Patents Examined by Paul Callahan
-
Patent number: 10057245Abstract: A method may receive, over a network and at a host's media player that is logged in to a host's media account, a play request from a guest's device. The play request may include a request to play a guest's media item from the guest's media account and may be compliant with a first protocol. In response to receiving the play request, the method may initiate a guest mode on the host's media player, log out the host's media account, and securely store the host's credentials. The method may log in the guest's media account with fewer permissions than the host's permissions. The method may play the guest's media item and establish a connection between the host's media player and the guest's device in accordance with a second protocol. Upon completion of playback, the method may log out the guest's media account and log in the host's media account.Type: GrantFiled: July 15, 2015Date of Patent: August 21, 2018Assignee: Google LLCInventors: Peter Yastrebenetsky, Vishnu Sivaji, Patrick Chilton
-
Patent number: 10038550Abstract: Instructions and logic provide secure cipher hashing algorithm round functionality. Some embodiments include a processor comprising: a decode stage to decode an instruction for a secure cipher hashing algorithm, the first instruction specifying a source data, and one or more key operands. Processor execution units, are responsive to the decoded instruction, to perform one or more secure cipher hashing algorithm round iterations upon the source data, using the one or more key operands, and store a result of the instruction in a destination register. One embodiment of the instruction specifies a secure cipher hashing algorithm round iteration using a Feistel cipher algorithm such as DES or TDES. In one embodiment a result of the instruction may be used in generating a resource assignment from a request for load balancing requests across the set of processing resources.Type: GrantFiled: August 8, 2013Date of Patent: July 31, 2018Assignee: Intel CorporationInventors: Vinodh Gopal, Wajdi K. Feghali
-
Patent number: 10032013Abstract: An image forming apparatus configured to communicate with an authentication apparatus through a network, the image forming apparatus including: an acquisition unit configured to acquire a user ID through the network; a transmission unit configured, when the user ID is acquired by the acquisition unit, to transmit an authentication request including a user ID to the authentication apparatus through the network; and a control unit configured to allow the user to log in to the image forming apparatus according to an authentication result in response to the transmitted authentication request.Type: GrantFiled: July 3, 2012Date of Patent: July 24, 2018Assignee: CANON KABUSHIKI KAISHAInventor: Takashi Osuki
-
Patent number: 9954689Abstract: A system for distributing digital content obtained from a variety of sources in a variety of formats is described that utilizes a content distribution system configured to receive and store the content files, convert the content file both into a standardized format file and into a thumbnail file, and associate the content with one or more tags that can signify characteristics or relevant facts about the content file. Users of the system select one or more tags on their remote devices in order that the content distribution system automatically transmit to the remote device thumbnail images of those content files that match the selected tags. Users can then select the thumbnail image in order to cause the system to transmit to the remote device the standardized format version of the content.Type: GrantFiled: April 13, 2017Date of Patent: April 24, 2018Assignee: Pushfor Ltd.Inventor: John Safa
-
Patent number: 9948626Abstract: Disclosed is a system comprising: an authentication datastore; a device presence engine; a traffic monitor engine; an authentication presence monitor engine; an authentication server selection engine; and a traffic routing engine. In operation: the device presence engine is configured to detect presence of a user device on a trusted network; the traffic monitor engine is configured to monitor, in response to the detection, traffic on the trusted network from the device; the authentication presence monitor engine is configured to evaluate onboarding characteristics of the user device in response to the monitoring; the authentication server selection engine is configured to select one of a plurality of authentication servers to authenticate the user device to the trusted network, the selecting based on the onboarding characteristics; and the traffic routing engine is configured to route traffic from the user device to the selected authentication server.Type: GrantFiled: September 14, 2013Date of Patent: April 17, 2018Assignee: Aerohive Networks, Inc.Inventors: Xu Zou, Kenshin Sakura, Mingliang Li
-
Patent number: 9917696Abstract: According to an example, secure key component and PIN entry may include receiving a communication from a smart card control device upon connection of the smart card control device with a secure key component and PIN entry apparatus. The communication may be related to storage of a key component on a smart card that is communicatively connectable to the apparatus. The key component may be related to a Master File Key (MFK) that is formed by using a plurality of key components including the key component. In response to the communication, the smart card may be prompted to generate the key component, or entry of the key component may be received based on actuation of a keypad of the apparatus. Further, the generated or received key component may be stored on the smart card upon connection of the smart card with the apparatus.Type: GrantFiled: August 4, 2015Date of Patent: March 13, 2018Assignee: EntlT Software, LLCInventors: Chris A. Windle, Vladimir Libershteyn, Richard Liu
