Patents Examined by Lizbeth Torres-Diaz
  • Patent number: 10110563
    Abstract: Techniques for reduction and acceleration of a deterministic finite automaton (DFA) are disclosed. In some embodiments, a system, process, and/or computer program product for reduction and acceleration of a DFA includes receiving an input value; performing a reduced deterministic finite automaton lookup using a lookup key, wherein the lookup key comprises a current state and the input value; and determining a next state based on the lookup key.
    Type: Grant
    Filed: April 28, 2016
    Date of Patent: October 23, 2018
    Assignee: Palo Alto Networks, Inc.
    Inventors: Subramani Ganesh, Sidong Li, Lei Chang
  • Patent number: 10042990
    Abstract: Atomically modifying a personal security device includes presenting the personal security device to a reader/writer coupled to an access module, the access module determining if the personal security device includes a factory security mechanism, and, if the personal security device includes a factory security mechanism, using the reader/writer and the access module to replace the factory security mechanism with another security mechanism. The access module may authenticate the personal security device in connection with replacing the factory security mechanism. Authenticating the personal security device may grant access to a user through a door controlled by the access module. Replacing the factory security mechanism may include replacing an application on the personal security device. An ISO/IEC 7816-13 application management request command may be used to replace the application.
    Type: Grant
    Filed: March 26, 2013
    Date of Patent: August 7, 2018
    Assignee: Assa Abloy AB
    Inventors: Kapil Sachdeva, Philip Hoyer, Eric F. Le Saint, Sylvain Prevost
  • Patent number: 10044514
    Abstract: The disclosure describes approaches for protecting a circuit design for a programmable integrated circuit (IC). A black key is generated from an input red key by a registration circuit implemented on the programmable IC, and the black key is stored in a memory circuit external to the programmable IC. The programmable IC is configured to implement a pre-configuration circuit, which inputs the black key from the memory circuit and generates the red key from the black key. A ciphertext circuit design is decrypted into a plaintext circuit design by the programmable IC using the red key, and the red key is erased from the programmable IC. The programmable IC is reconfigured with the plaintext circuit design.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: August 7, 2018
    Assignee: XILINX, INC.
    Inventors: Edward S. Peterson, James D. Wesselkamper
  • Patent number: 10003910
    Abstract: Data on agricultural machines can be outputted to mobile terminals easily and properly. A data collection device is provided separately from a control device that controls the operation of an agricultural machine and is connected to a vehicle communication network installed in the agricultural machine, and is removably connected to the vehicle communication network. The data collection device includes a data collection unit for collecting agricultural machine data outputted to the vehicle communication network, an authorization determination unit for implementing authentication with a mobile terminal to determine whether or not the collected data is transmitted to the mobile terminal by wireless communication, and a data communication unit for transmitting data to the mobile terminal by wireless communication when the authorization determination unit authorizes data transmission.
    Type: Grant
    Filed: September 20, 2013
    Date of Patent: June 19, 2018
    Assignee: KUBOTA CORPORATION
    Inventors: Keisuke Miura, Isao Tanaka, Yasuhisa Uoya, Takafumi Morishita, Yoshito Hayakawa
  • Patent number: 9973473
    Abstract: Methods, systems, and computer readable media for rapid filtering of opaque data traffic are disclosed. According to one method, the method includes receiving a packet containing a payload. The method also includes analyzing a portion of the payload for determining whether the packet contains compressed or encrypted data. The method further includes performing, if the packet contains compressed or encrypted data, at least one of sending the packet to an opaque traffic analysis engine for analysis, discarding the packet, logging the packet, or marking the packet.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: May 15, 2018
    Assignee: THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL
    Inventors: Andrew Maxwell White, Fabian Monrose, Srinivas Krishnan, Phillip Andrew Porras, Michael Donald Bailey
  • Patent number: 9967235
    Abstract: A system for maintaining and hosting an AMI command and control application is disclosed. The system includes an AMI command and control application module in a network compartment for measuring energy usage from customer meters, managing an AMI network, and executing connect/disconnect orders; and a plurality of firewalls to provide a security perimeter to the AMI command and control application module when the module is accessed by a vendor network or a utility network. The AMI command and control application module includes a VPN concentrator and a 6in4 router to provide a security perimeter between the AMI command and control application module and the AMI network.
    Type: Grant
    Filed: November 14, 2012
    Date of Patent: May 8, 2018
    Assignee: Florida Power & Light Company
    Inventors: Paul J. Ollukaren, Radhakrishnan Swaminathan, Susan Lynn King, Keith Wayne McBee, Julio C. Gutierrez, Manuel Rodriguez-Perez
  • Patent number: 9940462
    Abstract: Methods and apparatus for validating a system include reading protected record data for a section of the system from a secure storage element, and verifying integrity of the section of the system using the record data. The secure storage element independently verifies that all record data and data to be written to the system is valid.
