Patents Examined by Michael S McNally
  • Patent number: 10701054
    Abstract: Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment are described herein.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: June 30, 2020
    Assignee: salesforce.com, inc.
    Inventors: Prithvi Krishnan Padmanabhan, Sriram Gopalan, Venkata Sarath Maddali, Darpan Dhamija, Jyoti Raj
  • Patent number: 10693642
    Abstract: Systems and methods are described to enable replacement, in a packaged content stream, of a first encoded content stream with a second encoded content stream, without requiring decoding of the encoded content streams. A controller can receive a request to replace the first encoded content stream with the second encoded content stream at a specified location (e.g., a particular time). The controller can then instruct encoders associated with the respective content streams to insert a splice point frame into the respective content streams at the specified location, which splice point frame breaks inter frame dependency before and after the splice point frame. A packager can then replace the first encoded content stream with the second encoded content stream at the location of the splice point frame in the packaged content stream, without introducing errors into the packaged content stream as a result of broken inter frame dependency.
    Type: Grant
    Filed: June 5, 2017
    Date of Patent: June 23, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: John Robert Saxton, Olaf Nielsen, Evan Gerald Statton
  • Patent number: 10691790
    Abstract: Various methods and systems are provided for autonomous secrets management for a temporary shared access signature (“SAS”) service. Input for a temporary access request for an account resource, is received from a client. The temporary access request is validated, based on communicating a validation request to the secrets management service (“SMS”) that can be utilized to store, renew and distribute secrets in a distributed computing environment. Validating the temporary access request is based on determining a storage account location path for SAS keys that provide temporary access to account resources. An access policy associated with the temporary access request is accessed. An SAS key request, associated with temporary access request, is communicated to the SMS. The SAS key request includes at least a portion of the access policy. An SAS key is received from the SMS. The SAS key, for access to the account resource, is communicated to the client.
    Type: Grant
    Filed: March 14, 2018
    Date of Patent: June 23, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Brian S. Lounsberry, Kahren Tevosyan, Vyom P. Munshi, Chetan S. Shankar, Pavan Gopal Bandla, Pawel Tomasz Lipiec, Sandeep S. Kalarickal
  • Patent number: 10691835
    Abstract: Implementations of the present specification include storing a data item in a consortium blockchain; generating a first data digest based on the stored data item; sending the first data digest to verification nodes to cryptographically signs it and stores the signed first data digest in a public blockchain; receiving a request to retrieve the stored data item; retrieving the requested data item from the consortium blockchain; generating a second data digest based on the retrieved data item; sending the second data digest to verification nodes so that each verification node signs the second data digest; receiving the signed second data digests from the plurality of verification nodes; retrieving the signed first data digests from the public blockchain; determining that the signed first data digests match the signed second data digests; and sending a response indicating the stored data item is unchanged to the request to retrieve the stored data item.
    Type: Grant
    Filed: February 3, 2020
    Date of Patent: June 23, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Long Cheng, Yanpeng Li, Zhiyuan Feng
  • Patent number: 10678930
    Abstract: A computer-implemented method is provided herein of generating a file having a column-oriented layout and having a file header and a data block. The method includes a step of inserting length information of an encryption vector into the data block; a step of inserting the encryption vector into the data block; and a step of inserting data array of the encrypted column after referring to the encryption vector.
    Type: Grant
    Filed: October 19, 2018
    Date of Patent: June 9, 2020
    Assignee: LOGPRESO INC.
    Inventor: Bongyeol Yang
  • Patent number: 10681082
    Abstract: A hearing device includes: a processing unit configured to compensate for hearing loss of a user of the hearing device; and an interface; wherein the processing unit is configured to: receive a session request for a session via the interface, obtain and store a session key, encrypt the session key based on a hearing device key, send a session response comprising the encrypted session key, and receive session data in the session via the interface.
    Type: Grant
    Filed: September 13, 2018
    Date of Patent: June 9, 2020
    Assignee: GN Hearing A/S
    Inventors: Brian Dam Pedersen, Allan Munk Vendelbo
  • Patent number: 10665335
    Abstract: The highly secure method and system acquires, processes and produces health care (HC) data and service records from multiple local devices, notwithstanding different operating systems (OS) in such devices, and all accessed and controlled by a cloud computing network. Devices have memories, displays, keypads, cameras and microphones. The system operates on acquired data including image, keypad-text, audio, and speech-converted-to text data generated by respective devices. The method downloads commands to devices (notwithstanding different OS) which delete-acquired-data upon a request to save (upload) data to the cloud computing network. Further data security includes a disable-print-screen command prohibiting local storage of stored acquired data into local devices.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: May 26, 2020
    Assignee: SYMPLAST ACQUISITION, INC.
