Patents Examined by Michael S McNally
  • Patent number: 11074335
    Abstract: A method for operating an Internet of Things (IoT) system includes obtaining, by a device registration tool, identification information of a first IoT module, obtaining, by the device registration tool, identification information of a device with the first IoT module mounted thereon, and registering, by the device registration tool, the identification information of the first IoT module and the identification information of the device in a database accessible by an IoT network.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: July 27, 2021
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Joo Hwan Kim, Bo Gyeong Kang, Myung Koo Kang
  • Patent number: 11070570
    Abstract: Disclosed herein are systems and method for correlating malware detections by endpoint devices and servers. In one aspect, an exemplary method comprises receiving, by a correlator, from one or more servers, one or more events collected without invasive techniques, one or more events collected using one or more invasive techniques, and one or more final verdicts, correlating the one or more events collected without invasive techniques with one or more events collected using the one or more invasive techniques, creating a suspicious pattern when an event of the one or more events collected without invasive techniques is correlated with an event of the one or more events collected using the one or more invasive techniques, and the event of the one or more events collected using one or more invasive techniques is used to detect a malware, and updating databases of one or more endpoint devices with created suspicious patterns.
    Type: Grant
    Filed: March 1, 2019
    Date of Patent: July 20, 2021
    Assignee: ACRONIS INTERNATIONAL GMBH
    Inventors: Alexey Kostyushko, Vladimir Strogov, Serguei Beloussov, Stanislav Protasov, Anastasia Pereberina, Nikolay Grebennikov
  • Patent number: 11063953
    Abstract: In some aspects, a method for revoking access to a network application on a client device. The method includes establishing, by a client application on a client device responsive to authenticating a user, access to one or more network applications of one or more first servers of a first entity via an embedded browser of the client application, receiving, by the client application, a notification from a second server of a second entity that access for the user to a network application of the one or more network applications is to be revoked, and performing, by the client application responsive to the notification, one or more revoking actions based at least on a policy.
    Type: Grant
    Filed: November 7, 2018
    Date of Patent: July 13, 2021
    Assignee: Citrix Systems, Inc.
    Inventors: Abhishek Chauhan, Jeroen Mattijs van Rotterdam
  • Patent number: 11057383
    Abstract: Methods and apparatus to prevent unauthorized modem use are disclosed. An example apparatus includes a locking circuit; and a host authorizer to, when a received attention (AT) command pattern from a host device matches an AT command pattern, transmit a first voltage to the locking circuit to cause the locking circuit to enable modem functionality and, when the received AT command pattern does not match the AT command pattern, transmit a second voltage to the locking circuit to cause the locking circuit to disable modem functionality.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: July 6, 2021
    Assignee: The Nielsen Company (US), LLC
    Inventors: Igor Sotosek, Bostjan Valencic
  • Patent number: 11057776
    Abstract: A device identifying method for identifying whether a candidate member device belongs to a device set or not by an identifying device. The device set comprising at least one member device. The method comprises: (a) establishing a connection between the identifying device and a first member device among the member device, to acquire a set ID and at least one identifying key from the first member device; (b) discovering the candidate member device according to the set ID; (c) generating identifying data according to the identifying key and transmitting the identifying data to the candidate member device; and (d) determining whether the candidate member device belongs to the device set or not according to a comparing result for the identifying data.
    Type: Grant
    Filed: January 9, 2019
    Date of Patent: July 6, 2021
    Assignee: MEDIATEK INC.
    Inventor: Li-Chun Ko
  • Patent number: 11057685
    Abstract: Methods and a System are provided for proving media content was played on a display through capturing of audit information presented in watermarks when the content is played on the display. In a method, content watermarks are generated for content that is to be rendered on a display of a display device. An image sensor that is externally affixed to a corner of the display captures the watermarks as the content is rendered on the display, the image sensor captures the watermarks being played with the content from the area associated the corner where the image sensor is affixed. The image sensor captures the watermarks as images and streams the images back to the display device for storage. The stored watermarks are processed to verify that the corresponding content associated with the watermarks was played by the display device (visually rendered on the display of the display device).
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: July 6, 2021
    Assignee: NCR Corporation
    Inventors: Jeremy Cyle Taylor, Nicholas Caine, David Alan Meier
  • Patent number: 11050751
    Abstract: A method to onboard a subordinate node to a high performance computing system that includes a fabric switch network that includes a fabric switch principal and a group of subordinate nodes, wherein the fabric switch principal is configured to route messages between subordinate nodes of the group comprising: receiving a fabric switch principal address message, at an onboarding subordinate node, over an external network; providing an identification message, by the onboarding subordinate node, over the fabric switch network; receiving the identification message, at the fabric switch principal, over the fabric switch network; providing the permission message, by the fabric switch principal, over the fabric switch network; and receiving, a permission message, at the onboarding subordinate node, over the fabric switch network.