    Type: Grant
    Filed: May 3, 2017
    Date of Patent: April 10, 2018
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Marvin D. Nelson
  • Patent number: 9934374
    Abstract: The present disclosure provides a description of a computer implemented method and system for protecting a software program from attack during runtime. The system comprises a plurality of software blocks for providing desired functions during execution of a software program and a trusted address server having a table for mapping predetermined source tokens to destination tokens. The trusted address server couples each of the plurality of software blocks for receipt of predetermined source tokens from any one of the plurality of software blocks, while returning a mapped destination token from the predetermined destination tokens to said any one of the plurality of software blocks in dependence upon the table for mapping predetermined source tokens to destination tokens.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: April 3, 2018
    Assignee: IRDETO B.V.
    Inventors: Robert Krten, Jonathan Emmett, Clifford Liem
  • Patent number: 9871696
    Abstract: Systems, methods, apparatus, and articles of manufacture to facilitate configuration and naming of a multimedia playback device on a local playback network are disclosed. An example method includes identifying and analyzing local network topology to identify playback device(s) connected to the network at location(s). The example method includes analyzing a playback device to be added and comparing the playback device to be added to the playback device(s) already connected to the network. The example method includes displaying available option(s) to name the playback device to be added based on the analysis of the network, the already connected playback device(s) and the playback device to be added to the network. The example method includes naming the playback device to be added based on a selected available option.
    Type: Grant
    Filed: April 4, 2016
    Date of Patent: January 16, 2018
    Assignee: Sonos, Inc.
    Inventors: Neil Griffiths, Mark Triplett
  • Patent number: 9838457
    Abstract: A system can include an interface that receives a URL that includes information; circuitry that processes at least a portion of the information for entity information and Internet merchant information; circuitry that accesses database entries in an entity field and in an affiliate program criterion field; circuitry that associates the URL with an entity field database entry based at least in part on the entity information; circuitry that includes selection logic that selects at least one affiliate program from a plurality of affiliate programs based at least in part on an affiliate program criterion field entry associated with the entity field database entry; and circuitry that formulates a redirection URL based at least in part on the Internet merchant information wherein the redirection URL comprises affiliate program information for the at least one selected affiliate program. Various other apparatuses, systems, methods, etc., are also disclosed.
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: December 5, 2017
    Inventors: Jesse Lakes, Jesse Pasichnyk
  • Patent number: 9824226
    Abstract: Methods, systems and storage media are disclosed for enhanced system boot processing that authenticates boot code based on biometric information of the user before loading the boot code to system memory. For at least some embodiments, the biometric authentication augments authentication of boot code based on a unique platform identifier. The enhanced boot code authentication occurs before loading of the operating system, and may be performed during a Unified Extensible Firmware Interface (UEFI) boot sequence. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 25, 2012
    Date of Patent: November 21, 2017
    Assignee: INTEL CORPORATION
    Inventors: Qian Ouyang, Jian J. Wang, Vincent J. Zimmer, Michael A. Rothman, Chao B. Zhang
  • Patent number: 9811672
    Abstract: A method of provisioning a subordinate trusted security zone in a processor having a trusted security zone. The method comprises receiving by a master trusted application executing in a master trusted security zone of the processor a request to provision a subordinate trusted security zone in the processor, wherein the request comprises a master trusted security zone key, wherein the request designates the subordinate trusted security zone, and wherein the request defines an independent key. The method further comprises provisioning by the master trusted application the subordinate trusted security zone to be accessible based on the independent key.
    Type: Grant
    Filed: September 15, 2015
    Date of Patent: November 7, 2017
    Assignee: Sprint Communications Company L.P.
    Inventors: Stephen J. Bye, Lyle W. Paczkowski, William M. Parsel, Carl J. Persson, Matthew C. Schlesener, Trevor D. Shipley
  • Patent number: 9792657
    Abstract: Techniques for leveraging social information, including a social graph, to identify content likely to be of interest to a user are described. With some embodiments, a content enhancement server receives a request for web-based content that is to be presented with a web page that is being presented at a client computing device. The server will then identify some web-based content that is relevant to a topic or subject matter of the web page, and also popular as determined by analyzing some social information, including in some instances information relating to asocial graph of the viewing user, that is associated with the web-based content. Finally, some items of web-based content are selected, based on a combination of the content's relevance and popularity as indicated by the analysis of the social information. The selected web content is then communicated to the client computing device for presentation with the web page.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: October 17, 2017
    Assignee: Amobee, Inc.
