Patents Examined by Narciso Victoria
  • Patent number: 10198588
    Abstract: The present invention provides a system and automated methods to enable a collection of electronic information to be divided into multiple asymmetric scrambled subsets, stored across a plurality of disparate apparatuses, and reconstructed as needed. The present invention provides automated methods to adjust the relative size of the scrambled subsets based upon characteristics such as performance, cost and available space of the apparatuses on which the subsets are stored. The present invention enables the scrambled subsets of electronic information to be created, accessed and manipulated as though they are located on a local device in an integrated and unscrambled state. The present invention enables fault tolerance and enhanced performance through optional redundancy and parity capabilities. The present invention generates an electronic blueprint used to deconstruct the original collection of electronic information and reconstruct it as needed.
    Type: Grant
    Filed: June 3, 2015
    Date of Patent: February 5, 2019
    Inventor: Christopher Ralph Tridico
  • Patent number: 10104098
    Abstract: Systems and methods can support threat detection using electromagnetic signatures. One or more sensors comprising radio receivers may receive radio frequency signals within an electromagnetic environment. Radio frequency signatures may be identified from one or more of the radio frequency signals. A baseline electromagnetic environment may be established from the radio frequency signatures. The radio frequency signatures may be monitored over time to detect variations from the baseline electromagnetic environment. Variations in the electromagnetic environment may be evaluated against stored threat signatures. Operator interfaces may present indications of threats determined from evaluating the variations in the electromagnetic environment.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: October 16, 2018
    Assignee: Bastille Networks, Inc.
    Inventors: Robert John Baxley, Christopher Jay Rouland
  • Patent number: 10083311
    Abstract: A method for managing a file, including receiving a request to encrypt the file, the request identifying a target location; determining a plurality of coordinates based on the target location; generating a cryptographic key based on the plurality of coordinates; generating an encrypted version of the file using the cryptographic key; and storing the encrypted version of the file.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: September 25, 2018
    Assignee: Konica Minolta Laboratory U.S.A., Inc.
    Inventor: Kurt N. Nordback
  • Patent number: 10073984
    Abstract: A rights-based system is described in which vouchers are employed for creating, managing, distributing, and redeeming rights in digital contexts. A voucher is a digital, possession-based rights representation. An authorization component of the system validates the vouchers and issues corresponding tokens. Access to digital resources is provided in response to presentation of the tokens which are validated by matching voucher refresh values to corresponding values maintained by the system. New refresh values are generated and inserted in the vouchers each time they are redeemed.
    Type: Grant
    Filed: October 19, 2016
    Date of Patent: September 11, 2018
    Assignee: API Market, Inc.
    Inventors: Stefan Roever, David Watson
  • Patent number: 10069836
    Abstract: Apparatus and methods for protected content access, browsing and transfer over a network. In one embodiment, the network comprises a premises (e.g., residential) Local Area Network (LAN), and the apparatus comprises a server and renderer consumer premise equipment (CPE). The renderer CPE scans the network to search for a server CPE that implements a compatible security framework. The renderer authenticates itself with the server, and the server allows content browsing and selection access only to an authorized and authenticated renderer. A negotiation and exchange protocol comprises messages exchanged between the renderer and the server that include one or more of device identification, encryption key exchange, digital certificates and information regarding security package used by each CPE.
    Type: Grant
    Filed: August 21, 2017
    Date of Patent: September 4, 2018
    Assignee: Time Warner Cable Enterprises LLC
    Inventors: Chris Cholas, William Helms, John Carlucci, Jeffrey Markley
  • Patent number: 10055576
    Abstract: Systems and methods for a security tool that verifies the security of a software package. An example method may involve identifying a plurality of components contained in a software package comprising one of a JAR file, an Android application package, a docker image, a container file, or a virtual machine image; comparing the components contained in the software package to a list of known components; classifying the software package as insecure when at least one of the components matches an insecure component, or as secure when each of the compared components matches a corresponding secure component on the list of known components; preventing addition of the software package to a software repository when the software package is classified as insecure; and when insecure, providing an interface to enable a user to request the components of the software package be added as a secure component on the list of known components.
    Type: Grant
    Filed: October 10, 2017
    Date of Patent: August 21, 2018
    Assignee: Red Hat, Inc.
    Inventors: Steve Bradford Milner, James Robert Bowes
  • Patent number: 10009173
    Abstract: Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure user authentication, and secure payment via mobile devices and via payment terminals. A computing device includes: a secure storage unit to securely store a confidential data item; a non-secure execution environment to execute program code, the program code to transport to a remote server a message; a secure execution environment (SEE) to securely execute code, the SEE including: a rewriter module to securely obtain the confidential data item from the secure storage, and to securely write the confidential data item into one or more fields in said message prior to its encrypted transport to the remote server.
