Patents Examined by Mahfuzur Rahman
  • Patent number: 10992737
    Abstract: Systems, methods, and non-transitory computer-readable media can receive at least one request for performing one or more operations, the request originating from a media application running on a media device, the request being broadcasted by the media device over a network to which the computing device is also connected. Information describing the request can be provided through a software application running on the computing device. A determination is made when user operating the computing device has approved the request. The operations are performed by at least the software application running on the computing device.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: April 27, 2021
    Assignee: Facebook, Inc.
    Inventors: Christopher Chun-Ning Pan, Francislav P. Penov
  • Patent number: 10984090
    Abstract: A client transmits a user identifier and a password to a server via an application programming interface (API). The client establishes an authenticated session with the server in which the client has a first set of permissions for operations associated with the API. The client receives, responsive to a verification of the user identifier and password by the server, a logon response and a shared secret. The client generates a one time passcode (OTP) based upon the shared secret. The client sends the OTP to the server via the API. Responsive to the server validating the OTP against the shared secret, the server grants a second set of permissions for operations associated with the API.
    Type: Grant
    Filed: January 14, 2020
    Date of Patent: April 20, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Larry A. Brocious, Michael J. Howland, Paul E. Rogers
  • Patent number: 10986114
    Abstract: Log data associated with at least one user session in a network environment associated with an original user is received. A logical graph is generated using at least a portion of the received log data. One example of such a logical graph is a privilege change graph that models privilege changes between processes. Another example of such a logical graph is a user login graph that models machines with which the original user interacts. Another example of such a logical graph is a machine-server graph that clusters machines into nodes based on resources executing on the machine. The generated logical graph is used to detect an anomaly.
    Type: Grant
    Filed: July 1, 2019
    Date of Patent: April 20, 2021
    Assignee: Lacework Inc.
    Inventors: Harish Kumar Bharat Singh, Vikram Kapoor, Murat Bog, Yijou Chen
  • Patent number: 10979404
    Abstract: Methods and systems for providing fast random access and/or inspection of records within an encrypted communication session are presented. The encrypted communication session may include encrypted records that were encrypted using rotating encryption keys. A key index is generated for the encrypted communication session. The key index includes the encryption keys used during the encrypted communication session and timestamps associated with the encryption keys. To access a particular record within the encrypted communication session, a particular encryption key is selected from the encryption keys stored in the key index. The particular record is decrypted using the selected encryption key.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: April 13, 2021
    Assignee: PayPal, Inc.
    Inventors: Hubert Le Van Gong, Michael Shiwen Thang
  • Patent number: 10972507
    Abstract: Disclosed systems and methods include receiving, by a browser application, a web application data including a trusted source rule having a web application user identifier (ID) unique to a user of the web application, and upon determining by the browser application of a violation of the trusted source rule, transmitting a rule violation report, with the web application user ID, to a data processing system for analysis to determine a malicious manipulation of the browser application, and receiving at the user device, from the data processing system, an alert of malicious manipulation of the browser application, corresponding to the rule violation report.
    Type: Grant
    Filed: September 16, 2018
    Date of Patent: April 6, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Filip {hacek over (S)}ebesta
  • Patent number: 10972466
    Abstract: An information integration system may include a set of integration services embodied on one or more server machines in a computing environment. The set of integration services may include connectors communicatively connected to disparate information systems. The connectors may be configured for integrating data stored in the disparate information systems utilizing a common model employed by the set of integration services. The common model may overlay, augment, integrate, or otherwise utilize a content management interoperability services data model and may include common property definitions and a common security model. The common security model may include permissions particularly defined for use by the set of integration services. These common property definitions and permissions may be uniquely defined and utilized by the information integration system.
    Type: Grant
    Filed: January 10, 2020
    Date of Patent: April 6, 2021
    Assignee: Open Text SA ULC
    Inventors: Jody Hupton Palmer, Alexander Lilko, Steve Molloy
  • Patent number: 10956598
    Abstract: A method for preventing breach of original data for deep learning is provided. The method includes steps of: a data breach preventing device (a) adding noise onto the acquired original data to generate 1-st noisy data; and (b)(b1) while increasing an integer k from 1 to an integer larger than 0, (i) inputting k-th noisy data into a learning network, to apply learning operations to the k-th noisy data using learned parameters of the learning network, and to output k-th characteristic information, and (ii) launching an adversarial attack on the k-th noisy data via backpropagation using at least one of (ii-1) (k_1)-st losses calculated using the k-th characteristic information and a 1-st ground truth, and (ii-2) (k_2)-nd losses calculated using (1) a k-th task specific output and (2) a 2-nd ground truth, and generating (k+1)-th noisy data, and (b2) as a result, generating n-th noisy data as watermarked data.