    Inventors: Shashidhar Kusuma, Munish K. Batra, Bhupesh Vasisht
  • Patent number: 10657277
    Abstract: Securing an endpoint against exposure to unsafe content includes encrypting files to prevent unauthorized access, and monitoring an exposure state of a process to potentially unsafe content by applying behavioral rules to determine whether the exposure state is either exposed or secure, where (1) the process is initially identified as secure, (2) the process is identified as exposed when the process opens a network connection to a URL that is not internal to an enterprise network of the endpoint and that has a poor reputation, (3) the process is identified as exposed when it opens a file identified as exposed, and (4) the process is identified as exposed when another exposed process opens a handle to the process. Access to the files may be restricted when the process is exposed by controlling access through a file system filter that conditionally decrypts files for the process according to its exposure state.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: May 19, 2020
    Assignee: Sophos Limited
    Inventors: Kenneth D. Ray, Andrew J. Thomas, Anthony John Merry, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw
  • Patent number: 10659239
    Abstract: Techniques facilitating using a blockchain system that integrates the trustworthiness of the blockchain concept with open scientific research by generating a blockchain of the experiments formed, data collected, analyses performed, and results achieved are provided herein. In an example, the blockchain system can form a blockchain representing a research project, wherein the blockchain comprises a first block of research data and a second block of analysis data representing a log of an analysis performed on the research data. Summary blocks and correction blocks can also be added to the blockchain representing the post analysis of the research results. One or more of the subsequent blocks can be linked to the preceding blocks using information in block headers that can also serve to determine whether modifications to the blocks have been performed.
    Type: Grant
    Filed: March 20, 2019
    Date of Patent: May 19, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jae-Wook Ahn, Maria D. Chang, Ravindranath Kokku, Patrick Watson
  • Patent number: 10657282
    Abstract: Controlling access to nodes in a relational graph at query time by using an approximate membership query (AMQ) filter and ordered queries based on historic grants or denials of access according to security context enables a more efficient querying of the relational graph while preserving access controls. Security contexts that grant or deny access to a node are stored in an associated AMQ filter and are queried according to the subject's security context in an order based on the frequency at which the security contexts have previously granted or denied access to nodes in the relational graph.
    Type: Grant
    Filed: February 6, 2019
    Date of Patent: May 19, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Tor Kreutzer, Steffen Viken Valvag, Dag Steinnes Eidesen, Amund Kronen Johansen, Peter Dahle Heen, Jan-Ove Almli Karlberg, Jon Meling, Age Kvalnes
  • Patent number: 10657237
    Abstract: An electronic device includes one or more sensors, a user interface having one or more user interface output devices, and one or more processors operable with the one or more sensors and the user interface. The one or more processors receive, from the user interface, a command to power OFF the electronic device. Upon failing to detect, with the one or more sensors, an authorized user of the electronic device as a source of the command to power OFF the electronic device, the one or more processors disable the one or more user interface output devices while leaving the one or more sensors operational.
    Type: Grant
    Filed: February 17, 2018
    Date of Patent: May 19, 2020
    Assignee: Motorola Mobility LLC
    Inventors: Rachid Alameh, Thomas Merrell, Jarrett Simerson
  • Patent number: 10659431
    Abstract: Some embodiments provide a method for applying a security policy defined for a logical network to an MHFE that integrates physical workloads (e.g., physical machines connected to the MHFE) with the logical network. The method applies the security policy to the MHFE by generating a set of ACL rules based on the security policy's definition and configuring the MHFE to apply the ACL rules on the network traffic that is forwarded to and/or from the physical machines. In order to configure an MHFE to implement the different LFEs of a logical network, some embodiments propagate an open source database stored on the MHFE, using an open source protocol. Some embodiments propagate a particular table of the database such that each record of the table creates an association between a port of an LFE stored in a logical forwarding table and one or more ACL rules stored in an ACL table.
    Type: Grant
    Filed: January 4, 2019
    Date of Patent: May 19, 2020
    Assignee: NICIRA, INC.
