Patents Examined by Luu Pham
  • Patent number: 10248781
    Abstract: A system and method unlock a passcode-secured device using force detection and haptic feedback. When prompted for a passcode, a user applies a press and hold gesture, applying continuous pressure force, to a surface of the device while receiving tactile feedback at the surface in the form of vibratory pulses. The vibratory pulses continue until the pressure force is released from the surface. The user counts the number of pulses sensed by tactile feedback at the surface until the desired number is obtained, then releases the pressure force from the surface, signaling that the pulse count should be entered as a passcode digit value. The process is repeated for each sequential passcode digit until a passcode is entered in the device. The device unlocks if the entered passcode matches a reference passcode in the device.
    Type: Grant
    Filed: May 16, 2016
    Date of Patent: April 2, 2019
    Assignee: BlackBerry Limited
    Inventors: Michael Joseph DeFazio, Ryan Gerard Ebbers
  • Patent number: 10204224
    Abstract: The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing static analysis of the samples, determining latent logic execution path information regarding the samples, classifying the samples, and/or providing intelligent report information regarding the samples.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: February 12, 2019
    Assignee: McAfee Ireland Holdings Limited
    Inventor: Lixin Lu
  • Patent number: 10140453
    Abstract: A vulnerability records manager (VRM) receives respective vulnerability data sets (VDS) from a first and second vulnerability information collector. Each VDS comprises values of a different set of attributes defined in a vulnerability taxonomy specification. The VRM normalizes the VDSs to generate a first and second vulnerability record comprising a particular plurality of attributes defined in the specification, and stores the vulnerability records in a repository. In response to a request received via a programmatic interface, the VRM transmits contents of the vulnerability records to an automated risk analyzer or a reporting/presentation component.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: November 27, 2018
    Assignee: Amazon Technologies, Inc.
    Inventor: Stephen George Fridakis
  • Patent number: 10121015
    Abstract: A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use by a third party transaction.
    Type: Grant
    Filed: February 23, 2015
    Date of Patent: November 6, 2018
    Assignee: LENS VENTURES, LLC
    Inventors: Tara Lemmey, Stanislav Vonog
  • Patent number: 10116623
    Abstract: Token-based firewall functionality. A request is received for access to a resource from a remote user device, the request received by an application firewall. A token is associated with the request. The token and associated information are stored in an event correlator coupled with the application firewall. The token is associated with one or more subsequent actions by the resource in response to receiving the request. A response to the request including the token is generated. The response with the token is transmitted to the remote user device via the application firewall. The application firewall analyzes the response and determines an action to be taken on the response based on the token and the associated information.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: October 30, 2018
    Assignee: salesforce.com, inc.
    Inventor: Yoel Gluck
  • Patent number: 10111100
    Abstract: Aspects of the invention can log a user into a primary device in a more efficient manner. For example, aspects of the invention may eliminate the need for the user to supply user credentials directly to a primary device. Instead, the companion device recognizes relevant primary devices located proximate to the companion device and automatically initiates a user login to the primary device without user intervention. Aspects of the invention can automatically login a user to known and unknown primary devices.
    Type: Grant
    Filed: August 25, 2014
    Date of Patent: October 23, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ross David Heeter, Jason Robert Tuck, Cyrus Kanga
  • Patent number: 10110572
    Abstract: Implementations described and claimed herein provide encryption in the data path. In one implementation, login parameters from a primary data center are obtained. The login parameters include an identification of a destination device. An encryption key corresponding to the destination device is received. A write command including data for writing to the destination device is received from the primary data center. The data is encrypted inside a firewall of the primary data center using the encryption key. The encrypted data is routed over a data path to the destination device. As such, the data is secure during transmission over the network to the destination device.