    Type: Grant
    Filed: April 24, 2020
    Date of Patent: March 23, 2021
    Assignee: DEEPING SOURCE INC.
    Inventor: Sumin Lee
  • Patent number: 10956613
    Abstract: One embodiments provides a method, including: determining, using a processor, whether content to be displayed on an information handling device comprises sensitive information; filtering, responsive to determining that the content comprises sensitive information, the sensitive information from the content; displaying, on a display of the information handling device, the content with the sensitive information filtered; and transmitting the sensitive information to a secondary device. Other aspects are described and claimed.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: March 23, 2021
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Russell Speight VanBlon, Nathan J. Peterson, Mark Patrick Delaney, John Carl Mese
  • Patent number: 10958654
    Abstract: Techniques for resource protection are described. A resource protection service can determine whether it is safe to delete a resource based on current or projected usage of the resource. The resource protection service can retrieve usage data from a usage monitoring service and compare the usage data to a threshold for resource deletion. When a request to delete a resource is received by a service the service can first check with the resource protection service. The resource protection service fetches current usage data and determines whether it is safe to delete the resource based on the threshold. The resource protection service can return an approve/deny deletion message to the service, which may then either delete the service or provide an error message to the requestor.
    Type: Grant
    Filed: June 28, 2018
    Date of Patent: March 23, 2021
    Assignee: Amazon Technologies, Inc.
    Inventor: Vivek G. Relan
  • Patent number: 10956580
    Abstract: Techniques for identifying computer program security access control violations using static program analysis are provided. In one example, a computer-implemented method comprises generating, by a device operatively coupled to a processor, a mathematical model of a computer program product, wherein the mathematical model defines data flows through nodes of the computer program product that reach a secure node corresponding to a secure resource. The computer implemented method further comprises evaluating, by the device, a security protocol of the computer program product using static program analysis of the mathematical model to determine whether any of the data flows provides access to the secure node without proceeding through one or more security nodes corresponding to the security protocol, wherein the one or more security nodes are included in the nodes of the computer program product.
    Type: Grant
    Filed: November 6, 2019
    Date of Patent: March 23, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthias Daniel Dietsch, Pietro Ferrara, Marco Pistoia, Omer Tripp
  • Patent number: 10958636
    Abstract: A device comprises: a receiver configured to receive a client certificate; a processor coupled to the receiver and configured to: authenticate the client certificate, extract, in response to the authentication, attributes from the client certificate, and create, in response to the extraction, a message comprising reformatted attributes based on the attributes, wherein the reformatted attributes can be trusted; and a transmitter coupled to the processor and configured to transmit the message. A device comprises: a processor configured to: process a client certificate comprising a certificate identifier (ID) attribute, a tenant ID attribute, and a role ID attribute, and package the client certificate in a request for a shared service; and a transmitter coupled to the processor and configured to transmit the request.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: March 23, 2021
    Assignee: Blackhawk Network, Inc.
    Inventors: Derk Norton, Tushar Vaish, Jeff Webb
  • Patent number: 10951581
    Abstract: A system includes a terminal and a gateway. The terminal is programmed to identify, in received data, a signature of rogue data that includes at least a device identifier and an application identifier, and to transmit, via uplink to a satellite, the identified signature to a gateway. The gateway is programmed to block downlink data, upon determining that downlink data includes the received signature, and to broadcast the received signature to a second gateway.
    Type: Grant
    Filed: August 17, 2018
    Date of Patent: March 16, 2021
    Assignee: Hughes Network Systems, LLC
    Inventors: Akshay Giridhar Ravichandran, Satyajit Roy
  • Patent number: 10950077
    Abstract: A secure medical device includes: a hardware storage; a lock coupled to the hardware storage; a data storage and a medical record residing within the hardware storage, the data storage storing a destination location including a first geophysical location; one or more processors; and a non-transitory computer readable medium comprising programming instructions. When the programming instructions are executed by the one or more processors, the one or more processors: (a) receive an access request from a requester to access the medical record; (b) obtain a current location of the secure medical device, the current location comprising a second geophysical location; (c) compare the first geophysical location to the second geophysical location; and (d) upon determining that the second geophysical location matches the first geophysical location, send a command to unlock the lock to allow access to the medical record residing within the hardware storage.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: March 16, 2021
    Assignee: TP Lab, Inc.
    Inventor: Chi Fai Ho
  • Patent number: 10949564
    Abstract: This application relates to a client-server architecture that enables user accounts registered with a service to be discoverable to other users of the service. A discovery protocol includes accessing personal information data stored in an address book of a client device, obfuscating the personal information data, transmitting a request to a service to determine if the obfuscated personal information data matches any potential contacts that have registered as discoverable with the service, and comparing information related to the potential contacts with the contacts included in the address book to determine if the contacts in the address book match any of the potential contacts.