    Inventor: Benjamin C. Basler
  • Patent number: 10652277
    Abstract: A method to block overlay phishing attempt is described. In one embodiment, the method includes detecting a first application displaying a page of the first application on a display of a computing device, detecting a second application displaying a page of the second application on the display of the computing device, upon detecting the second application displaying the page of the second application, comparing a schematic representation of the page of the first application to a schematic representation of the page of the second application, and determining whether an overlay phishing attempt occurs based at least in part on the comparing.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: May 12, 2020
    Assignee: CA, Inc.
    Inventor: Dinesh Venkatesan
  • Patent number: 10637848
    Abstract: Disclosed herein is an apparatus for supporting authentication between devices, which includes a certificate information storage unit for storing certificate data of a first terminal for managing a certificate; a communication unit for receiving a request for a certificate of the first terminal, which uses a signature value and certificate-related information corresponding to the first terminal, from a second terminal and returning information corresponding to a valid certificate of the first terminal to the second terminal in order to enable the second terminal to authenticate the first terminal; and a certificate verification unit for verifying whether a certificate of the first terminal is valid.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: April 28, 2020
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yun-Kyung Lee, Young-Ho Kim, Jeong-Nyeo Kim, Jae-Deok Lim, Bo-Heung Chung, Hong-Il Ju, Yong-Sung Jeon
  • Patent number: 10631169
    Abstract: Some embodiments provide systems and methods of enhancing protection of unmanned retail delivery vehicles. Some of these embodiments comprise: a plurality of unmanned delivery vehicles (UDV); a plurality of lure unmanned vehicles; and a procedure randomization system configured to randomly select a protection procedure that is not to be implemented by a first lure unmanned vehicle to enhance an attack vulnerability; and wherein a first lure vehicle control circuit of the first lure unmanned vehicle is configured to obtain a first lure route and control the first lure unmanned vehicle to travel along the first lure route while preventing the selected first protection procedure from being applied while applying at least a sub-set of the set of the plurality of protection procedures to a full capacity while the first lure unmanned vehicle travels along the first lure route.
    Type: Grant
    Filed: May 28, 2019
    Date of Patent: April 21, 2020
    Assignee: Walmart Apollo, LLC
    Inventors: Donald R. High, David C. Winkle, John J. O'Brien, Robert L. Cantrell, Todd D. Mattingly
  • Patent number: 10621359
    Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
  • Patent number: 10621361
    Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
  • Patent number: 10623393
    Abstract: Example embodiments of systems and methods for data transmission between a contactless card, a client device, and one or more servers are provided. The memory of the contactless card may include one or more applets and a counter. The client device may be in data communication with the contactless card and one or more servers, and the one or more servers may include an expected counter value. The client device may be configured to read the counter from the contactless card and transmit it to the one or more servers. The one or more servers may compare the counter to the expected counter value for synchronization. The contactless card and the one or more servers may resynchronize the counter, via one or more processes, based on one or more reads of the one or more applets. The one or more servers may authenticate the contactless card based on the resynchronization.
    Type: Grant
    Filed: October 1, 2019
    Date of Patent: April 14, 2020
    Assignee: CAPITAL ONE SERVICES, LLC
    Inventors: Kevin Osborn, James Ashfield, Jeffrey Rule
  • Patent number: 10621360
    Abstract: Mechanisms are provided for correlating security vulnerability detection across multiple applications. The mechanisms perform a security vulnerability analysis of first source code of a first application, and identify, based on results of the security vulnerability analysis, a security vulnerability in a first portion of the first source code. The mechanisms associate characteristics of the security vulnerability with the first portion, and correlate the characteristics of the security vulnerability with second source code of a second application based on the association of the characteristics of the security vulnerability with the first portion. In addition, the mechanisms generate an output to a computing device of a consumer or contributor associated with the second source code identifying a presence of the security vulnerability in the second source code based on the correlation.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Elizabeth A. Holz, Iosif V. Onut, Joni E. Saylor, Hyun Kyu Seo, Ronald B. Williams
  • Patent number: 10616253
    Abstract: An anomaly detection system configured to generate a plurality of tensors based on spatial attributes of a set of cybersecurity data and temporal attributes of the set of cybersecurity data. The set of cybersecurity data comprising numeric data and textual data collected from a plurality of computational sources. The anomaly detection system can provide the plurality of tensors to a Hierarchical Temporal Memory (HTM) network. The HTM network can be configured to generate respective HTM outputs for respective regions of the HTM network. The anomaly detection system can determine that at least one HTM output indicates an anomaly, convert the at least one HTM output to a notification, and provide the notification to a user interface.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sharon Hagi, Gary I. Givental