Patents Examined by Maung Lwin
  • Patent number: 9071600
    Abstract: Phishing and online fraud prevention in one aspect includes a user computer implementing operations such as establishing a VPN tunnel between the user computer and a network operations center, activating a website launcher, reading user credentials from a smartcard, launching a browser in a sandboxed execution environment, and requesting a whitelisted webpage from the network operations center, via the VPN tunnel. The network operations center comprises one or more servers implementing operations such as determining if a user requested webpage is listed for access by the user, and loading and sending the requested webpage to the user, via the VPN tunnel, if the requested webpage is listed for access by the user. The user computer supplies the user credentials to the website and presents a webpage, a homepage, or a one-time password entry page for the website.
    Type: Grant
    Filed: December 6, 2012
    Date of Patent: June 30, 2015
    Inventors: Abdullah Ali Ahmad Alagha, Khaled Alghathbar, Mohammed Nasser Ibrahim Alkhalaf, Abdulaziz Walied Abdulgader Taher
  • Patent number: 9065804
    Abstract: Computer systems and methods are provided in which an agent executive, when initially executed in a virtual machine, obtains an agent API key from a user. This key is communicated to a grid computer system. An agent identity token, generated by a cryptographic token generation protocol when the key is valid, is received from the grid and stored in a secure data store associated with the agent executive. Information that evaluates the integrity of the agent executive is collected using agent self-verification factors. The information, encrypted and signed with a cryptographic signature, is communicated to the grid. Commands are sent from the grid to the agent executive to check the security, compliance, and integrity of the virtual machine processes and data structures. Based on these check results, additional commands are sent by the grid to the agent executive to correct security, compliance or integrity problems and/or to prevent security compromises.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: June 23, 2015
    Assignee: CloudPassage, Inc.
    Inventors: Carson Sweet, Vitaliy Geraymovych
  • Patent number: 9003484
    Abstract: A method and system for enforcing compliance with a policy on a client computer in communication with a network is disclosed. The method involves receiving a data transmission from the client computer on the network. The data transmission includes status information associated with the client computer. The data transmission is permitted to continue when the status information meets a criterion.
    Type: Grant
    Filed: May 22, 2014
    Date of Patent: April 7, 2015
    Assignee: Fortinet, Inc.
    Inventors: Robert Alvin May, Wei Wang, Tao Huang
  • Patent number: 8996865
    Abstract: A computer system includes memory storing an operating system. An agent executive runs within the operating system. The agent executive receives an agent identity token from a grid computer system. The agent identity token includes a unique cryptographic key assigned to the agent executive. The agent executive collects information about the computer system for an evaluation of integrity of the agent executive, according to a plurality of agent self-verification factors. The agent executive encrypts the collected information using the cryptographic key and transmits the encrypted information to the grid computer system. The agent executive retrieves an encrypted set of commands from the grid computer system, which are selected by the grid computer system in response to the transmitted information. The agent executive decrypts the encrypted set of commands and executes, at the computer system, each command in the set of commands.
    Type: Grant
    Filed: October 9, 2014
    Date of Patent: March 31, 2015
    Assignee: CloudPassage, Inc.
    Inventors: Carson Sweet, Vitaliy Geraymovych
  • Patent number: 8996690
    Abstract: Techniques are disclosed for performing a time-based analysis on data streams in a computing network. For example, a method includes the following steps. Two or more data streams are accessed. The two or more data streams can be associated with two or more source devices, two or more application programs, or combinations thereof. A time-based analysis is performed on the two or more data streams. The time-based analysis determines whether or not a correlation exists between portions of the two or more data streams.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: March 31, 2015
    Assignee: EMC Corporation
    Inventors: Wayne Pauley, Mich Fisher, Stephen Todd
  • Patent number: 8997176
    Abstract: Some embodiments include a method of generating an event-based device ID based on an operating environment of a computing device. The method includes binding an event-based identifier and an events profile ID to a policy-related record that is associated with an externally controlled policy. The binding ensures that the policy is applied to the operating environment identified by the event-based identifier. The method includes generating the device ID based on event logs of the computing device.
    Type: Grant
    Filed: June 12, 2014
    Date of Patent: March 31, 2015
    Assignee: Flexera Software LLC
    Inventors: Jean Marie Znidarsic, David Znidarsic
  • Patent number: 8997226
    Abstract: A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party, the data including data that characterizes (a) the client computing devices and (b) user interaction with the client computing devices; classifying the client computing devices as controlled by actual users or instead by automated software based on analysis of the received data from the client computing devices; and providing to the third party one or more reports that characterize an overall level of automated software activity among client computing devices that have been served code by the third party.
    Type: Grant
    Filed: April 17, 2014
    Date of Patent: March 31, 2015
    Assignee: Shape Security, Inc.
