Patents Examined by Michael D Anderson
  • Patent number: 9742748
    Abstract: Described herein are methods, systems, and software for encrypting and erasing data objects in a content node. In one example, a method of operating a content node that caches content divided into one or more data objects includes encrypting the one or more data objects using separate encryption keys for each of the one or more data objects, the separate encryption keys comprising a common portion shared by the one or more data objects and an individualized portion unique to each data object. The method further provides receiving a purge request to erase at least one data object and, responsive to the purge request, erasing at least one of the common portion or the individualized portion for the at least one data object based on the purge request.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: August 22, 2017
    Assignee: Fastly, Inc.
    Inventors: Tyler B. McMullen, Artur Bergman
  • Patent number: 9742772
    Abstract: A method and apparatus to enable a user to send an action message including secure credential is described. The system comprises a receiving logic to receive the action message from a user, a repository including encrypted user-specific data, and an agent to access a resource through a network, the agent directed as specified by a connector object invoked by the action message. The agent further comprises logic to utilize the encrypted user-specific data from the repository to log into the resource through the network, and in one embodiment, action logic to perform one or more actions as instructed by the connector invoked by the action message. The agent further comprises, in one embodiment, extraction logic for extracting information resulting from of the agent's access to the data resource specified by the connector, and communication logic to communicate a result to the user or to another agent for further use.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: August 22, 2017
    Assignee: Actioneer, Inc.
    Inventors: Thomas Hagan, Bruce Tribbensee, Henry D. Kerr
  • Patent number: 9742757
    Abstract: A computer receives a request for protected user data with an access token presented by a client as authorization for the client to access the protected user data in a delegated environment. The computer parses the request to create a device fingerprint identifying the device submitting the request for the client. The computer compares the device fingerprint of the request to a previously stored device fingerprint of an authorized device associated with the access token. The computer automatically determines whether to identify the access token as potentially misappropriated based on the comparison of the device fingerprint of the request to the previously stored device fingerprint.
    Type: Grant
    Filed: November 27, 2013
    Date of Patent: August 22, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Simon G. Canning, Pranam C. Sreedhar, Patrick R. Wardrop, Shane B. Weeden
  • Patent number: 9735963
    Abstract: A private key is held which conforms to an ElGamal encryption system on a semigroup, calculation of an order of an element of the semigroup being computationally difficult, information corresponding to ciphertext conforming to the ElGamal encryption system is input, a private key s is used to decrypt the information corresponding to the ciphertext in conformance to the ElGamal encryption system, and information corresponding to a result of decrypting the ciphertext is obtained and output. Alternatively, whether it is computationally difficult or easy to calculate the order of the element of the semigroup is determined, and the safety of a decryption service providing device is evaluated based on the determination result.
    Type: Grant
    Filed: January 15, 2014
    Date of Patent: August 15, 2017
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Tetsutaro Kobayashi, Go Yamamoto, Hitoshi Fuji, Tomohide Yamamoto, Reo Yoshida
  • Patent number: 9736151
    Abstract: According to an embodiment, a biometric reference information storage apparatus transmits, to the biometric reference information certificate generation apparatus, a biometric authentication context including the challenge information, the hash value of the biometric reference information, and a first digital signature. The biometric reference information certificate generation apparatus verifies the challenge information and the first digital signature. The biometric reference information certificate generation apparatus transmits a biometric reference information certificate to the biometric reference information storage apparatus. The biometric reference information storage apparatus writes the biometric reference information and the biometric reference information certificate in a storage module.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: August 15, 2017
    Assignees: KABUSHIKI KAISHA TOSHIBA, TOSHIBA SOLUTIONS CORPORATION
    Inventors: Tatsuro Ikeda, Asahiko Yamada, Koji Okada
  • Patent number: 9722966
    Abstract: In a computing device a domain name system (DNS) query is generated and sent, and a check is made as to whether a verified DNS response to the DNS query is received. The computing device is determined to be inside a particular network if a verified DNS response is received, and is determined to be outside that particular network if a verified DNS response is not received. A DNS response can be determined to be verified if both the DNS response has an expected value and the DNS response is digitally signed by a trusted authority, and otherwise can be determined to be not verified.
