Patents Examined by Michael M. Lee
  • Patent number: 11032294
    Abstract: A disclosed method performed by a network device can include intercepting cryptographic certificates of host servers received in response to requests for encrypted connections between host servers and user devices, and determining that each encrypted connection is a suspicious connection or a normal connection based on a certificate validation policy. The method can further include causing decryption or metadata analysis of any suspicious encrypted connection and bypassing decryption or metadata analysis of any normal encrypted connection.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: June 8, 2021
    Assignee: Gigamon Inc.
    Inventors: Kishor Joshi, Manish Pathak, Sandeep Dahiya
  • Patent number: 11025635
    Abstract: A request for access to a user's account is made to an authenticator. The authenticator sends a request for access to the user associated with the user's account. In response to user authorization, the authenticator sends an access link to a service engineer. The service engineer access the link to access the user's account with limited and restricted access. When a remote service session associated with the activated access link is terminated, the authenticator sends a termination of session notice to the user.
    Type: Grant
    Filed: January 30, 2017
    Date of Patent: June 1, 2021
    Assignee: NCR Corporation
    Inventors: Jason Patterson, Nir Veltman
  • Patent number: 10986091
    Abstract: Techniques for managing data mobility domains in storage system environments. The techniques employ a multiple master approach, in which each storage system in a storage system domain can function as an owner of the domain. Each domain owner has privileges pertaining to addition of new members to the domain, removal of members from the domain, and modification of domain credentials. When a new storage system is added as a member of the domain, the domain credentials are provided from the domain owner to the new storage system, resulting in the domain credentials being shared among all members of the domain. Domain membership information is also shared among all members of the domain. In this way, the management of storage system domains can be achieved without the need of a domain management server, avoiding a single point of failure or latency and reducing the complexity/cost associated with the domain management server.
    Type: Grant
    Filed: October 30, 2017
    Date of Patent: April 20, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Nagasimha Haravu, Tianming Zhang, Sathish Janamanchi, Michael Zeldich, Daniel S. Keefe
  • Patent number: 10965454
    Abstract: Disclosed are an apparatus and method for public key encryption using a white-box cipher algorithm. An apparatus for public key encryption using a white-box cipher algorithm includes a key table generator configured to generate at least one key table from a cipher key, a hidden-key table generator configured to convert the at least one key table into at least one hidden-key table, and an encryption algorithm generator configured to generate a white-box implemented encryption algorithm by using the at least one hidden-key table and an inverse operation of the conversion and provide the generated encryption algorithm as a public key for encryption.
    Type: Grant
    Filed: May 4, 2017
    Date of Patent: March 30, 2021
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Duk-Jae Moon, Kyu-Young Choi, Ji-Hoon Cho
  • Patent number: 10951595
    Abstract: The present application discloses a method, system and apparatus for storing a website private key plaintext. A specific implementation of the method includes: receiving a public key sent from a terminal configured to perform encryption and decryption, wherein the public key is generated at random by the terminal; encrypting a website private key plaintext by using the public key to generate a website private key ciphertext, wherein the website private key plaintext is pre-acquired; and sending the website private key ciphertext to the terminal, so that the terminal decrypts the website private key ciphertext by using the private key to generate the website private key plaintext and store the website private key plaintext in the terminal. This implementation improves the security of storage of the website private key plaintext.
    Type: Grant
    Filed: June 9, 2017
    Date of Patent: March 16, 2021
    Assignee: BEIJING BAIDU NETCOM SCIENCE AND TECHNOLOGY CO., LTD.
    Inventors: Wei Qi, Jian Ouyang, Yong Wang, Yichen Tu, Sijie Yang
  • Patent number: 10915637
    Abstract: A method, a client, and a system for testing an application. A webpage file includes codes for simulating a malicious attack. The method includes providing, by the test client, a network address of the webpage file to the tested application, wherein when the tested application loads the webpage file according to the network address, the tested application executes the codes comprised in the webpage file to attempt to read content of a private file in a private directory of the tested application. When the tested application successfully reads the content of the private file, the tested application transmits a message carrying the content of the private file to a test server through a local terminal device, wherein the test server determines whether the tested application has a security loophole according to the message transmitted by the tested application.