    Inventors: Justin D. Call, Xinran Wang, Yao Zhao, Timothy Dylan Peacock
  • Patent number: 8977704
    Abstract: Various methods are described for selecting an access method for flexible caching in DASH. One example method may include causing a request for at least one of a primary representation for a segment or an alternative representation for the segment to be transmitted to a caching proxy. The method may further include causing the caching proxy to respond with at least one of the primary representation or the alternate representation based on the caching status at a caching proxy. The caching proxy may be configured to determine whether the request enables an alternative representation to be included in a response. Furthermore, the method may include receiving at least one of the primary representation and the alternative representation for the segment from the caching proxy. Similar and related example methods, apparatuses, and computer program products are also provided.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: March 10, 2015
    Assignee: Nokia Corporation
    Inventors: Chenghao Liu, Miska Hannuksela
  • Patent number: 8977746
    Abstract: A network security device may gather a large amount of metadata pertaining to the connections being managed thereby. A refinement module may filter and/or aggregate the connection metadata. The metadata may be refined on the network security device. The refined metadata may be provided for display on a terminal. The refined metadata may include a subset of the larger connection metadata, which may reduce the overhead required to display and/or transmit monitoring information to the terminal device. The refined metadata may comprise connection groups, which may be formed based on aggregation criteria, such as connection source, destination, application, security policy, protocol, port, and/or the like. The connection groups may be ranked in accordance with ranking criteria.
    Type: Grant
    Filed: April 26, 2013
    Date of Patent: March 10, 2015
    Assignee: Watchguard Technologies, Inc.
    Inventors: Mark D. Hughes, Eivind Naess
  • Patent number: 8972487
    Abstract: Various embodiments of systems and methods for automated test framework for testing enterprise services consumer technologies are described. According to one aspect, an enterprise service client is generated based on the WSDL document of an enterprise service. The generation of the client includes generation of source code files and other client artifacts. The client artifacts are compiled and the client is configured to connect to the server system hosting the enterprise service. Real test data is loaded into a non-persistent memory and executed against the server system of the enterprise system. If no exception occurs, the test call is assumed successful. If the test calls to this enterprise service are successful, the service is marked as compatible with the different clients that performed the test calls.
    Type: Grant
    Filed: August 3, 2011
    Date of Patent: March 3, 2015
    Assignee: SAP SE
    Inventors: Mariela Todorova, Chavdar Baikov, Dimitar Angelov
  • Patent number: 8949330
    Abstract: A system for automated recommendations for social media activities includes a page data extraction module for extracting pre-defined page data parameters in relation to pre-defined reference parameters; a reference module for providing reference parameters in relation to each of the pre-defined page data; a comparing and correlation module for comparing and correlating each of the extracted page data parameters with each of the corresponding reference parameters to obtain a corresponding comparative and correlative score for each of the parameters; and a recommendation module for recommending action points based on each of the comparative and correlative scores for each of the parameters.
    Type: Grant
    Filed: October 25, 2011
    Date of Patent: February 3, 2015
    Inventor: Venkata Ramana Chennamadhavuni
  • Patent number: 8949980
    Abstract: In a network comprising number of web sites and at least one simulator web page calls are simulated or monitored and the response to the calls, including content, re-directed calls and cookies are examined in order to identify whether the content of cookies has been written or modified illegally. Illegal modification of content of cookies is referred to as writing of data by a Buyer in cookies of a User that was directed to the Buyer by a Data Publisher, without the consent of the Data Publisher. In some embodiments when illegal cookies are identified an alert may be issued to a user.
    Type: Grant
    Filed: January 24, 2011
    Date of Patent: February 3, 2015
    Assignee: Exelate
    Inventors: Meir Zohar, Nitzan Ben-Zvi
  • Patent number: 8949448
    Abstract: In accordance with the present invention is provided a system and method for improving a timestamp precision in a precision timestamp protocol (PTP) device. The present invention provides for dynamic adjustment of otherwise uncertainty of the latency of a connection between two devices connected together through a gearbox and/or a block sync circuit. The dynamic adjustment is accomplished by identifying the alignment of data within the gearbox and block sync and adjusting the timestamp assigned to the data based upon the identified alignment to remove the jitter associated with the gearbox and the block sync, thereby improving the timestamp precision in the PTP device. In a particular embodiment, the invention is employed in a serial-deserializer (SERDES) device.
    Type: Grant
    Filed: January 27, 2011
    Date of Patent: February 3, 2015
    Assignee: Integrated Device Technology, Inc.
    Inventor: Jakob Saxtorph
  • Patent number: 8931038
    Abstract: According to one system of the invention, the system provides a cloud-computing service from a cloud-computing environment having a plurality of cloud-computing resources. The system may include a management module configured to manage a cloud-computing resource of the plurality of cloud-computing resources as a cloud-computing service, wherein the cloud-computing service performs a computer workload, an adapter configured to connect to the cloud-computing resource to the system and translate a management instruction received from the management module into a proprietary cloud application program interface call for the cloud-computing resource, a cloud service bus configured to route the management instruction from the management module to the adapter, a consumption module configured to allow a user to subscribe the cloud-computing service, a planning module configured to plan the cloud-computing service, and a build module configured to build the cloud-computing service from the cloud-computing resource.