    Type: Grant
    Filed: January 21, 2015
    Date of Patent: October 23, 2018
    Assignee: Oracle International Corporation
    Inventor: David Hostetter
  • Patent number: 10108808
    Abstract: Data access sharing may be provided. Requests may be received to display an data item associated with a list of data items. Upon determining whether a property of the data item is restricted by an access control policy, the property may be modified prior to rendering a display of the data item.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: October 23, 2018
    Assignee: AIRWATCH LLC
    Inventor: Erich Stuntebeck
  • Patent number: 10095882
    Abstract: In one embodiment, a method for securing data on a semi-trusted server is implemented on a computing device and includes: receiving at least a current session key from a user device for use during a current session, where the current session key is suitable for encrypting data and for decrypting data encrypted with the current session key, decrypting communications received from the user device during the session with said session key, encrypting with the session key at least one of communications to be sent to said user device and personal data generated during the session, storing the encrypted personal data, and discarding the current session key upon completion of the session, thereby limiting possible access to the stored encrypted personal data other than during the session. Related apparatus and methods are also described.
    Type: Grant
    Filed: August 18, 2014
    Date of Patent: October 9, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Erez Waisbard, Anna Schnaiderman
  • Patent number: 10091194
    Abstract: A computing platform may receive, from a client portal server, a request to authenticate a first user to a first user account. The computing platform may generate a first one-time passcode for a first computing device associated with the first user account and may send, to the first computing device, the first one-time passcode. The computing platform also may generate a second one-time passcode for a second computing device associated with the first user account and may send, to the second computing device, the second one-time passcode. Thereafter, the computing platform may receive first one-time passcode input and second one-time passcode input, which the computing platform may validate. Based on the validating, the computing platform may generate a validation message directing the client portal server to provide the first user with access to the first user account, which the computing platform may send to the client portal server.
    Type: Grant
    Filed: May 12, 2016
    Date of Patent: October 2, 2018
    Assignee: Bank of America Corporation
    Inventors: Elizabeth S. Votaw, Andrew T. Keys
  • Patent number: 10091190
    Abstract: Authentication of a device through a constructed authentication token. Components of an authentication key are distributed across at least a device and a server, diminishing a likelihood that an individual account is compromised by an attack.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jan L. Camenisch, Anja Lehmann, Gregory Neven, Franz-Stefan Preiss, Kai W. Samelin
  • Patent number: 10091240
    Abstract: An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server. To provide the forward secrecy for this particular leg, the edge server selects an ephemeral value, and applies a cryptographic hash the value to compute a server random value, which is then transmitted back to the requesting client. That server random value is later re-generated at the cryptographic server to enable the cryptographic server to compute a master secret. The forward secrecy is enabled by ensuring that the ephemeral value does not travel on the wire.
    Type: Grant
    Filed: January 22, 2018
    Date of Patent: October 2, 2018
    Assignee: Akamai Technologies, Inc.
    Inventors: Charles E. Gero, Philip A. Lisiecki
  • Patent number: 10084597
    Abstract: A cryptographically-enabled RFID tag stores a primary secret key and derives secondary keys from the primary key. A secondary key may be derived by combining the primary key with one or more other parameters using one or more algorithms. The tag uses a derived secondary key to encrypt or electronically sign a tag response sent to a verifying entity. The verifying entity does not know the derived secondary key, but knows the tag primary key and the parameters and algorithms used to derive the secondary key and can derive all of the potential secondary keys. The verifying entity can then attempt to authenticate the tag or tag response by trying potential secondary keys.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: September 25, 2018
    Assignee: Impinj, Inc.
    Inventors: Matthew Robshaw, Alberto Pesavento, Christopher Diorio
  • Patent number: 10084751
    Abstract: A method for balancing load among firewall security devices (FSDs) is provided. According to one embodiment, a switching device performs adaptive load balancing among cluster units of an HA cluster of firewall security devices. A load balancing (LB) function implemented by the switching device is configured based on information received from a network administrator. A LB table is maintained that forms associations between hash values output by the LB function and corresponding ports of the switching device to which the cluster units are coupled. Network traffic received by the switching device is directed to appropriate cluster units based on the LB function and the LB table. A traffic load on each of the cluster units is monitored. Responsive to a deviation from a predefined ideal traffic distribution, an attempt is made to improve performance of the HA cluster by dynamically adjusting the LB balancing table to address the deviation.