    Type: Grant
    Filed: January 6, 2016
    Date of Patent: August 1, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Raunak Pandya, Abhishek Tiwari, Rama Krishna Amaravadi
  • Patent number: 9723021
    Abstract: A virus detecting method and device are provided, where the method includes that the virus detecting device receives a network data stream carrying a portable execute (PE) file; calculates first identification information according to structure information of the PE file; matches the first identification information with virus identification information prestored in an antivirus database, and determines whether the PE file is an Archive file; if the PE file is an Archive file, calculates second identification information according to a data packet that carries a data part of the Archive file; and matches the second identification information with the virus identification information prestored in the antivirus database, and if the matching succeeds, determines that the Archive file is an Archive virus file. The present invention can effectively determine whether an Archive-type PE file is a virus file.
    Type: Grant
    Filed: June 18, 2015
    Date of Patent: August 1, 2017
    Assignee: Huawei Technologies Co., Ltd.
    Inventor: Zhenhua Liu
  • Patent number: 9721095
    Abstract: Preventing re-patching by malware on a computer by detecting a request to modify a write-protection attribute of a memory location within a memory of a computer to allow the memory location to be written to, where the detecting is performed subsequent to the detection of activity identified as malware-related activity involving the memory location, and preventing modification of the write-protection attribute of the memory location.
    Type: Grant
    Filed: April 22, 2016
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventor: Ilan Levine-Fraiman
  • Patent number: 9712518
    Abstract: The invention provides an apparatus used for security information interaction comprising a first system management device for providing an operational environment for routine applications and a second system management device for providing an operational environment in a safe mode for security applications so as to perform a security information interaction process. The apparatus used for security information interaction disclosed by the invention has a high safety and a wide applicability and is low in cost.
    Type: Grant
    Filed: March 3, 2014
    Date of Patent: July 18, 2017
    Assignee: China Unionpay Co., Ltd.
    Inventors: Hongfeng Chai, Zhijun Lu, Shuo He, Wei Guo, Yu Zhou, Chengqian Chen, Jianbin Zheng, Xiangxiang Yan, Bin Yu, Dingzhou Li
  • Patent number: 9712517
    Abstract: In an ad hoc mesh network, roles are assignment to the different network nodes, for example mesh point or mesh portal. The invention envisages that a network node identifies the certification and thus the permitted roles of another network node before it sends a message to said other network node. This ensures that the roles maintain their integrity and the security in the network is enhanced.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: July 18, 2017
    Assignee: Unify GmbH & Co. KG
    Inventors: Michael Bahr, Christian Schwingenschlögl
  • Patent number: 9692742
    Abstract: A system enables end user devices to receive audio announcements from third party cloud-based resources. For example, the system may include a first party cloud-based resource providing tokens to the third party cloud-based resource in order to prevent the third party cloud-based resource from causing audio announcements to be output by user devices without authorization. In some cases, the tokens may be time based and prevent the third party cloud-based resource from causing audio announcements to be output by user devices after a predefined amount of time. In other examples, the tokens may be use based and prevent the third party cloud-based resource from causing the user device to output more than a predetermined number of audio announcements.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: June 27, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Peter Spalding VanLund, Nicolas Anton Medhurst Hertl, Peter Paul Henri Carbon, Vikram Kumar Gundeti
  • Patent number: 9679293
    Abstract: The invention provides a method for performing an authentication (and a system for performing the method), in conjunction with a transaction, utilizing a primary channel and a secondary channel. The method may include an authenticating entity, such as a bank, (1) receiving from a customer primary authentication information via a primary channel; (2) the authenticating entity processing the primary authentication information, and retrieving customer information based on the primary authentication information; (3) the authenticating entity transmitting secondary authentication information to the customer via a secondary channel, the secondary channel being different than the primary channel; (4) the authenticating entity receiving from the customer at least a portion of the secondary authentication information; and (5) the authenticating entity performing authentication processing on the secondary authentication information received from the customer.
    Type: Grant
    Filed: December 3, 2015
    Date of Patent: June 13, 2017
    Assignee: JPMorgan Chase Bank, N.A.
    Inventor: Stanley A. Szwalbenest
  • Patent number: 9680648
    Abstract: A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a read only memory (ROM) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code.
    Type: Grant
    Filed: March 22, 2016
    Date of Patent: June 13, 2017
    Assignee: Apple Inc.