    Inventors: Yoav Shaham, Assaf Henkin, Itai Brickner, Stanislav Krichevsky
  • Patent number: 9787688
    Abstract: Techniques are disclosed for identifying roles with similar membership and/or entitlement information in an identity management system of an enterprise. A role defined in an identity management system may be associated with membership information and entitlement information. The membership information may identify one or more members who has been assigned the role. The entitlement information may determine how members of the role can interact with a target system within the enterprise. The entitlement information may include a list of actions that members of the role can perform on the target system. Embodiments allow for identifying roles that have similar membership and/or entitlement information. If an existing role already gives similar entitlement(s) to similar member(s), the role may be prevented from being created. Thus, embodiments prevent creating and maintaining redundant roles.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: October 10, 2017
    Assignee: Oracle International Corporation
    Inventors: Achyut Ramchandra Jagtap, Muhammad Hamdan Nathersa, Abhimanyu Seth
  • Patent number: 9780954
    Abstract: A computer implemented system and method for lightweight authentication on datagram transport for internet of things provides a robust authentication scheme based on challenge-response type of exchanges between two endpoints sharing a pre-shared secret. A symmetric key-based security mechanism is utilized in the present disclosure where key management is integrated with authentication. It provides mutual authentication wherein the end-points in the system are provisioned with a pre-shared secret during a provisioning phase and a client database is provided at the server side for client identification. The system comprises random number generators for generation of nonces, and key generators to generate secret key and session key. The nonces and keys are valid only during the session and thus help in providing secure authentication across sessions.
    Type: Grant
    Filed: December 17, 2014
    Date of Patent: October 3, 2017
    Assignee: TATA CONSULTANCY SERVICES LTD.
    Inventors: Abhijan Bhattacharya, Soma Bandyopadhyay, Arijit Ukil, Arpan Pal
  • Patent number: 9766810
    Abstract: A method includes a storage unit receiving a respective write request of a first set of write requests, wherein the first set of write requests functions as a write lock request. The method further includes the storage unit determining whether the storage unit has writing of the data object currently locked. The method further includes the storage unit sending a write lock response regarding the data object. The method further includes the storage unit, when a number of write lock responses indicate a write lock of the data object for the computing device and the number is equal to or exceeds a write lock response threshold, receive respective write requests from each set of a plurality of sets of write requests, wherein the plurality of sets of write requests includes write requests for remaining sets of encoded data slices of the plurality of sets of encoded data slices.
    Type: Grant
    Filed: February 1, 2016
    Date of Patent: September 19, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Andrew Baptist, Jason K. Resch
  • Patent number: 9742737
    Abstract: This disclosure describes systems, methods, and computer-readable media related to testing tools for devices. In some embodiments, a plurality of public keys may be received from a server via a secured network connection where each of the plurality of keys corresponds to a respective private key associated with an access point. A time-of-flight (ToF) measurement protocol may be initiated with one or more access points. Data generated by ToF measurement protocol with the one or more access points may be received. In some embodiments, the one or more access points may be authenticated based at least in part on the plurality of public keys. A location of a user device may be determined based at least in part on the received data.
    Type: Grant
    Filed: September 25, 2013
    Date of Patent: August 22, 2017
    Assignee: Intel Corporation
    Inventors: Itai Steiner, Jonathan Segev
  • Patent number: 9727704
    Abstract: A digital rights management (DRM) including a transfer of a rights object (RO) to a second user in consideration of requirements of a movement of a rights object of a first user (a terminal, an equipment), charge, etc., by providing a post browsing session when the rights object occupied by the first user is transferred to a second user via a server.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: August 8, 2017
    Assignee: LG ELECTRONICS INC.
    Inventor: Seung-Jae Lee
  • Patent number: 9715591
    Abstract: Methods and apparatus for validating a system include reading protected record data for a section of the system from a secure storage element, and verifying integrity of the section of the system using the record data. The secure storage element independently verifies that all record data and data to be written to the system is valid.
    Type: Grant
    Filed: July 30, 2012
    Date of Patent: July 25, 2017
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Marvin D Nelson
  • Patent number: 9703647
    Abstract: A method for providing object policy management. The method includes accessing a distributed computer system having a plurality of nodes, and initiating a new object policy object backup protection for a new object. The method further includes processing a list of object attributes available for the new object policy, and processing the list to generate an object management policy. The new object is then processed in accordance with the object management policy.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: July 11, 2017
    Assignee: Veritas Technologies LLC
    Inventors: Mark Ambrose Ditto, James Robert Olson