    Type: Grant
    Filed: November 19, 2017
    Date of Patent: September 25, 2018
    Assignee: Fortinet, Inc.
    Inventors: Edward Lopez, Joe Mihelich, Matthew F. Hepburn
  • Patent number: 10079678
    Abstract: Embodiments of methods, systems, and storage medium associated with providing access to encrypted data for authorized users are disclosed herein. In one instance, the method may include obtaining a derived value for an authenticated user based on user personalization data of the authenticated user, and generating a user-specific encryption key based on the derived value. The derived value may have entropy in excess of a predetermined level. The user-specific encryption key may enable the authenticated user to access the encrypted data stored at the storage device. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: July 24, 2012
    Date of Patent: September 18, 2018
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, George W. Cox, David Johnston
  • Patent number: 10075846
    Abstract: Systems and methods for continuous and transparent verification, authentication, and identification of individuals are provided. A method can include detecting a signal from a sensor embedded in a wearable device, determining a set of features unique to the wearer of the wearable device, creating a user profile of that individual, detecting a signal from a sensor of an unknown individual, determining a set of features unique to the unknown individual, and comparing the features of the unknown individual to the previously created user profile.
    Type: Grant
    Filed: August 10, 2017
    Date of Patent: September 11, 2018
    Assignee: The Florida International University Board of Trustees
    Inventors: Abbas Acar, Hidayet Aksu, Kemal Akkaya, A. Selcuk Uluagac
  • Patent number: 10068100
    Abstract: A facility for interacting with an electronic document is described. The facility causes to be displayed a visual representation of the document, and receives input representing a painting interaction with a portion of the displayed visual representation of the document that corresponds to a portion of the document. In response to receiving the first input, the facility imposes on the corresponding portion of the document a distinguished content classification level.
    Type: Grant
    Filed: January 20, 2016
    Date of Patent: September 4, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jonathan Edgar Fay, Robert Earl Standefer, III, Christopher Lee Mullins, Joshua Allen Cowhig
  • Patent number: 10063561
    Abstract: Provided is authentication and authorization without the use of supplicants. Authentication and authorization includes generating a profile for a device based on at least one characteristic observed during a successful attempt by the device to access an 802.1X network infrastructure. Expected characteristics for a next attempt to access the infrastructure by the device are determined. A characteristic of the next access attempt is matched to the expected characteristic and access to the network is selectively controlled as a result of the matching. This is achieved without a supplicant being installed on the device.
    Type: Grant
    Filed: March 27, 2018
    Date of Patent: August 28, 2018
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Ryan B. Benskin, Lawrence T. Belton, Jr., Christopher Houser, Peter A. Makohon, Timothy Morris, Omar Bracey
  • Patent number: 10057238
    Abstract: Devices, systems, and methods for generating a secure token specific to an online service provider are provided. User account information of a user is transmitted to a token processor from an online service provider requesting a secure token generation. The token processor also receives, from the online service provider, exchange information for an exchange between the user and the online service provider. The token processor generates, based on the exchange information and the user account information, a secure token to be used for the exchange. The generated secure token is mapped to the online service provider and transmitted to the online service provider. The exchange information is deleted from the online service provider. The stored secure token is usable only at the mapped online service provider.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: August 21, 2018
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: Michael Gulledge
  • Patent number: 10057240
    Abstract: A mobile device may include an authenticator and a processor. The authenticator may store a first secret corresponding to a second secret stored on a server and generating a key based upon the first secret. The processor may embed the key in data communicated to the server to request access from the server.
    Type: Grant
    Filed: August 25, 2014
    Date of Patent: August 21, 2018
    Assignee: SAP SE
    Inventor: Dimitar Mihaylov