Patents Examined by Maung Lwin
-
Patent number: 9985976Abstract: A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.Type: GrantFiled: February 1, 2016Date of Patent: May 29, 2018Assignee: F5 Networks, Inc.Inventors: Dmitry Rovniaguin, Ephraim Dan, Ron Talmor
-
Patent number: 9912685Abstract: Computer systems and methods in various embodiments are configured to test the security of a server computer by simulating a wide range of attacks from one or more bot-nets. In an embodiment, a computer system includes a memory; a processor coupled to the memory; a plurality of network cards coupled to the processor and the memory, the computer system being located in a home geographic region; wherein each of the plurality of network cards is configured to send one or more requests to a remote server computer through one of a plurality of geographic regions, that is different than the home geographic region; wherein, for each of the plurality of network cards, the processor is configured to store in the memory one of a plurality of geo-mappings, wherein the geo-mapping indicates the certain geographic region the network card is configured to send the one or more requests to the remote server computer through.Type: GrantFiled: October 30, 2015Date of Patent: March 6, 2018Assignee: Synack, Inc.Inventors: Jay Kaplan, Mark Kuhr, Vlad Cretu
-
Patent number: 9910970Abstract: The invention provides a method, a hardware circuit and a hardware device for enabling a software application to be executed on a hardware device in dependence of the hardware circuit, while preventing the execution of a binary copy of the application in another hardware device. Challenge data originating from the software application is input to a hardware circuit of the hardware device, wherein the hardware circuit is configured to perform a deterministic function. Response data is generated by the hardware device, which is used to manipulate at least a part of the software application to thereby enable the software application to be executed.Type: GrantFiled: March 19, 2012Date of Patent: March 6, 2018Assignee: IRDETO B.V.Inventor: Jeroen Mathias Doumen
-
Patent number: 9906532Abstract: A method and system for initiating message listening and routing message content to authorized user devices is disclosed. For a second user device to receive notifications regarding records of a first user, the second user device provides information identifying the first user to a notification service. The notification service verifies the identifying information. The notification service initiates one or more listeners to listen for messages flowing over a messaging bus that are relating to the first user. Once a message is identified, at least a portion of the message is used to generate a notification that may be sent to the second user device.Type: GrantFiled: November 30, 2015Date of Patent: February 27, 2018Assignee: HCA Holdings, Inc.Inventors: Gabriel O. Perez, Michael A. Houston
-
Patent number: 9904774Abstract: A method for locking a file includes: acquiring biological feature recognition information of a user, the biological feature recognition information including at least one of fingerprint information, voiceprint information, iris information, or face information; and locking a designated file using the biological feature recognition information.Type: GrantFiled: March 24, 2015Date of Patent: February 27, 2018Assignee: Xiaomi Inc.Inventors: Mingyong Tang, Yijun Liuhua, Zhinong Zhou
-
Patent number: 9892259Abstract: A security protection system is provided. The system includes: a vulnerability identification device, to collect patch file information, identify a vulnerability of a to-be-fixed object corresponding to the patch file information and generate vulnerability protection information according to the vulnerability; and a vulnerability protection device, to protect the vulnerability of the to-be-fixed object corresponding to the patch file information according to the vulnerability protection information. A security protection method is provided in the present disclosure. The present disclosure may provide effective protection to the computer actively and timely and protect the vulnerability of the computer from illegal utilization.Type: GrantFiled: March 23, 2015Date of Patent: February 13, 2018Assignee: Tencent Technology (Shenzhen) Company LimitedInventor: Lei Tong
-
Patent number: 9886568Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor, a network interface communicatively coupled to the processor, a management controller communicatively coupled to the processor and configured to provide management of the information handling system via a communications channel physically isolated from the network interface, and a controller. The controller may be configured to filter for a packet indicative of a request to remotely reset the management controller and, in response to receiving the packet indicative of the request to remotely reset the management controller, perform a reset of the management controller.Type: GrantFiled: March 13, 2015Date of Patent: February 6, 2018Assignee: Dell Products L.P.Inventors: Wade Andrew Butcher, Elie Antoun Jreij, Timothy M. Lambert, Hendrich M. Hernandez
-