    Type: Grant
    Filed: July 1, 2019
    Date of Patent: June 29, 2021
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Barry E. Huntley, Simon Hunt
  • Patent number: 11050771
    Abstract: To detect a communication by a predetermined type of software, which disguises normal communication, an information processing apparatus includes: a communication data acquiring unit 21 configured to acquire communication data generated by a terminal connected to a network; a distribution calculating unit 24 configured to calculate distribution of attribute information of a plurality of communications with a same communication destination, based on the acquired communication data; and an estimating unit 25 configured to estimate whether a detected communication is a communication by a predetermined type of software by determining whether the calculated distribution satisfies a predetermined criterion.
    Type: Grant
    Filed: October 16, 2018
    Date of Patent: June 29, 2021
    Assignee: PFU LIMITED
    Inventors: Seigo Terada, Keiji Michine, Takashi Kobayashi
  • Patent number: 11044259
    Abstract: An enhanced email service that mitigates drawbacks of conventional email services by enabling transmission of encrypted content to a recipient regardless of the recipient having a prior relationship with the sender or having credentials issued from a certificate authority. A method is provided for receiving encrypted content and generating a message includes both the encrypted content as an attachment and a link to enable decrypted access to the decrypted content. The method may include transmitting the message to an intended recipient's mailbox while also storing the message in an organizational mailbox to provide for subsequent decryption of the encrypted content. The link may provide the intended recipient of the message with decrypted access to the encrypted content in various ways depending on, for example, whether the recipient is viewing the message through a webmail browser or through a local mail client that is compatible with the enhanced email service.
    Type: Grant
    Filed: August 6, 2019
    Date of Patent: June 22, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Krishna Kumar Parthasarathy, George E. Roussos, Hao Zhang, Christopher S. Dickens, Salil Kapoor, Vinh Trinh
  • Patent number: 11038674
    Abstract: The present disclosure relates to a trustworthy data exchange. Embodiments include receiving, from a device, a query, wherein the query comprises a question. Embodiments include identifying particular information related to the query. Embodiments include receiving credentials from a user for retrieving the particular information related to the query. Embodiments include retrieving, using the credentials, the particular information related to the query from one or more data repositories that are part of a distributed database comprising an immutable data store that maintains a verifiable history of changes to information stored in the distributed database. Embodiments include determining, based on the particular information related to the query, an answer to the query. Embodiments include providing the answer to the device.
    Type: Grant
    Filed: July 30, 2019
    Date of Patent: June 15, 2021
    Assignee: INTUIT, INC.
    Inventors: Glenn Scott, Michael R. Gabriel, Parikshit Lingampally, Roger Meike, Ian Maya Panchevre
  • Patent number: 11032060
    Abstract: A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is updated using a second equation that is based on the second share value. One of the value of the first register or the value of the second register is selected based on a bit value of the second share value.
    Type: Grant
    Filed: August 7, 2019
    Date of Patent: June 8, 2021
    Assignee: Cryptography Research, Inc.
    Inventor: Michael Tunstall
  • Patent number: 11018797
    Abstract: A fiber optic light intensity encryption method is provided. The method includes determining light intensities associated with multi-frequency light pulses emitted by a laser transmitter apparatus in response to an encryptions process. An encryption type for application of an encryption algorithm to each light intensity is determined and a first light intensity associated with a first light pulse is selected. Data indicating results of the random selection is transmitted to the laser transmitter apparatus and an initial security key is transmitted over a signaling channel of the laser transmitter apparatus. The signaling channel is secured based on the initial security key resulting in a secure signaling channel. In response, a secure bundle comprising said the secure signaling channel and an additional group of channels is generated and the data is transmitted via the secure bundle.
    Type: Grant
    Filed: September 18, 2019
    Date of Patent: May 25, 2021
    Assignee: International Business Machines Corporation
    Inventors: Ricardo A. Golcher Ugalde, Franz F. Liebinger Portela, Meller J. Perez Nunez
  • Patent number: 11010337
    Abstract: Methods, apparatus, systems and articles of manufacture to classify a first file are disclosed herein. Example apparatus include a feature hash generator to generate respective sets of one or more feature hashes for respective features of the first file. The number of the one or more feature hashes to be generated is based on an ability of the feature to distinguish the first file from a second file. The apparatus also includes a bit setter to set respective bits of a first fuzzy hash value based on respective ones of the one or more feature hashes, a classifier to assign the first file to a class associated with a second file based on a similarity between the first fuzzy hash value and a second fuzzy hash value for a second file.
    Type: Grant
    Filed: August 31, 2018
    Date of Patent: May 18, 2021
    Assignee: McAfee, LLC
    Inventor: Di Tian
  • Patent number: 11012243
    Abstract: A method and system configured to produce a cryptographic signature on a message, under a key, at a user computer wherein the key is shared between the user computer, which stores a first key-share, and an authentication computer, which stores a second key-share and a first authentication value. The user computer encodes the message to produce a blinded message, produces the first authentication value from a user password and a secret value, and produces a second authentication value by encoding the first authentication value and a nonce. The authentication computer uses the nonce to determine if the first authentication value is correct and, if so, encodes the blinded message using the second key-share to produce a partial signature. The user computer produces a signature on the message under the key by encoding the partial signature and the message using the first key-share and an unblinding function.