    Type: Grant
    Filed: September 20, 2018
    Date of Patent: March 16, 2021
    Assignee: Apple Inc.
    Inventors: Thomas Alsina, Joseph A. Tyson, David K. Heller, James M. Costello
  • Patent number: 10943029
    Abstract: A system and method for block management of interactions comprising a network-connected block management computer connected to a plurality of connected devices and to one or more blockchains to enable an object compiler to receive a plurality of criteria from a requesting device. The compiler the receives a plurality of blocks from the blockchains based on the criteria. Each block corresponding to a preconfigured interaction object previously written by devices either during or after the completion of a transaction. The compiler analyzes the preconfigured interaction objects to determine if there is corresponding supplemental object. The compiler requests the supplemental blocks from the blockchains, and processes supplemental objects based on type, if no corresponding supplemental object it found, the associated interaction object is flagged.
    Type: Grant
    Filed: December 22, 2018
    Date of Patent: March 9, 2021
    Inventor: Gustavo Manuel Damil Marin
  • Patent number: 10944764
    Abstract: Methods and apparatus are disclosed for security event detection through virtual machine introspection. Example methods involve monitoring usage of a plurality of resources by a first virtual machine executing on a computing device by a monitoring agent, the monitoring agent executing on the computing device separate from the first virtual machine. Example methods further involve detecting a potential security event by comparing the usage of the plurality of resources to resource usage patterns. Example methods further involve assigning a severity level to the detected potential security event, and initiating a security action defined for the assigned severity level.
    Type: Grant
    Filed: February 13, 2015
    Date of Patent: March 9, 2021
    Assignee: Fisher-Rosemount Systems, Inc.
    Inventor: Robert A. Mixer
  • Patent number: 10936734
    Abstract: A computer-implemented method includes: receiving, by a server storing one or more blockchain ledgers, an authorization request from a client, in which the authorization request includes a service end identifier and a user identifier; generating, based on the authorization request, a database authorization instruction corresponding to the authorization request and a ledger identifier corresponding to the authorization request; authorizing a service end corresponding to the service end identifier as a user in a blockchain ledger corresponding to the ledger identifier; configuring a permission value of the user in the blockchain ledger, in which the permission value determines a degree to which the service end can operate the blockchain ledger; and sending authorization information including the user identifier and the ledger identifier to the service end.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: March 2, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Wenyuan Yan, Xinying Yang, Yuan Zhang, Yize Li, Benquan Yu
  • Patent number: 10931698
    Abstract: A device may receive behavior information that identifies a first user, of a first set of users, in association with a behavior. The behavior may relate to one or more requests, from a client device being used by the first user, to access a network resource. The device may determine, based on a model, whether the behavior is normal. The model may include a normal behavior pattern based on behavior information associated with the first set of users. The device may provide an instruction to allow the client device to proceed with the behavior or provide an instruction to disallow the client device from proceeding with the behavior based on determining whether the behavior is normal. The device may update the model based on the behavior information that identifies the first user and that identifies the behavior.
    Type: Grant
    Filed: August 5, 2019
    Date of Patent: February 23, 2021
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Ashok N. Srivastava, Santanu Das, Hai Shao
  • Patent number: 10931438
    Abstract: An example operation may include one or more of retrieving a first disclosure for a first component, the disclosure including one or more first substances of note (SN) and corresponding first SN values from a blockchain, and determining a second disclosure for a second component comparable to the first component, the disclosure disclosing one or more second SN and corresponding second SN values. An example operation may further include one or more of generating a representative article including a common group of SN and representative SN common group values for each SN of the common group, a first remaining SN group of first SNs not included in the common group of SN and corresponding representative first SN values, and a second remaining SN group of second SNs not included in the common group of SN and corresponding representative second SN value, where the representative article represents the use of either the first component or the second comparable component.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: February 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Lisa M. Dender, Matthew Chalkley, Robert T. Sanders
  • Patent number: 10924471
    Abstract: A method for enabling access by a first network subscriber to a second network subscriber in a network includes receiving a communication request from the first network subscriber and determining whether the second network subscriber has carried out an authentication of the first network subscriber during a first phase. The second network subscriber allows communication with the first network subscriber when the second network subscriber has carried out authentication of the first network subscriber during the first phase. The second network subscriber receives an access request from the first network subscriber and determines a level of trustworthiness of the first network subscriber. The second network subscriber enables access of the first network subscriber based on the determination of the level of trustworthiness of the first network subscriber.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: February 16, 2021
    Assignee: Robert Bosch GmbH
    Inventors: Cyntia Vargas Martinez, Julien Rausch, Michael Langfinger