Patent number: 9866559Abstract: A method for opening a session of a first machine using a session checking service for the first machine and a second machine, including a security service, includes receiving a request to open a session on the first machine, the request including a user identification information item; verifying that the identification information item is associated with an identification data item of the second machine in a repository; checking that the user has the right to open the session on the first machine; if the verification and check are positive, sending a session status modification request of the second machine to the security service of the second machine; if the session status of the second machine is modified, sending a request to authorize opening of the session to the first machine; and storing the identification information item associated with an identifying data item of the first machine in the repository.Type: GrantFiled: April 29, 2011Date of Patent: January 9, 2018Assignee: EVIDANInventor: Gérard Dedieu
-
Patent number: 9866387Abstract: A method for accessing a device by a user connected to the device and to at least two servers in different networks includes collaboratively generating parts of an authentication ticket on the at least two servers, collaboratively generating parts of a user session key and encrypting a combined user session key, authenticating with the authentication ticket at a distributed ticket granting server by collaboratively decrypting user request information using the combined user session key and comparing its content with the authentication ticket, collaboratively generating an encrypted user-to-device ticket and an encrypted user-to-device session key, and accessing the device by the user using the encrypted user-to-device ticket and the user-to-device session key.Type: GrantFiled: April 12, 2013Date of Patent: January 9, 2018Assignee: NEC CorporationInventors: Jens-Matthias Bohli, Wenting Li, Jan Seedorf
-
Patent number: 9865222Abstract: System and method for displaying digital content on a display device, including a display screen, a structural assembly, secured to the rear face of the display screen, and a processing controller within the structural assembly, including a memory, display processor, and power distribution and adaptation module. An external power assembly configured to connect to an external power supply, a connector cord configured to connect the power assembly and the power distribution and adaptation module, and a case for the display device, configured to couple to the display screen to provide structural rigidity during shipping, are also presented. An application is provided, configured to run on a computer with memory, processor, and user input device, and configured to communicate via the internet with the processing controller of the display device and a service cloud including a server, memory, and processor, to control the display of digital content on the display screen.Type: GrantFiled: March 14, 2014Date of Patent: January 9, 2018Assignee: Videri Inc.Inventors: Marc Trachtenberg, Francois Gariepy
-
Patent number: 9852313Abstract: A functional node for an information transmission network and corresponding network are disclosed. In one aspect, the functional node includes at least one module for distributing messages between input and output ports. The distribution module includes at least one combination of at least three ports, including a first input port connected to a second output port by a first capability for unconditionally propagating messages, not depending on the messages. The first and/or second ports are connected to a third port by a second capability for conditionally propagating messages, depending on the messages.Type: GrantFiled: March 20, 2015Date of Patent: December 26, 2017Assignees: Thales, Systemes Embarques AerospatiauxInventors: Augustin Mignot, Alexis Dubrovin, Patrice Toillon, Paul Ortais
-
Patent number: 9843926Abstract: A system for preventing an attack on a networked vehicle via a wireless communication device including a wireless data traffic network, a security status determination unit for controlling access to the wireless network depending on a security status based on evaluation of a configuration and/or on log data of the vehicle and/or on time that has passed since a software update, and a communication device and an access control device. A method for preventing an attack on a networked vehicle via a wireless communication device, where a security status is determined based on an evaluation of a current configuration of the vehicle and/or on log data of the vehicle and/or on time that has passed since an update of relevant software a network access rule set is determined and actuated for the access to the data traffic network based on the determined security status.Type: GrantFiled: February 17, 2011Date of Patent: December 12, 2017Assignee: Continental Automotive GmbHInventors: Roland Dietz, Rainer Falk, Hans-Joachim Hof, Franz Stadler
-
Patent number: 9836599Abstract: An unstructured event is detected and an unstructured event record is generated for the detected event. Case identifier (ID) conflation is performed to estimate a case ID that corresponds to the detected event, and event type identification is performed to estimate a type of the unstructured event. A business process model is applied to the unstructured event record, to identify a process that the unstructured event is related to. A user experience is generated based upon the event type, the case ID, and the corresponding process identified for the detected event.Type: GrantFiled: March 13, 2015Date of Patent: December 5, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Graham Andrew Michael Sheldon, Sedat Gokalp
-