    Type: Grant
    Filed: November 2, 2017
    Date of Patent: February 9, 2021
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Jinding Wang, Yue Gao, Fan Shao
  • Patent number: 10891397
    Abstract: Embodiments provide a user interface display method for a terminal, and a terminal. The method includes: generating, by a terminal in a first operating environment, a first user interface that includes a first input component, obtaining a first user interface picture according to the first user interface, and determining attribute information of the first input component according to a first application. The method also includes switching, by the terminal, to a second operating environment, and displaying a second user interface in the second operating environment according to the first user interface picture and the attribute information of the first input component, thereby reducing processing overheads of the terminal.
    Type: Grant
    Filed: April 30, 2015
    Date of Patent: January 12, 2021
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Xi Huang, Zuoqiang Zhang
  • Patent number: 10885166
    Abstract: A computer security protection may be provided by dynamic computer system certification. User usage of a computer system may be monitored. Based on the monitoring a role of the user in the usage of the computer system is determined. A certification required for the role and whether the user has the certification sufficient for the role are determined. Responsive to determining that the user does not have the certification sufficient for the role, a certification process is initiated.
    Type: Grant
    Filed: October 2, 2017
    Date of Patent: January 5, 2021
    Assignee: International Business Machines Corporation
    Inventors: Valentina Salapura, Ruchi Mahindru, Anca Sailer
  • Patent number: 10855758
    Abstract: In a network including a plurality of computing resources associated with an enterprise, an identity is established for each of the computing resources in accordance with a decentralized identity management system maintained in accordance with a distributed ledger. The plurality of computing resources is managed in association with the distributed ledger, wherein managing comprises the enterprise posting one or more commands on the distributed ledger to enable one or more of the plurality of computing resources to obtain the one or more commands. In one non-limiting example, the computing resources are part of a geographically distributed IT infrastructure associated with the enterprise.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: December 1, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Mark A. O'Connell, Stephen Todd
  • Patent number: 10841079
    Abstract: One or more data storage systems are configured to automatically access a data registration service in response to receipt of a data request associated with a storage user of the one or more data storage systems and a profile of an identity associated with the storage user. The identity profile associated with the storage user comprises one or more policies for storage and access of data associated with the storage user.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: November 17, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Stephen Todd, Mark A. O'Connell
  • Patent number: 10834457
    Abstract: Techniques are described for associating identifiers (e.g., digital watermarks) with video content in a way that enables identification of the source of pirated content with specificity as granular as an individual user account. A compositors operating in the DRM trust zone of a client device introduces the identifier by compositing overlay information with decoded video frames. The identifier may then be recovered by comparing target content to the source content to extract the overlay information.
    Type: Grant
    Filed: October 12, 2017
    Date of Patent: November 10, 2020
    Assignee: Amazon Technologies, Inc.
    Inventor: David Wayne Bourgoyne
  • Patent number: 10796000
    Abstract: A sequence mining platform (SMP) comprises a processor, at least one machine-accessible storage medium responsive to the processor, and a sequence manager in the machine-accessible storage medium. The sequence manager is configured to use processing resources to determine a sequence of nucleobases in a nucleic acid. The storage medium also comprises a blockchain manager to (a) collect transaction data for one or more transactions for a blockchain which requires a proof of work (POW) for each new block; and (b) include at least some of the transaction data in a new block for the blockchain. The storage medium also comprises a sequence mining module (SMM) to use the determined sequence of nucleobases from the sequence manager to create a POW for the new block. In one embodiment, the SMM enables an entity which controls the SMP to receive transaction rewards and sequencing rewards. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 11, 2016
    Date of Patent: October 6, 2020
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Rajesh Poornachandran
  • Patent number: 10778351
    Abstract: The invention relates to a process for transmitting streaming digital content to a client device for access to digital content. The inventive process makes it possible, in particular, to apply an access control system to the protection of direct-mode video streams. The process also makes it possible to significantly improve the security and safety of the system, based on a periodic mandatory back-communication on the part of the client device.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: September 15, 2020
    Assignee: 4T S.A.
    Inventors: David Naccache, Lukasz Jeczminski, Mateusz Zajakala, Jas Saini
  • Patent number: 10719615
    Abstract: To provide an information processing apparatus, a reading control method, and a computer readable storage medium that can improve the secrecy of information written in a secret area compared with the case of controlling access only by authentication, the information processing apparatus includes a nonvolatile memory that has a secret area where secret information is stored, an authentication controller that authenticates access to the nonvolatile memory, a flag information storage unit that stores flag information, and a memory controller that controls access to the nonvolatile memory by using the flag information stored in the flag information storage unit. The memory controller allows reading of the secret information from the secret area when a value of the flag information is a specified value and validity of access is authenticated by the authentication controller.
