Patents Examined by Lynn D. Feild
  • Patent number: 10652950
    Abstract: In one embodiment, a system, apparatus, and method are described for requesting access authorization from an access network access point (AP) via an access network interface, generating at a processor a public-private key pair to be used to generate a cryptographically generated address (CGA) upon receiving the access authorization, sending a secure neighbor discovery (SeND)—neighbor solicitation (NS) to the AP via the access network interface after the public-private key pair has been generated, receiving a signed user location information (ULI) from the AP in response to the SeND-NS, and sending the signed ULI to one of a 3GPP mobility controller or an emergency service via a 3GPP network interface. Related systems, apparatuses, and methods are also described.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: May 12, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Srinath Gundavelli, Pradeep Kumar Kathail
  • Patent number: 10652265
    Abstract: The present invention provides a method for detecting a website attack, comprising: selecting multiple uniform resource locators (URLs) from history access records of a website; clustering the multiple uniform resource locators; and generating a whitelist from the multiple uniform resource locators according to a clustering result. In some embodiments of the present invention, a common OWASP attack at URL level can be checked.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: May 12, 2020
    Inventor: Lianqun Yang
  • Patent number: 10645108
    Abstract: Apparatus and methods are provided for tracking and validating behavior and communication patterns of sensors connected to an Internet-of-Things (“IoT”) network. Preferably, trusted IoT sensors monitor communication patterns exhibited by other trusted and/or untrusted sensors. An untrusted monitored sensor may be assigned a trusted status based on applying artificial intelligence and/or machine learning algorithm to monitored and/or historical communication patterns exhibited by the monitored sensor. A trusted group of sensors may continue to grow by adding other trusted sensors. If a compromised sensor is detected, a silo may be erected around the compromised sensor. The silo may include disconnecting the compromised sensor from the network. After erecting the silo, communication patterns exhibited by the compromised sensor may be continue to be monitored. After a pre-determined time period the compromised sensor may be reassigned a trusted status or purged from the trusted group and/or network.
    Type: Grant
    Filed: March 19, 2018
    Date of Patent: May 5, 2020
    Assignee: Bank of America Corporation
    Inventor: Manu Kurian
  • Patent number: 10645120
    Abstract: A customer of a resource provider environment can apply policies at the data object level that will live with a data object during its lifecycle, even as the object moves across trusted boundaries. A customer can classify data, causing tags and/or predicates to be applied to the corresponding data object. Each tag corresponds to a policy, with predicates relating to various actions that can be performed on the data. A chain of custody is maintained for each data object, such that any changes to the object, tags, or policies for the data can be determined, as may be required for various audit processes. The support of such policies also enables the resource provider environment to function as an intermediary, whereby a third party can receive the data along with the tags, policies, and chain of custody as long as the environment trusts the third party to receive the data object.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: May 5, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Carl Wesley Summers, Jonathan Jorge Nadal, Praveen Kumar Gattu, Syed Omair Zafar Gillani
  • Patent number: 10642986
    Abstract: Disclosed are various embodiments for detecting unknown software vulnerabilities and system compromises. During a learning period, it is determined which of a plurality of portions of a software package are invoked. At least one unused portion of the software package is determined based at least in part on the portions of the software package invoked during the learning period. Access to the unused portion(s) of the software package is then prevented.
    Type: Grant
    Filed: June 19, 2018
    Date of Patent: May 5, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventor: Nima Sharifi Mehr
  • Patent number: 10637658
    Abstract: In a computing system, methods for secure OS level login authentication for internal users to access servers. Some or all servers in a group each utilize a local ID Service for generating and validating a challenge responsive to an OS login request. The challenge is processed in a centralized secure server HSM. Rather than copying individual user public keys to each host in the data center, we need only copy the public key of the HSM to each host in the group. When a user attempts OS level login to a host, it encrypts the challenge using the public key of the HSM and forwards the request for processing in the HSM. There, it decrypts the challenge using the private key in the HSM and re-encrypts the challenge with the public key of the individual user. The user's mobile device, previously registered, is required to complete the authentication process.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: April 28, 2020
    Assignee: SALESFORCE.COM, INC.
    Inventors: Prasad Peddada, Taher Elgamal
  • Patent number: 10635791
    Abstract: A device and method for placing the device in a locked state having an associated set of permitted tasks so as to permit the device owner to share the device with others but maintain security over aspects of the device. A task change request is evaluated to determine whether the requested task is permitted and, if so, the requested task is allowed; if not, then an authorization process is invoked to prompt the user to input authorization data. Upon verification of the authorization data, the device may be unlocked and the requested change implemented. The permitted tasks may designate specific applications, specific operations or functions within applications or at the operating system level, one or more currently open windows, and other levels of granularity.
