Patents Examined by Michael D Anderson
-
Patent number: 10177914Abstract: The device and system for secure network communications disclosed herein can simultaneously operate one or more secure computing components in a single housing and integrating multiple secure networks. The device can operate networking and other software applications. The disclosed device can have physically and electromagnetically separated computing components in separate enclosures within the device, with physical attributes of the device designed to minimize spurious electronic emissions between enclosures. The device can have one or more shielded covers allowing removal and replacement of computing components within each enclosure. The device can allow simultaneous operations of multiple electromagnetically separated enclosures for multiple secure computers in a single space to integrate multiple secure networks.Type: GrantFiled: October 5, 2016Date of Patent: January 8, 2019Assignee: FUSE INTEGRATION, INC.Inventor: Sumner H. Lee
-
Patent number: 10166950Abstract: An electronic key system includes an onboard apparatus and a portable apparatus. The electronic key system establishes wireless communication with a secret key common between the onboard apparatus and the portable apparatus, and authenticates the portable apparatus registered as the portable apparatus of an authorized user. The portable apparatus includes a portable apparatus code transmitter that transmits a portable apparatus code. The onboard apparatus includes an onboard code transmitter that transmits an onboard code. The onboard apparatus further includes a portable apparatus code receiver, and an onboard-side key generation portion. The portable apparatus further includes an onboard code receiver, and a portable-apparatus-side key generation portion.Type: GrantFiled: September 25, 2014Date of Patent: January 1, 2019Assignee: DENSO CORPORATIONInventors: Kenji Katou, Yuuki Tokunaga
-
Patent number: 10162565Abstract: Examples herein disclose erasing data from a target device based upon an authentication of an erase command. The examples receive an erase command during execution to boot strap information and authenticate the erase command. Upon the authentication of the erase command, the examples erase data from the target device prior to completion of execution of boot strap information.Type: GrantFiled: January 30, 2014Date of Patent: December 25, 2018Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Lan Wang, Wei-Ze Liu, Quoc P Pham, James Robert Waldron
-
Patent number: 10158664Abstract: A system, method, and computer-readable medium for detecting malicious computer code are provided. A dataset may be accessed and converted to a binary dataset according to a predefined conversion algorithm. One or more cycles in the binary dataset may be identified. Statistical analysis may be performed on the identified one or more cycles. A determination that the set of dataset includes malicious software code may be made based on the performed statistical analysis.Type: GrantFiled: July 22, 2014Date of Patent: December 18, 2018Assignee: VERISIGN, INC.Inventor: Trevor Tonn
-
Patent number: 10158655Abstract: Methods and systems for performing security functions in a service-oriented computer system are provided. The method includes acts of receiving, from one or more entities, a service request for a service provided by one or more server computers adapted to process the service request; providing a copy of the service request to a processor adapted to analyze the copy of the service request; storing the service request in a memory; determining, by the processor, if the service request should be processed by performing one or more analyzes of the copy of the service request to determine if the service request would be harmful to the one or more server computers; and if it is determined that the service request should be processed by the one or more server computers, forwarding the service request to the one or more server computers.Type: GrantFiled: December 9, 2016Date of Patent: December 18, 2018Assignee: Raytheon BBN Technologies Corp.Inventors: Partha Pal, Michael Atighetchi, Jonathan Webb, Andrew Gronosky, Joseph Loyall, Aaron Daniel Adler, Fusun Yaman-Sirin
-
Patent number: 10154032Abstract: Systems and methods can comprise receiving an authentication request according to a first security protocol from a user device. Responsive to a determination that the authentication request is trustworthy according to the first security protocol, a device identifier and information related to a shared key are transmitted to the user device. A content request to access content secured according to a second security protocol is received from the user device. The content request can comprise the device identifier and can be encrypted using a shared key derived from the information related to the shared key. The content request can be decrypted using the shared key, and authenticated based on the device identifier.Type: GrantFiled: June 30, 2015Date of Patent: December 11, 2018Assignee: Comcast Cable Communications, LLCInventor: Kyong Park
-