    Type: Grant
    Filed: May 1, 2017
    Date of Patent: July 21, 2020
    Assignee: RENESAS ELECTRONICS CORPORATION
    Inventors: Yoshihiko Asai, Takashi Kurafuji, Yoko Kimura
  • Patent number: 10701029
    Abstract: Within a particular Top Level Domain (TLD), domain name allocation and domain name ownership may be subject to certain restrictions requiring verification. A processing platform and method is disclosed to process verification of a domain name and/or a domain name entity such as a registrant for domain name transactions with a domain name registry. The processing platform and domain name registry may be remotely located relative to one another.
    Type: Grant
    Filed: June 6, 2017
    Date of Patent: June 30, 2020
    Inventors: Hui Zhou, Cedarampattu Mohan, Xuhui Wang, Steven Singer
  • Patent number: 10685122
    Abstract: A computer-implemented method for protecting a kernel for secure boot of an operating system includes preparing a kernel component with a signature for a secure boot. A processing unit modifies a machine owner key (MOK) file to include a trusted certificate. The MOK is separate from the kernel file. The processing unit validates the kernel component using a modified Grub file, a modified Shim file, and the MOK, and executes a secure boot using the validated kernel component. The kernel is unchanged by the secure boot process. The kernel component that is protected may be either a program executable (PE) file or a non-PE file.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: June 16, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Pu Liu, Timothy V. Bolan, Patrick J. Callaghan
  • Patent number: 10664599
    Abstract: A computer-implemented method for protecting a kernel for secure boot of an operating system includes preparing a kernel component with a signature for a secure boot. A processing unit modifies a machine owner key (MOK) file to include a trusted certificate. The MOK is separate from the kernel file. The processing unit validates the kernel component using a modified Grub file, a modified Shim file, and the MOK, and executes a secure boot using the validated kernel component. The kernel is unchanged by the secure boot process. The kernel component that is protected may be either a program executable (PE) file or a non-PE file.
    Type: Grant
    Filed: May 1, 2017
    Date of Patent: May 26, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Pu Liu, Timothy V. Bolan, Patrick J. Callaghan
  • Patent number: 10650130
    Abstract: In certain embodiments, a token (e.g., a short-range wireless token or other token) may be provided to facilitate authentication. In some embodiments, the token may obtain a first challenge from a computer system. The token may determine which challenge type of multiple challenge types the first challenge corresponds. The token may cause a secure component to use a key associated with a first challenge type to generate a first challenge response for the first challenge based on the first challenge corresponding to the first challenge type, where the key associated with first challenge type may be selected by the secure component from multiple keys (for the generation of the first challenge response) based on the first challenge corresponding to the first challenge type. The first challenge response may be provided to the computer system.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: May 12, 2020
    Assignee: UBS Business Solutions AG
    Inventor: Alain Hiltgen
  • Patent number: 10630464
    Abstract: A communication device to allocate shared keys to plural channels includes a storage, a receiver, a storage controller, an allocator, and an encryption processor. The storage includes a predetermined number of storage areas to store one or more shared keys shared with a destination device. The receiver is configured to receive a shared key. The storage controller controls storing the received shared key in any of the storage areas every time the shared key is received. The allocator can allocate the storage areas to communication channels used for communicating encrypted data between the communication device and the communication destination device, based on a ratio predetermined for each communication channel. The encryption processor can, according to a cryptosystem determined for the each communication channel, encrypt data and decrypt the encrypted data by using the shared key acquired from the storage area allocated to each communication channel.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: April 21, 2020
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Yoshimichi Tanizawa
  • Patent number: 10599861
    Abstract: Disclosed are systems and method for controlling access to objects of an operating system using Access Control Lists (ACLs). An exemplary method comprises: generating, by a processor, one or more ACLs for objects of the operating system based on at least one access rule specifying the access mode to the object of the operating system to one or more users based on the one or more categories to which the objects belongs; intercepting a request from a user to access an object of the operating system; determining, by the processor, one or more ACLs associated with the requested object; and applying, by the processor, the determined one or more ACLs to decide whether to allow or deny access of the user to the requested object, wherein if one of the applied ACLs denies access to the object, the access will be blocked, otherwise the access will be allowed.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: March 24, 2020
    Assignee: AO Kaspersky Lab
    Inventors: Andrey Y. Solodovnikov, Maxim V. Klimenchuk, Maxim V. Yudin, Vasily N. Isakov