Patents Examined by Luu Pham
  • Patent number: 10025932
    Abstract: A portable security device for a computing system includes a housing, an interface at least partially disposed within the housing, a trusted platform module within the housing that is coupled to the interface, and a controller within the housing that is coupled to the trusted platform module and the interface. The interface is configured to engage a plurality of different devices and provide communication between the portable security device and an individual device when engaged with the individual device. In some examples, the trusted platform module can receive power from the individual device via the interface when the portable security device is engaged with the individual device. The controller includes logic to detect when the portable security device is coupled to the individual device via the interface.
    Type: Grant
    Filed: January 30, 2015
    Date of Patent: July 17, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Stefan Thom, Ronald Aigner
  • Patent number: 10015768
    Abstract: The disclosed computer-implemented method for locating unrecognized computing devices may include (1) identifying a plurality of cooperating computing devices on a wireless network that are each configured with a device location application, (2) determining a physical location for each cooperating computing device within the plurality of cooperating computing devices, (3) receiving, from the device location application on the plurality of cooperating computing devices, data about packets intercepted by the plurality of cooperating computing devices that are directed to the wireless network by an unrecognized computing device, and (4) locating the unrecognized computing device based on information received from the plurality of cooperating computing devices that identifies both the physical location for each cooperating computing device and signal strengths of the packets intercepted by the plurality of cooperating computing devices.
    Type: Grant
    Filed: December 12, 2016
    Date of Patent: July 3, 2018
    Assignee: Symantec Corporation
    Inventors: Qiyan Wang, Anand Kashyap
  • Patent number: 10009377
    Abstract: An information processing apparatus includes a policy acquisition unit configured to acquire a policy on disclosure of information on a target user; a collection unit configured to collect attributes that may be related to the target user from public information disclosed on a network to create an attribute set related to the target user; and a determination unit configured to determine whether or not the attribute set satisfies the policy.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: June 26, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kohichi Kamijoh, Takayuki Osogami
  • Patent number: 10007807
    Abstract: Methods and systems for managing I/O requests in a secure storage appliance are disclosed. One method includes receiving a plurality of I/O requests at the secure storage appliance, each I/O request associated with a block of data and a volume, each volume associated with a plurality of shares stored on a plurality of physical storage devices. The method further includes storing a plurality of blocks of data in buffers of the secure storage appliance, each of the blocks of data associated with one or more of the plurality of I/O requests. The method also includes associating a state with each of the blocks of data, the state selected from a plurality of states associated with processing of an I/O request.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: June 26, 2018
    Assignee: Unisys Corporation
    Inventors: Scott Summers, Albert French
  • Patent number: 10003458
    Abstract: Management of user keys for public key authentication using the SSH in large SSH deployments is automated by deploying a management system in the environment, discovering SSH identity keys and authorized keys, analyzing authorized connections between user accounts, and automatically managing the authorized connections and the key pairs used for authentication.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: June 19, 2018
    Assignee: SSH COMMUNICATIONS SECURITY CORP.
    Inventor: Tatu J. Ylonen
  • Patent number: 10003592
    Abstract: A user authentication system enables control of access to historian data through a historian application. The user authentication system creates a user authentication directory for storing user authentication information. The system populates the directory with user authentication information. The system links the directory to a historian application and receives credential data from a user. The system grants access to the historian application when it determines that the credential data from the user matches a portion of the user authentication information on the directory.
    Type: Grant
    Filed: March 5, 2015
    Date of Patent: June 19, 2018
    Assignee: Schneider Electric Software, LLC
    Inventors: Ravi Kumar Herunde Prakash, Sudhir Gonugunta, John Madden, Elliot Middleton, Olivier Vaillancourt, Vinay T. Kamath
  • Patent number: 9998432
    Abstract: A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: June 12, 2018
    Assignee: Dennis Duray
    Inventor: Dennis Dupray
  • Patent number: 9992024
    Abstract: According to an aspect of an embodiment, a method of establishing a chain of trust into a virtual machine on a hardware system is described. The method may include measuring an immutable portion of a virtual machine image configured to instantiate as the virtual machine to generate a trust anchor measurement. The method may also include storing the trust anchor measurement in a sealed memory.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: June 5, 2018
    Assignee: FUJITSU LIMITED
    Inventors: Zhexuan Song, Maarten H. Wiggers, Ryusuke Masuoka
  • Patent number: 9967259
    Abstract: In one embodiment, a method includes analyzing information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of a social-networking system, the first network-enabled device being associated with a first user of the social-networking system. The method also includes determining (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, where the authorization is based on social-networking information. The method further includes providing the instructions to the second network-enabled device.
    Type: Grant
    Filed: July 18, 2014
    Date of Patent: May 8, 2018
    Assignee: Facebook, Inc.
    Inventors: Yael G. Maguire, Damian Kowalewski
  • Patent number: 9965639
    Abstract: Embodiments of the present invention provide systems and methods for authenticating the source code of a software end product. The method includes generating a compound key, which is composed of a set of unique keys generated from a source file. A set of files are separately build based on a received source code, and a key generated and embedded into the files at the time of the build. A validation tool is used to compare the values of the generated compound key to the values of the embedded key to determine if the values match.
    Type: Grant
    Filed: July 17, 2015
    Date of Patent: May 8, 2018
    Assignee: International Business Machines Corporation
    Inventors: Badekila Ganesh Prashanth Bhat, Nageswararao V. Gokavarapu, John Kurian, Raghavendran Srinivasan
  • Patent number: 9961110
    Abstract: Implementations relate to systems and methods for pre-signing of DNSSEC enabled zones into record sets. A domain name system (DNS) can receive and/or impose a set of DNS policies desired by an administrator, or the DNS operator itself to govern domain name resolution with security extensions (DNSSEC) for a Web domain. The DNS can generate a set of answers to user questions directed to the domain based on the set of policies. Those answers which differ or vary based on policy rules can be stored as variant answers, and can be labeled with a variant ID. The variant answers can be pre-signed and stored in the DNS. Because key data and other information is generated and stored before a DNS request is received, the requested variant answer can be returned with greater responsiveness and security.