    Type: Grant
    Filed: March 29, 2013
    Date of Patent: April 28, 2020
    Assignee: BlackBerry Limited
    Inventors: Ahmed E. Hassan, John F. Wilson, Daryl Joseph Martin
  • Patent number: 10635823
    Abstract: Technologies are provided in embodiments for using compiling techniques to harden software programs from branching exploits. One example includes program instructions for execution to obtain a first encoded instruction of a software program, the first encoded instruction including a first opcode in a first field to be performed when the first encoded instruction is executed, identify a vulnerable value in a second field within the first encoded instruction, where the vulnerable value includes a second opcode, determine that the first encoded instruction can be replaced with one or more alternative encoded instructions that do not contain the vulnerable value, and replace the first encoded instruction with the one or more alternative encoded instructions.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: April 28, 2020
    Assignee: Intel Corporation
    Inventors: Daniel Fernando Gutson, Vadim Sukhomlinov, Dmitry Yurievich Babokin, Alex Nayshtut
  • Patent number: 10630723
    Abstract: Techniques are described for adjusting policy characteristics based on a determined similarity between routes. A similarity metric may be determined indicating the similarity between a first route followed by a vehicle and/or driver and a second (e.g., previous) route followed by the vehicle and/or driver. A similarity metric may indicate the similarity in movements, and changes in movement, exhibited by the vehicle on the routes. The similarity metric may be determined through analysis of real time data collected by in-vehicle sensor(s), mobile user device(s), external sensors or other data sources. Based on the similarity metric, a premium, a deductible, a price, or other characteristic(s) of a policy may be determined. In some examples, policy characteristics may be adjusted (e.g., in real time) based on the analysis according to changing risk conditions if a driver is following routes that are dissimilar from typical routes.
    Type: Grant
    Filed: December 2, 2016
    Date of Patent: April 21, 2020
    Assignee: United Services Automobile Association (USAA)
    Inventors: Bharat Prasad, Vijay Jayapalan, Michael Kyne, Joel T. Camarano, Charles Lee Oakes, III, Gunjan Vijayvergia, Christine Marie Brown
  • Patent number: 10623955
    Abstract: A method and apparatus for providing fallback data services over a Wi-Fi network is described. A request to enable access to new data sessions for wireless terminals in a zone covered by a Wi-Fi network node is received upon failure of 3GPP radio in that zone. When a request for a new data session from a WT is received, the MAC address of the WT is added to a list of authorized users. The MAC address of the WT is sent to Wi-Fi network nodes of adjacent zones such that the WT can have continuous service as it moves between zones. When a Wi-Fi network node currently serving the WT receives an indication that the WT data session is terminated, a message is sent from the Wi-Fi network node currently serving the WT, to nodes of adjacent zones to remove the MAC address of the WT from the list of authorized users.
    Type: Grant
    Filed: October 30, 2014
    Date of Patent: April 14, 2020
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Luay Zalzalah, Najeh Abu-Farha
  • Patent number: 10623959
    Abstract: A method implemented on an augmented reality (AR) electronic device includes initiating a security access code software application on the AR electronic device. A user of the AR electronic device is identified. A first electronic computing device at or near a current location of the user is identified. The first electronic computing device is an input device for entry of a security code to permit access to a protected asset. A determination is made as to whether the user is authorized to access the protected asset. When a determination is made that the user is authorized to access the protected asset, a security access code is displayed on the AR electronic device. The security access code permits the user to access the protected asset via the first electronic computing device.
    Type: Grant
    Filed: December 18, 2018
    Date of Patent: April 14, 2020
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Brian Michael Young, Kourtney Eidam
  • Patent number: 10623375
    Abstract: This disclosure describes an automated process of discovering characteristics needed to integrate a web-based application to a web portal, such as a reverse proxy. This process eliminates the need for application owners and security analysts to manually discover the information needed for the on-boarding process. To this end, application-specific information is determined by monitoring network traffic flows in and out of the application, user authentication and authorization event data, and the like. An application discovery engine analyzes the discovered data, preferably against a set of patterns and heuristic-based rules, to discover or identify the one or more application characteristics. A set of configuration data is then generated, and this configuration data is then used to integrate the application into the web reverse proxy and, in particular, by specifying the configuration needed to “board” the application.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Richard Jay Cohen, Anne Louise Bolgert, Randolph Michael Forlenza, Miguel Sang, Krishna Kishore Yellepeddy
  • Patent number: 10623443
    Abstract: A policy management method and system, which determines at least one functional model for the IT system; loads at least one pre-configured policy selection template that indicates at least one policy aspect applicable to the at least one IT system; generates at least one policy user interface that gathers a policy input; receives a policy input loaded from a data storage or a memory or entered by a user via a user interface; loads at least one pre-configured policy generation template that indicates at least one technical rule or configuration aspect of the policy that the policy template pertains to; generates at least one machine-enforceable rule/configuration compliant with the received input policy; transmits the at least one machine-enforceable rule and/or configuration to at least one policy implementation entity; and executes the transmitted at least one machine-enforceable rule/configuration.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: April 14, 2020
    Inventors: Ulrich Lang, Rudolf Schreiner
  • Patent number: 10614236
    Abstract: Embodiments for performing self-contained, consistent data masking in a distributed computing environment by a processor. A data masking operation is performed on one or more datasets in one of a plurality of data formats such that a key of each value of each key-value pair representing a common set of columns or paths for the one or more datasets is masked.