Patent number: 9838203Abstract: Embodiments are directed to a computer-implemented method, computer system, and computer program product for creating a public key token. A public key and private key are generated, using a master key. A set of permissions is received for the public key and private key that note the allowable uses for the public key and private key. Thereafter, the set of permissions, encrypted public key, and other associated information is placed in a public key token.Type: GrantFiled: September 28, 2016Date of Patent: December 5, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Richard V. Kisley, Michael J. Miele
-
Patent number: 9817990Abstract: Provided are a system and method of encrypting a folder in a device. The device for controlling access to the folder includes a communication part configured to transmit, to a server, an encryption key generation request with respect to the folder, and receive, from the server, an encryption key associated with the folder that is generated in response to the encryption key generation request, wherein the encryption key generation request includes an identification of the folder and authentication data of a user who accesses the folder is an authorized user; and a controller configured to authenticate the user by using the encryption key.Type: GrantFiled: March 12, 2015Date of Patent: November 14, 2017Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventor: Jung-kyuen Lee
-
Patent number: 9817962Abstract: A transaction module can be incorporated in a terminal for authorizing a transaction between a first application resident in the terminal and a second application resident in an electronic device. The module may include code-obtaining means for obtaining a code; an interface with a communications means of the terminal enabling a validation request including the code to be sent to a secure server; means for generating an audio signal from the code; an interface with a module of the terminal suitable for sending the audio signal to a loudspeaker of the terminal in order to play it back; and means for authorizing the transaction on receiving a validation message from the secure server. The validation message may be representative of the secure server receiving the code from the electronic device.Type: GrantFiled: April 25, 2012Date of Patent: November 14, 2017Assignee: TAGATTITUDEInventor: Yves Eonnet
-
Patent number: 9819689Abstract: Identify a set or session of processes as having certain characteristics. A method obtains a known set or session of processes, wherein the known set or session of processes has the certain characteristics. A set or session of processes to be evaluated is obtained. A weighted similarity measure is performed between the known set or session of processes and the set or session of processes to be evaluated. The weighted similarity measure is performed element wise, where a comparison is performed for each defined element in the set or session of processes to be evaluated against elements in the known set or session of processes.Type: GrantFiled: March 13, 2015Date of Patent: November 14, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Himanshu Chandola, Jack Wilson Stokes, III, Gil Lapid Shafriri, Craig Henry Wittenberg, Timothy W. Burrell, Christian Seifert
-
Patent number: 9811649Abstract: A system and method for capturing an image of a user. An image is captured with a camera, wherein the image includes a user's image. A first avatar is displayed in a display, wherein displaying includes positioning an avatar in at least some of the user's image. The user is then encouraged to move so the first avatar moves to a second position in the display.Type: GrantFiled: March 12, 2015Date of Patent: November 7, 2017Assignee: Intel CorporationInventors: Scott Pfursich, David L. Graumann, Ranjit S Narjala, Rahuldeva Ghosh
-
Patent number: 9811806Abstract: Systems, methods, and computer program products to perform an operation including receiving an indication to commit a containerized image to an image repository, wherein the containerized image comprises a plurality of layers, and upon validating the containerized image by determining whether each layer of the containerized image is associated with a respective signature value, generating a first signature value for the containerized image, updating a data store for signature values to reflect the first signature value for the containerized image, and committing the containerized image to the repository.Type: GrantFiled: September 15, 2016Date of Patent: November 7, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Da Hu Kuang, Xin Peng Liu, Zhao Liu, Shu Chao Wan
-
Patent number: 9813428Abstract: A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download application function, provide a request for a first verification to a secure element where the first verification is associated with access to content and/or an application that is accessible via the secure download application function, receive the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor, receive the non-secret information from the secure element, and generate a second verification for the access based on the non-secret information, where the content and/or application is accessible from the secure download application function responsive to the first and second verifications. Other embodiments are disclosed.Type: GrantFiled: December 8, 2015Date of Patent: November 7, 2017Assignee: AT&T Intellectual Property I, L.P.Inventors: Walter Cooper Chastain, Stephen Emille Chin