    Type: Grant
    Filed: November 27, 2013
    Date of Patent: May 1, 2018
    Assignee: VERISIGN, INC.
    Inventors: David Blacka, Ramakant Pandrangi
  • Patent number: 9961052
    Abstract: In virtualized environments a method of determining authorization to a resource cannot use a hardware specific identifier, such as a MAC address. As a result upgrading a virtual host may cause licenses associated with that host to be invalid, even though the upgraded virtual host should be authorized. Authentication methods and systems are disclosed such that a key may be shared with a second host along with a license file and, provided at least the second host has a key associated with its system identifier and a key associated with a license file, access to a licensed resource may be authorized.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: May 1, 2018
    Assignee: Extreme Networks, Inc.
    Inventors: William T. Walker, Aabha Biyani
  • Patent number: 9954687
    Abstract: A method and apparatus for establishing a wireless connection. A digital certificate having a second name is obtained by a processor unit in response to receiving a selection of a network using a first name broadcast by a wireless access point. A determination is made by the processor unit as to whether the digital certificate is valid. A determination is made by the processor unit as to whether the second name in the digital certificate matches the first name broadcast by the wireless access point. The processor unit establishes the wireless connection to the wireless access point in response to the digital certificate being valid and the second name in the digital certificate matching the first name broadcast by the wireless access point.
    Type: Grant
    Filed: October 23, 2015
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Thomas J. Cross, David B. Dewey, Takehiro Takahashi
  • Patent number: 9940265
    Abstract: A computing system including a memory that is shared by a plurality of components of the computing system in order to exchange data between the plurality of components; and a controller configured to control the plurality of components to encrypt the data and to record the encrypted data in the memory.
    Type: Grant
    Filed: August 30, 2012
    Date of Patent: April 10, 2018
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Suk-Jin Yun, Jun-bum Shin, Moon-gyu Jung, Byung-ho Cha
  • Patent number: 9942217
    Abstract: Devices, systems, and methods for generating a secure token specific to an online service provider are provided. User account information of a user is transmitted to a token processor from an online service provider requesting a secure token generation. The token processor also receives exchange information for an exchange between the user and the online service provider. The token processor generates, based on the exchange information and the user account information, a secure token to be used for the exchange. The generated secure token is mapped to the online service provider and transmitted to the online service provider. The stored secure token is usable only at the mapped online service provider.
    Type: Grant
    Filed: June 3, 2015
    Date of Patent: April 10, 2018
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: Michael Gulledge
  • Patent number: 9935980
    Abstract: A server device receives, from a member device, a registration request for a group virtual private network (VPN) and provides an initial firewall security policy for the group VPN. The server device receives instructions for a policy configuration change and sends, to the member device, a push message that includes dynamic policies to implement the policy configuration change. The dynamic policies are implemented as a subset of a template policy. The member device receives the push message with the dynamic policies, associates the dynamic policies with the template policy, and applies the initial security policy data and the dynamic policies to incoming traffic without the need for a reboot of the member device.
    Type: Grant
    Filed: August 14, 2015
    Date of Patent: April 3, 2018
    Assignee: Juniper Networks, Inc.
    Inventor: Madhav Karhade
  • Patent number: 9935959
    Abstract: Techniques are described for implementing a cloud computer system to provide access to a custom execution environment for execution of custom executable instructions. Users may be able to configure one or more different types of template execution environments, e.g., a virtual machine environment, each of which can be used to establish a type of custom execution environment. Users may configure the template execution environment with regard to settings, states, resources, permissions, or other criterion related to an execution environment. Upon request, a custom execution environment (e.g., a child execution environment) may be established for running one instance of a custom executable instruction. The custom execution environment may be based on the template execution environment. The custom execution environment may provide a secure, isolated environment for execution of a custom executable instruction.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: April 3, 2018
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Michael Keith, William Bruce Kilgore, Kaj van de Loo
  • Patent number: 9929861
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Patent number: 9930034
    Abstract: A mobile device can receive, from an application installed on a wearable device, an authentication query. Based upon the authentication query, an application installed on the mobile device can be determined to have been authenticated. In response to determining that the application installed on the mobile device has been authenticated, a temporary password can be generated at the mobile device and converted into a vibration pattern. The vibration pattern can be vibrated at the mobile device. The temporary password sent from the mobile device can be compared with user input received via a tap interface on the wearable device. In response to determining that the user input corresponds to the temporary password, the application installed on the wearable device can be authenticated based on authentication parameters of the corresponding application on the mobile device.
    Type: Grant
    Filed: July 29, 2015
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Vijay Ekambaram, Ashish K. Mathur, Ashok Pon Kumar Sree Prakash
  • Patent number: 9930053
    Abstract: A bot detection engine to determine whether hosts in an organization's network are performing bot-related activities is disclosed. A bot detection engine can receive network traffic between hosts in a network, and/or between hosts across several networks. The bot engine may parse the network traffic into session datasets and discard the session datasets that were not initiated by hosts in a given network. The session datasets may be analyzed and state data may be accumulated. The state data may correspond to actions performed by the hosts, such as requesting a website or clicking ads, or requesting content within the website (e.g. clicking on a image which forms a HTTP request/response transaction for the image file).
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: March 27, 2018
    Assignee: Vectra Networks, Inc.
    Inventor: Nicolas Beauchesne