Patent number: 10154049Abstract: The instant disclosure is directed to an attack/unwanted activity detecting firewall for use in protecting authentication-based network resources. The instant system is adapted for installation inline or in sniffer mode. In various embodiments, defined rules are applied to network traffic to determine whether certain types of attacks are occurring on the network resources. If one such attack is detected, the system provides for several potential responses, including for example disconnecting the attacking remote machine, requiring the user at that machine to re-authenticate, and/or requiring a second factor of authentication from the user at that machine. In some example embodiments, regardless of any activity required of a user at the remote machine suspected of malicious behavior, the disclosed system generates an alarm or other alert for presentation as appropriate, such as via a graphical user interface or a third-party system using an API.Type: GrantFiled: May 10, 2016Date of Patent: December 11, 2018Assignee: Preempt Security, Inc.Inventors: Ajit Sancheti, Roman Blachman, Amir Jakoby, Eyal Karni
-
Patent number: 10154063Abstract: A device management apparatus includes a setting information acquisition unit that acquires setting information of one or more security setting items from a device; a policy information acquisition unit that acquires policy information defining a single piece of compliant information, a plurality of pieces of compliant information, or a compliant range, for each security setting item; a determination unit that determines whether each of the setting information of the one or more security setting items conforms, based on the policy information; a change unit that changes, when the setting information of any security setting item does not conform, the setting information so as to conform; and a distribution unit that distributes the changed setting information of the security setting item to the device.Type: GrantFiled: October 1, 2014Date of Patent: December 11, 2018Assignee: RICOH COMPANY, LIMITEDInventor: Atsuhisa Saitoh
-
Patent number: 10142345Abstract: Provide is a device and a method for registering the device supporting home networking, by a server. The method includes receiving a registration request for the device from a user and determining whether the device was registered by the user. If the device has been registered, a re-registration authentication code is obtained based on an initial authentication code of the device, and registration of the device is mapped to the re-registration authentication code.Type: GrantFiled: October 28, 2014Date of Patent: November 27, 2018Assignee: Samsung Electronics Co., LtdInventors: Eun-Hui Bae, Se-Hoon Kim, Yun-Ho Park, Jeong-Il Seo
-
Patent number: 10142114Abstract: [PROBLEMS] To appropriately authenticate a user, a biometric device, and an authentication timing of a client side and prevent leak or tampering of the biometric information. [MEANS FOR SOLVING PROBLEMS] A server device includes: a unit for encrypting information for requesting biometric authentication and identifying the request by using a public key of the biometric authentication device and transmitting the information; and a unit for authenticating the user according to the authentication information containing the result of the biometric authentication.Type: GrantFiled: July 24, 2015Date of Patent: November 27, 2018Assignee: NEC CORPORATIONInventor: Akira Monden
-
Patent number: 10142104Abstract: A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a ROM (read only memory) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code.Type: GrantFiled: June 9, 2017Date of Patent: November 27, 2018Assignee: Apple Inc.Inventors: Dallas Blake De Atley, Joshua De Cesare, Michael Smith, Matthew Reda, Shantonu Sen, John Andrew Wright
-
Patent number: 10135809Abstract: The present invention relates to a method, system and apparatus for authentication using an application. Particularly, this invention can use an integrated ID by acquiring a reliable relationship between applications installed in a single terminal, or can perform the authentication of other applications by sharing authentication information through a representative application among applications. According to this invention, the account registration is performed by referring to the representative application, and thus the SSO authentication scheme may be implemented even in a mobile environment.Type: GrantFiled: September 8, 2015Date of Patent: November 20, 2018Assignee: SK PLANET CO., LTD.Inventors: Kyungwan Ko, Jaeyoung Ju, Bongsu Um
-
Patent number: 10129234Abstract: Provided are an identity confirmation method and an identity confirmation system in which it is not necessary to keep a password in memory and in which a credential used for authentication is changed automatically without requiring a user operation. Life log data for the user is received, life log data history is accumulated and managed, the life log data history is referenced to generate a question relating to history that the user is likely to know, the question is transmitted over the Internet to a mobile communication device, an answer to the question relating to history produced by the user and transmitted from the mobile communication device is received over the Internet, the answer from the user is evaluated to determine whether or not the answer is correct, and the success or failure of identification is determined on the basis of the evaluation result.Type: GrantFiled: November 18, 2014Date of Patent: November 13, 2018Assignee: INTERMAN CorporationInventor: Shigeki Uetabira
-
Patent number: 10116668Abstract: A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor. Following assignment of the sensitivity value to the communication, the communication is formatted for display. When sensitivity value exceeds a security threshold, the communication is parsed into a sequence of fragments. The communication is transmitted as the sequence of fragments when said sensitivity value exceeds the security threshold.Type: GrantFiled: June 20, 2017Date of Patent: October 30, 2018Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Itzhack Goldberg, James R. Kozloski, Clifford A. Pickover, Neil Sondhi, Maja Vukovic
