentials are about to expire, and if so can cause the lifetime of the credentials to be extended another credential lifetime. This renewal can be done transparent to a user and without again contacting the identity broker.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: February 18, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Graeme David Baer, Dmitry Frenkel, Marc R. Barbour
  • Patent number: 10554678
    Abstract: A method includes: at a server, obtaining security intelligence data used for classifying whether a data associated with a user activity in a network is undesirable at a first time; classifying whether a first data in the network is undesirable based on the security intelligence data; receiving a request for classifying whether a second data is undesirable based on the security intelligence data; determining whether the server is overloaded with tasks; if the server is determined to be overloaded with tasks: logging the second data in a repository, and tagging the second data to re-visit classification of the second data; and when the server is no longer overloaded, classifying whether the second data is undesirable to produce a second classifying result and re-classifying whether the first data is undesirable based on updated security intelligence data obtained by the server.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: February 4, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Jason V. Miller, Adam J. O'Donnell
  • Patent number: 10552622
    Abstract: A method for controlling data access in a data-at-rest system includes executing a link intrusion prevention analysis between multiple layers of the data-at-rest system, introducing a privacy policy at enforcement points that span multiple system layers, and dynamically altering the privacy policy.
    Type: Grant
    Filed: December 9, 2014
    Date of Patent: February 4, 2020
    Assignee: Protegrity Corporation
    Inventor: Ulf Mattsson
  • Patent number: 10547606
    Abstract: An information processing apparatus includes a signing unit and first and second obtaining units. The signing unit signs a document by using a certificate used for connecting to an access point. The document is obtained via the access point. The first obtaining unit obtains, in response to an access request to access the signed document, identification information concerning the certificate used for signing the signed document. The second obtaining unit obtains identification information concerning a certificate used for connecting to an access point when the access request is received. The display controller performs control so that the sighed document will be displayed if the identification information obtained by the first obtaining unit and the identification information obtained by the second obtaining unit coincide with each other.
    Type: Grant
    Filed: May 8, 2017
    Date of Patent: January 28, 2020
    Assignee: FUJI XEROX CO., LTD.
    Inventor: Koichiro Mino
  • Patent number: 10547627
    Abstract: Techniques for malicious HTTP cookies detection and clustering are disclosed. In some embodiments, a system, process, and/or computer program product for malicious HTTP cookies detection and clustering includes receiving a sample at a cloud security service; extracting a cookie from network traffic associated with the sample; determining that the cookie is associated with malware; and generating a signature based on the cookie.
    Type: Grant
    Filed: April 28, 2016
    Date of Patent: January 28, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Zhaoyan Xu, Wei Xu, Kyle Sanders