    Type: Grant
    Filed: April 15, 2016
    Date of Patent: June 26, 2018
    Assignee: ARM LIMITED
    Inventors: Hagai Bar-El, Yaacov Sella, Alon Ziv, Roni Sasson
  • Patent number: 10009320
    Abstract: Methods and systems for deploying management tunnels between managed and managing devices are provided. According to one embodiment, the use of PKI-authenticated serial numbers within network devices manufactured by a particular manufacturer enables one-step provisioning of one or more managed devices. A managed device is provisioned with the serial number of a management device manufactured by the particular manufacturer. When the managed device is installed within a network, the management device is located by the managed device with the assistance of a locator server and the managed device initiates establishment of an encrypted management tunnel with the management device.
    Type: Grant
    Filed: November 18, 2017
    Date of Patent: June 26, 2018
    Assignee: Fortinet, Inc.
    Inventor: Andrew Krywaniuk
  • Patent number: 9985969
    Abstract: Techniques are described for managing access to computing-related resources that, for example, may enable multiple distinct parties to independently control access to the resources (e.g., such that a request to access a resource succeeds only if all of multiple associated parties approve that access). For example, an executing software application may, on behalf of an end user, make use of computing-related resources of one or more types that are provided by one or more remote third-party network services (e.g., data storage services provided by an online storage service)—in such a situation, both the developer user who created the software application and the end user may be allowed to independently specify access rights for one or more particular such computing-related resources (e.g., stored data files), such that neither the end user nor the software application developer user may later access those resources without the approval of the other party.
    Type: Grant
    Filed: March 29, 2013
    Date of Patent: May 29, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Mark Joseph Cavage, John Cormie, Nathan R. Fitch, Don Johnson, Peter Sirota
  • Patent number: 9959429
    Abstract: Methods and systems for masking certain cryptographic operations in a manner designed to defeat side-channel attacks are disclosed herein. Squaring operations can be masked to make squaring operations indistinguishable or less distinguishable from multiplication operations. In general, squaring operations are converted into multiplication operations by masking them asymmetrically. Additional methods and systems are disclosed for defeating DPA, cross-correlation, and high-order DPA attacks against modular exponentiation.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: May 1, 2018
    Assignee: CRYPTOGRAPHY RESEARCH, INC.
    Inventor: Joshua M. Jaffe
  • Patent number: 9948608
    Abstract: Systems and methods are described for using a client agent operating in a virtual private network environment to intercept HyperText Transfer Protocol (HTTP) communications. Methods include: intercepting at the network layer, by a client agent executing on a client, an HTTP request from an application executing on the client; modifying the HTTP request; and transmitting, via a transport layer connection, the modified HTTP request to a server. Additional methods may comprise adding, removing, or modifying at least one cookie in the HTTP request. Still other methods may comprise modifying at least one name-value pair contained in the HTTP request. Corresponding systems are also described.
    Type: Grant
    Filed: January 12, 2015
    Date of Patent: April 17, 2018
    Assignee: Citrix Systems, Inc.
    Inventors: Junxiao He, Charu Venkatraman, Ajay Soni
  • Patent number: 9942250
    Abstract: Electronic appliances, computer-implemented systems, non-transitory media, and methods are provided to identify risky network activities using intelligent algorithms. The appliances, systems, media, and methods enable rapid detection of risky activities.
    Type: Grant
    Filed: February 26, 2015
    Date of Patent: April 10, 2018
    Assignee: NORSE NETWORKS, INC.
    Inventors: Tommy Stiansen, Alfred Perlstein, Sheldon Foss, Jr.
  • Patent number: 9922200
    Abstract: Systems, methods, and computer-readable storage media are provided for securely storing and accessing content within a public cloud. A processor manufacturer provides processors having secure enclave capability to a cloud provider. The provider makes available a listing of processor identifiers (CPUIDs) for processors available for storing content and having secure enclave capability. A content owner provides CPUIDs for desired processors from the listing to the manufacturer which provides the content owner with a processor-specific public code encryption key (CEK) for encrypting content to be stored on each processor identified. Each processor is constructed such that content encrypted with the public CEK may only be decrypted within a secure enclave thereof. The content owner encrypts the desired content with the public CEK and returns the encrypted content and the CPUID for the appropriate processor to the cloud provider. The cloud provider then stores the encrypted content on the particular processor.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: March 20, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Galen Clyde Hunt, Mark Eugene Russinovich
  • Patent number: 9910980
    Abstract: Systems and methods that use probabilistic grammatical inference and statistical data analysis techniques to characterize the behavior of systems in terms of a low dimensional set of summary variables and, on the basis of these models, detect anomalous behaviors are disclosed. The disclosed information-theoretic system and method exploit the properties of information to deduce a structure for information flow and management. The properties of information can provide a fundamental basis for the decomposition of systems and hence a structure for the transmission and combination of observations at the desired levels of resolution (e.g., component, subsystem, system).