    Type: Grant
    Filed: April 3, 2019
    Date of Patent: May 18, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jan L. Camenisch, Anja Lehmann, Gregory Neven
  • Patent number: 11003794
    Abstract: According to one aspect of the present disclosure, a telemetry data set, which includes a plurality of data fields associated with application operations, is collected for an application. A request for at least a portion of the telemetry data set is received and processed. Data fields in the telemetry data set that are to be anonymized are identified based on the request, with information in the identified data fields is to be anonymized according to corresponding anonymization rules. The information in each of the identified data fields is masked based on the corresponding anonymization rule for the data field, and an anonymized telemetry data set is generated. The anonymized telemetry data set includes the masked information for the identified data fields and unmasked information for other data fields indicated in the request.
    Type: Grant
    Filed: October 12, 2018
    Date of Patent: May 11, 2021
    Assignee: CA Software Österreich GmbH
    Inventors: Benedikt Eckhard, Stefan Leitich
  • Patent number: 10997290
    Abstract: A request to access one or more server resources is received from a user device. Based on the request, a purported version of a browser running on the user device is determined. The user device executes a program within the browser, according to various embodiments, which throws one or more exceptions associated with one or more particular browser versions. The results of the exceptions may be analyzed to determine whether the purported version of the browser appears to be a true version of the browser. If the analysis indicates that the purported version of the browser is not accurate, the request to access the one or more server resources may be evaluated at an elevated risk level. Inaccurately reported browser versions may indicate an attempt to gain unauthorized access to an account, and thus, being able to detect a falsely reported browser version can help improve computer security.
    Type: Grant
    Filed: October 3, 2018
    Date of Patent: May 4, 2021
    Assignee: PAYPAL, INC.
    Inventors: Yuri Shafet, Ilya Chernyakov
  • Patent number: 10999248
    Abstract: An information processing method of processing data frames flowing over an onboard network includes a frame collecting step of obtaining, from each of received data frames, a payload included in the data frame and configured of at least one field, and recording in a reception log as one record, and a field extracting step of calculating, regarding each of a plurality of payload splitting pattern candidates indicating different regions within payloads of the plurality of data frames, one or more features relating to time-sequence change of values of the payload in the region, from the plurality of records, selecting a payload splitting pattern indicating a region of a field within the payload, based on the features, and outputting field extracting results indicating the region indicated by the selected payload splitting pattern candidate, and a category of the field based on the features.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: May 4, 2021
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Takeshi Kishikawa, Manabu Maeda, Tomoyuki Haga
  • Patent number: 10992708
    Abstract: Disclosed herein are methods, systems, and processes to perform live deployment of deception computing systems. An imminent or ongoing malicious attack on a protected host in a network is detected. In response to detecting the imminent or ongoing malicious attack, personality characteristics of the protected host are cloned and a honeypot clone based on the personality characteristics is generated. The honeypot clone is then deployed in the network.
    Type: Grant
    Filed: March 28, 2019
    Date of Patent: April 27, 2021
    Assignee: Rapid7, Inc.
    Inventor: Thomas Eugene Sellers
  • Patent number: 10990663
    Abstract: There is disclosed a method of handling a sensor, comprising the steps of: challenging a subset of sensor components under uniform conditions; receiving output signal values from said subset; for each component, determining the statistical moment of order i of the temporal distribution of the output signal value of said each sensor component; and determining one or more pathological sensor components whose sum of the distances of values to other components of the subset is greater than a threshold, the distance between two sensor components being determined by the difference of the ith statistical moment values of the two temporal distributions associated to the components obtained when challenging said subset under uniform conditions. Described developments comprise the use of imaging sensors, key or identifier generation, authentication mechanisms, determination of thresholds, use of helper data files, adjustments of light sources and/or beam shaping, handling of lossy compression and of videos.
    Type: Grant
    Filed: October 16, 2018
    Date of Patent: April 27, 2021
    Assignee: SECURE-IC SAS
    Inventors: Adrien Facon, Sylvain Guilley
  • Patent number: 10986127
    Abstract: Disclosed herein are methods, systems, and processes for dynamically deploying deception computing systems based on network environment lifecycle. Lifecycle metadata associated with protected host computing devices in a network is retrieved and a configurable ratio of deception computing systems to the protected host computing devices is accessed. One or more deception computing systems are deployed in or discharged from the network based on the configurable ratio.
    Type: Grant
    Filed: March 28, 2019
    Date of Patent: April 20, 2021
    Assignee: Rapid7, Inc.
    Inventor: Thomas Eugene Sellers