    Inventors: Dallas Blake De Atley, Joshua De Cesare, Michael Smith, Matthew Reda, Shantonu Sen, John Andrew Wright
  • Patent number: 9680802
    Abstract: A method, system, and computer program product for providing protected remote access from a remote access client to a remote access server over a computer network through a plurality of inspections. A remote access configuration file is created for the remote access client. A digital hash of the configuration file is then generated. The digital hash is compared with a configuration file stored at a predefined web location. If the comparison results in a match between the digital hash and the stored configuration file, a digital hash comparison is performed between an encrypted remote access configuration file and an encrypted configuration file stored at the predefined web location. If the plurality of inspections are passed, the remote access client is released from a quarantine state and a virtual private network (VPN) connection to the remote access server is established.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: June 13, 2017
    Assignee: Open Invention Network, LLC
    Inventors: Colin Lee Feeser, Anthony W. Ondrus, Steven J. Sanders
  • Patent number: 9680832
    Abstract: A device may receive network traffic. The device may identify candidate text included in a protocol field associated with the network traffic. The device may identify a set of candidate strings included in the candidate text. The device may identify a set of characters that precedes or follows a candidate string, of the set of candidate strings, in the candidate text. The device may determine, using a data structure, a frequency with which the set of characters precedes or follows the candidate string. The device may determine whether the candidate text includes random text based on the frequency. The device may perform an action on the network traffic based on determining whether the candidate text includes random text.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: June 13, 2017
    Assignee: Juniper Networks, Inc.
    Inventor: Ankur Tyagi
  • Patent number: 9665731
    Abstract: Preventing enterprise or other protected content data from “leaking” from being under secure management on a device, for example by virtue of being viewed using an untrusted app on the device, is disclosed. An indication is received that a content to be provided to a first mobile application on a mobile device is to be protected against unauthorized access at the mobile device using unauthorized applications other than the first mobile application. The content is encrypted while in transit to the mobile device, using a key associated with a second mobile application authorized to be used to access the content at the mobile device.
    Type: Grant
    Filed: April 22, 2016
    Date of Patent: May 30, 2017
    Assignee: MOBILE IRON, INC.
    Inventors: Suresh Kumar Batchu, Mansu Kim, Joshua Sirota
  • Patent number: 9665711
    Abstract: A first identifier associated with a first routine is received as input. A determination of whether a first list includes the first identifier is made. In response to the determination, a first action is performed in the event the first list includes the first identifier. A second action that is different from the first action is performed in the event the first list does not include the first identifier.
    Type: Grant
    Filed: December 6, 2013
    Date of Patent: May 30, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Bjorn Markus Jakobsson, Karl-Anders R. Johansson
  • Patent number: 9660960
    Abstract: Some embodiments provide reconfigurable web application firewall (WAF) functionality across a distributed platform. Specifically, the WAF function at each distributed platform server is customizable on a per customer and per inbound message basis. When a server receives an inbound message, the server identities the content or services of which specific customer are implicated by the inbound message. The server screens the inbound message for attacks using a first set of rules and policies defined as part of a production profile from a WAF instance defined by the specific customer while contemporaneously testing the inbound message against a second set of rules and polices defined as part of an audit profile from the same WAF instance. In this manner, the specific customer tests the audit profile rules and policies while still receiving the protections of the production profile rules and policies.
    Type: Grant
    Filed: August 22, 2016
    Date of Patent: May 23, 2017
    Assignee: Verizon Digital Media Services Inc.
    Inventors: Vikas Phonsa, Hayes Kim, David Andrews
  • Patent number: 9661010
    Abstract: Devices, methods, and systems for security log mining are described herein. One method includes combining, using a data fusion unit of an access control system, features of structured and non-structured data associated with system access events for a number of users into a combined data set, generating, using an anomaly detection engine of the access control system, a model of behavior for the number of users based on the combined data set, and comparing, using the anomaly detection engine of the access control system, real time behavior for the number of users to the model for the number of users to determine whether the real time behavior for the number of users is anomalous behavior for the number of users.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: May 23, 2017
    Assignee: Honeywell International Inc.
    Inventors: Kushagra Thakur, Chinmaya Kar, Chandrakantha Reddy, Mohammed Ibrahim Mohideen, Magesh Lingan, Adam Gibson
  • Patent number: 9646173
    Abstract: In particular embodiments, one or more computing devices associated with a third-party system generate a web page comprising one or more references configured to cause a client device to send a request to a web site of a social-networking system to access a user comment, wherein the user comment is associated with content on a third-party web site hosted by the third-party system. The request comprises a first URL that references the web site of the social-networking system, and the first URL comprises a second URL that references the third-party web site and comprises a content identifier for the content, and the request is to cause the web site of the social-networking system to access the user comment in a data store of the social-networking system. The one or more computing devices associated with the third-party system may send the web page to the client device.
    Type: Grant
    Filed: March 4, 2016
    Date of Patent: May 9, 2017
    Assignee: Facebook, Inc.
    Inventors: Ray C. He, Austin Haugen, Catherine Cissy Lee, Evan Sharp