    Type: Grant
    Filed: March 1, 2017
    Date of Patent: April 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon Antonatos, Stefano Braghin, Ioannis Gkoufas, Pol Mac Aonghusa
  • Patent number: 10614223
    Abstract: In one example in accordance with tie present disclosure, a method for security vulnerability detection includes indexing a variety of internet sources comprising third party submitted information, to extract security vulnerabilities based on the third party submitted information. The method includes generating a security vulnerabilities list comprising security vulnerabilities from the internet source and generating a software components list comprising a software component used in an application. The method includes determining that a security vulnerability in the security vulnerabilities list affects the software component and determining a risk score of the security vulnerability. The method includes presenting the security vulnerability, the risk score and the software component via a user interface.
    Type: Grant
    Filed: May 28, 2015
    Date of Patent: April 7, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Ori Abramovsky, Ori Weingart, Maor Yosef
  • Patent number: 10614226
    Abstract: A method, system and computer-usable medium for generating a security analysis effort, cost and process scope estimates, comprising: analyzing a software system; identifying a complexity level of a security analysis, the complexity level of the security analysis comprising identification of an effort level for the security analysis; and, generating the security analysis effort estimate, the security analysis effort estimate comprising an estimate of an effort expenditure to perform a security analysis on the software system at the identified complexity level.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rhonda L. Childress, Sharon Hagi, Jeffrey C. Turnham
  • Patent number: 10616269
    Abstract: A variety of techniques are disclosed for detection of advanced persistent threats and similar malware. In one aspect, the detection of certain network traffic at a gateway is used to trigger a query of an originating endpoint, which can use internal logs to identify a local process that is sourcing the network traffic. In another aspect, an endpoint is configured to periodically generate and transmit a secure heartbeat, so that an interruption of the heartbeat can be used to signal the possible presence of malware. In another aspect, other information such as local and global reputation information is used to provide context for more accurate malware detection.
    Type: Grant
    Filed: September 20, 2018
    Date of Patent: April 7, 2020
    Assignee: Sophos Limited
    Inventor: Andrew J. Thomas
  • Patent number: 10609023
    Abstract: The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services.
    Type: Grant
    Filed: August 27, 2015
    Date of Patent: March 31, 2020
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Soenghun Kim, Joohyun Park, Heejeong Lee, Youmin Lee
  • Patent number: 10606990
    Abstract: In various example embodiments, a method for controlling computing asset access using machine learning is presented. In an example embodiment, access data for each user of a plurality of users are accessed, wherein the access data for a user indicate an access history by that user to one or more available assets. Using a machine learning algorithm, the access data of each user are analyzed to generate a characteristic associated with the access data of each user. An indication of a current access attempt of one of the assets is received using an identity of a first user. A characteristic associated with the current access attempt is compared to the characteristic associated with the access data of the first user. Based on the comparison, an authentication process is selected for presentation to the first user for the current access attempt.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: March 31, 2020
    Assignee: eBay Inc.
    Inventors: Vikram Tuli, Daniel Morales
  • Patent number: 10601832
    Abstract: A system for re-registering an input-limited device, such as a voice-enabled device, with a captive portal access point that requires completion of a portal webpage prior to allowing client devices access to a network, such as the Internet, is described. Such captive portal access points are commonly found in hotels, and may be used for both freely provided public WiFi and for connections that require providing payment. For re-registration of the input-limited device with the captive portal access point, a server may send a notification to a mobile computing device associated with the input-limited device.
    Type: Grant
    Filed: March 30, 2016
    Date of Patent: March 24, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Ambika Pajjuri, Soniya Jobanputra, David Pathakjee, Thomas Daniel Mueller, Ezekiel Wade Sanborn de Asis