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: March 6, 2018
    Assignee: Cyberricade, Inc.
    Inventors: Richard M. Kolacinski, Barry D. Angeline, Kenneth A. Loparo
  • Patent number: 9906553
    Abstract: A web browser detects a network privacy threat associated with communications for retrieving a resource from a remote system before the resource is retrieved from the remote system. In connection with detecting the network privacy threat, the web browser automatically retrieves personal information associated with a user of the computing device, generates a privacy threat warning comprising a representation of the retrieved personal information, a representation of the remote system, and a representation of a third-party threat positioned in-between the representation of the personal information and the representation of the remote system, and provides the privacy threat warning for display at the computing device before retrieving the resource from the remote system.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: February 27, 2018
    Assignee: Google LLC
    Inventors: Alex Neely Ainslie, Alan Bettes
  • Patent number: 9906324
    Abstract: Selective deciphering of a received signal, as taught herein, provides a number of advantages, including greater efficiency through the elimination or at least reduction of wasted decoding cycles. The technique, such as practiced in a user equipment or other wireless communication device, capitalizes on the advantageous recognition herein that the demodulation results obtained for at least some types of received data blocks may be inspected or otherwise evaluated for characteristic patterns that are indicative of whether the data block was or was not ciphered for transmission. That evaluation informs the selective deciphering decision.
    Type: Grant
    Filed: January 14, 2013
    Date of Patent: February 27, 2018
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Ravitej Ballakur, Sajal Kumar Das, Suyog Moogi
  • Patent number: 9906537
    Abstract: A system, method, and computer program product are provided for conditionally performing an action based on an attribute. In use, at least one attribute associated with an object is determined. Additionally, an event associated with the object is identified. Further, at least one action is conditionally performed in association with the event, based on the at least one attribute.
    Type: Grant
    Filed: January 12, 2015
    Date of Patent: February 27, 2018
    Assignee: McAfee, LLC
    Inventors: Joel R. Spurlock, Gregory William Dalcher
  • Patent number: 9900768
    Abstract: Embodiments of the present invention provide a method and a device for synchronizing an uplink ciphering parameter in unacknowledged mode. The method for synchronizing an uplink ciphering parameter in unacknowledged mode includes: sending an indication message to a terminal when detecting that an unrecoverable error occurs in an uplink packet or that the uplink packet is invalid, where the indication message is used to instruct the terminal to initialize an uplink ciphering parameter; receiving a response message sent by the terminal; and initializing the uplink ciphering parameter according to an initial value of the ciphering parameter. The embodiments of the present invention solve a service defect, namely, a break of the communication link caused by synchronization of an uplink ciphering parameter between the terminal and the radio network controller in unacknowledged mode, and shorten the time of synchronizing the uplink ciphering parameter without interrupting the service.
    Type: Grant
    Filed: June 3, 2013
    Date of Patent: February 20, 2018
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Xiaoxiao Zheng, Yinghong Yang, Li Feng, Xiaoying Xu, Zhufen Fu, Lunfeng Yu, Yafei Sun
  • Patent number: 9900340
    Abstract: A method includes instantiating, in response to a request by an executing application, an input data object with one or more uninitialized fields and traversing a path toward a sink in the executing application to a branching point of the executing application. In response to reaching the branching point, one or more parameters are provided for some or all of the one or more uninitialized fields of the input data object, wherein the one or more parameters were determined prior to beginning of execution of the executing application to cause a branch to be taken by the executing application toward the sink. The path is traversed toward the sink at least by following the branch in the executing application. Apparatus and computer program products are also disclosed.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: February 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Marco Pistoia, Omer Tripp
  • Patent number: 9898374
    Abstract: A primary storage controller determines that a quarantined area of the primary storage controller cannot be repaired, wherein the quarantined area is infected with a virus. A query is sent to a secondary storage controller to determine whether the secondary storage controller has data that is free of virus in an area of the secondary storage controller corresponding to the quarantined area of the primary storage controller. In response to receiving a notification that the secondary storage controller has data that is free of virus, the primary storage controller is repaired to remove the virus.
    Type: Grant
    Filed: April 8, 2014
    Date of Patent: February 20, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Juan A. Coronado, Sara M. Coronado, Christina A. Lara, Lisa R. Martinez