-
Patent number: 10114962Abstract: Protecting data files is disclosed, including: in response to an indication that a data file has been generated by a client device, determining a security classification associated with the data file; determining that the security classification associated with the data file comprises a classified file; storing the data file in a designated virtual storage area; and generating a stub file at an original storage location of the data file, wherein the stub file includes a viewing permission associated with the data file and a storage location of the data file in the designated virtual storage area.Type: GrantFiled: May 18, 2016Date of Patent: October 30, 2018Assignee: Alibaba Group Holding LimitedInventor: Changxiong Lin
-
Patent number: 10114947Abstract: The disclosed computer-implemented method for logging processes within containers may include (i) detecting creation of a new container that comprises a lightweight platform-independent filesystem capable of executing at least one process that is isolated from a host computing device that hosts the container, (ii) launching, within the new container, a monitoring process that maintains a log of events associated with a process that will be executing within the new container, (iii) recording to the log, by the monitoring process, data about at least one event associated with the process executing within the container, and (iv) exporting, by the monitoring process, the log to the host computing device that hosts the new container. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 29, 2016Date of Patent: October 30, 2018Assignee: Symantec CorporationInventors: Azzedine Benameur, Nathan Evans, Yun Shen
-
Patent number: 10117095Abstract: Determination of a quantified identity using a multi-dimensional, probabilistic identity profiles is contemplated. The quantified identity may be used to authenticate a user entity provided to a point-of-sale device or other interface associated with identity requester in order to verify the corresponding users as who they say they are. The user identity may be determined initially as a function of user inputs made to the identity requester and/or as a function of wireless signaling exchange with devices associated with the user.Type: GrantFiled: December 5, 2016Date of Patent: October 30, 2018Assignee: Cable Television Laboratories, Inc.Inventors: Sumanth Channabasappa, Oscar G. Marcia
-
Patent number: 10110945Abstract: Maintaining synchronization of encryption processes at devices during transmission of encrypted data over a communication link is provided. Cipher link maintenance characters are sent from a source device to a sink device. A local cipher link maintenance character generated at the sink device for decrypting the encrypted data can be adjusted according to the cipher link maintenance character. After authentication, cipher link maintenance characters corresponding to units (e.g., frames) of the encrypted data are sent along with the units of the encrypted data. When a transmission error occurs during transmission of the encrypted data, cipher link maintenance characters can be used to correct the error in a local cipher link maintenance character generated at the sink device. Hence, even if the transmission error occurs in the communication link, the sink device can resolve the transmission error and maintain the synchronization of encryption processes at the source and sink devices.Type: GrantFiled: March 13, 2015Date of Patent: October 23, 2018Assignee: Lattice Semiconductor CorporationInventors: QinGang Wang, HongPeng Wang, Hoon Choi
-
Patent number: 10110485Abstract: A method and system for mitigating of cyber-attacks in a software defined network (SDN) are presented. The method comprises operating a central controller and the SDN in a peace mode; monitoring traffic addressed to at least one destination server to detect at least an attack performed against the at least one destination server; switching an operation of the central controller to an attack mode, upon detection of an attack against the at least one destination server; and instructing, by the central controller, network elements of the SDN to divert all suspicious incoming traffic addressed to the at least one destination server to a security server, thereby mitigating the detected attack.Type: GrantFiled: June 2, 2015Date of Patent: October 23, 2018Assignee: Radware, Ltd.Inventors: Avi Chesla, Ehud Doron
-
Patent number: 10089485Abstract: A location information acquisition unit (25) acquires location information for pointing a current location. A first transmission unit (21) sends, via a network to a management device (100), access request information used for requesting access to information acquisition units (23), (24), attached with the location information acquired by the location information acquisition unit (25). A first reception unit (22) receives, from the management device (100) via the network, access permission information or access prohibition information in response to the access request information. A control unit (20) leaves the information acquisition units (23), (24) prohibited to operate, if the access permission information has not been received yet by the first reception unit (22), and controls the information acquisition units (23), (24) to operate only for a predetermined duration to acquire information, upon reception of the access permission information by the first reception unit (22).Type: GrantFiled: March 20, 2014Date of Patent: October 2, 2018Assignee: I3 SYSTEMS, INC.Inventor: Tsutomu Sasaki