    Type: Grant
    Filed: January 19, 2011
    Date of Patent: January 6, 2015
    Assignee: ServiceMesh, Inc.
    Inventors: Eric Pulier, Frank Martinez, Duncan Christopher Hill
  • Patent number: 8914472
    Abstract: Some disclosed examples relate to facilitating an experience-sharing session in real-time between a first head-mountable display (HMD) and a second HMD. The experience-sharing session can include a demonstration phase and an observation phase. During the demonstration phase, a server system can receive first media content from the first HMD and send the first media content in real-time to the second HMD. The first media content can include a point-of-view video recorded at the first HMD. During the observation phase, the server system can receive second media content from the second HMD and send the second media content in real-time to the first HMD. The second media content can include a point-of-view video recorded at the second HMD.
    Type: Grant
    Filed: April 4, 2012
    Date of Patent: December 16, 2014
    Assignee: Google Inc.
    Inventors: Steven John Lee, Indika Charles Mendis, Max Benjamin Braun
  • Patent number: 8910266
    Abstract: Token detection at a single computing platform may be linked with a user identification to unlock content and/or effectuate modifications in virtual space instances presented via multiple computing platforms, in accordance with one or more implementations. Exemplary implementations may enhance consistency in a user's experiences of a virtual space across multiple computing platforms.
    Type: Grant
    Filed: January 28, 2013
    Date of Patent: December 9, 2014
    Assignee: Disney Enterprises, Inc.
    Inventors: John G. Vignocchi, Troy Leavitt, Jeffrey Bunker, Christopher Shen, Robert Nelson, Robert Lowe, John Blackburn
  • Patent number: 8910264
    Abstract: Methods, systems, computer-readable media, and apparatuses for providing mobile device management functionalities are presented. In various embodiments, a mobile device management agent may monitor state information associated with a mobile computing device. The monitored state information may be analyzed on the mobile computing device and/or by one or more policy management servers. In some instances, the one or more policy management servers may provide management information to the mobile computing device, and the management information may include one or more commands (which may, e.g., cause the mobile computing device to enforce one or more policies) and/or one or more policy updates. Subsequently, one or more policies may be enforced on the mobile computing device based on the monitored state information and/or based on the management information.
    Type: Grant
    Filed: September 20, 2013
    Date of Patent: December 9, 2014
    Assignee: Citrix Systems, Inc.
    Inventor: Waheed Qureshi
  • Patent number: 8904167
    Abstract: In order to mitigate the security risk posed by the insertion of a relay node within a communication network, both device authentication and subscriber authentication are performed on the relay node. Device and subscriber authentication may be bound together so that a relay node is granted access to operate within the network only if both device and subscriber authentication are successful. Additionally, a communication network (or authentication node) may further verify that a subscriber identifier (received as part of subscriber authentication) is associated with the corresponding device type (identified by the device identifier in the corresponding device authentication) as part of the subscriber authentication process.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: December 2, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Adrian Edward Escott, Anand Palanigounder, Fatih Ulupinar, Brian M. Rosenberg
  • Patent number: 8887262
    Abstract: A Quick Recognition (QR) code scanner is activated on a computing device. A user specific QR code is scanned using the QR code scanner. User specific data that is encoded in the QR code is extracted from the scanned QR code. The computing device is configured to access a local area network based on the user specific data extracted from the scanned QR code. The computing device is register, over the local area network, with a server using the user specific data extracted from the scanned QR code. User specific configuration information is received at the computing device from the server. The computing device is configured using the received configuration information.
    Type: Grant
    Filed: December 9, 2013
    Date of Patent: November 11, 2014
    Assignee: Amplify Education, Inc.
    Inventors: Steven Turner, Sean P. Farrell
  • Patent number: 8887228
    Abstract: According to one system of the invention, the system provides a cloud-computing service from a cloud-computing environment having a plurality of cloud-computing resources. The system may include a management module configured to manage a cloud-computing resource of the plurality of cloud-computing resources as a cloud-computing service, wherein the cloud-computing service performs a computer workload, an adapter configured to connect to the cloud-computing resource to the system and translate a management instruction received from the management module into a proprietary cloud application program interface call for the cloud-computing resource, a cloud service bus configured to route the management instruction from the management module to the adapter, a consumption module configured to allow a user to subscribe the cloud-computing service, a planning module configured to plan the cloud-computing service, and a build module configured to build the cloud-computing service from the cloud-computing resource.
    Type: Grant
    Filed: January 19, 2011
    Date of Patent: November 11, 2014
    Assignee: ServiceMesh, Inc.
    Inventors: Eric Pulier, Frank Martinez, Duncan Christopher Hill