-
Patent number: 9906552Abstract: System load, such as load caused by a denial of service attack, is managed by requiring those requesting access to the system to provide proof of work. A system receives, from a requestor, a request for access to the system. Before the request can be processed, the system provides a challenge to the requestor. The requestor obtains a solution to the challenge and provides proof of having obtained the solution. The system verifies the correctness of the solution and, if the correct solution is verified, the system services the request.Type: GrantFiled: February 13, 2013Date of Patent: February 27, 2018Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Nicholas Howard Brown, Gregory Branchek Roth, Gregory Alan Rubin
-
Patent number: 9858401Abstract: Methods and systems are provided for performing a secure transaction. Users register biometric and/or other identifying information. A registration code and an encryption key are generated from the biometric information and/or information obtained from a unpredictable physical process and are stored in a secure area of a device and also transmitted to a service provider. A transaction passcode generator may be computed based on the stored registration code. In at least one embodiment, a unique transaction passcode depends upon the transaction information, so that on the next step of that transaction, only that unique transaction passcode will be valid. In an embodiment, the passcode includes the transaction information. In at least one embodiment, if the transaction information has been altered relative to the transaction information stored in the device's secure area, then the transaction passcode sent during this step will be invalid and transaction may be aborted.Type: GrantFiled: July 4, 2012Date of Patent: January 2, 2018Assignee: Biogy, Inc.Inventor: Michael Stephen Fiske
-
Patent number: 9858405Abstract: A system and/or method may be provided to silently authenticate a user. An example method of silently authenticating a user includes receiving a set of device characteristics from a user device and identifying, based on the set of device characteristics, the user device. The method also includes determining whether to trust the user device and determining whether the user device is associated with a user that was previously authenticated. The method further includes in response to determining to trust the user device and that the user device is associated with the user that was previously authenticated, authenticating the user based on the previous authentication.Type: GrantFiled: June 16, 2014Date of Patent: January 2, 2018Assignee: PAYPAL, INC.Inventors: Abhijeet Arvind Ranadive, Michael Mettler, Thomas Whipple, Benjamin Mills
-
Patent number: 9860747Abstract: A system and method synchronizes network data for a device registered to a user. The network data includes a list of a plurality of known wireless networks and authentication data associated with each of the known wireless networks. The method includes establishing a connection to a server of a synchronization network. The method includes transmitting identification data to the server. The identification data indicates the network data corresponding to the user to which the device is registered. The method includes receiving the list of known wireless networks from the server via the synchronization network. The method includes receiving a secure file including the authentication data from the server via the synchronization network.Type: GrantFiled: June 7, 2013Date of Patent: January 2, 2018Assignee: APPLE INC.Inventors: Vinesh Pallen, Kapil Chhabra, Artiom Shamis, Tito Thomas
-
Patent number: 9843441Abstract: Embodiments of an invention for a compact, low power Advanced Encryption Standard circuit are disclosed. In one embodiment, an apparatus includes an encryption unit having a substitution box and an accumulator. The substitution box is to perform a substitution operation on one byte per clock cycle. The accumulator is to accumulate four bytes and perform a mix-column operation in four clock cycles. The encryption unit is implemented using optimum Galois Field polynomial arithmetic for minimum area.Type: GrantFiled: September 24, 2013Date of Patent: December 12, 2017Assignee: Intel CorporationInventors: Sanu Mathew, Vikram Suresh, Sudhir Satpathy, Mark Anders, Himanshu Kaul, Ram Krishnamurthy
-
Patent number: 9838358Abstract: An e-mail firewall applies policies to e-mail messages between a first site and second sites in accordance with administrator selectable policies. The firewall includes a simple mail transfer protocol relay for causing the e-mail messages to be transmitted between the first site and selected ones of the second sites. Policy managers enforce-administrator selectable policies relative to one or more of encryption and decryption, signature, source/destination, content and viruses.Type: GrantFiled: August 6, 2014Date of Patent: December 5, 2017Assignee: Axway Inc.Inventors: Robert D. Dickinson, III, Sathvik Krishnamurthy
-
Patent number: 9830475Abstract: An integrated collaboration platform with various communication and collaboration tools includes an analytic engine to perform communication and mood analysis of conversations among other analyses. The platform enables a method for contextual communication, in an embodiment. The method for contextual communication involves receiving an indication of sending a message from a sender to a recipient, understanding the topic of the message, analyzing various parameters associated with the sender and the recipient, and suggesting a list of messages, information, alternate communication channels, desired moods for the receiver at the time of receiving the message, and timing of delivery of the message for a desired response from the recipient.Type: GrantFiled: July 15, 2015Date of Patent: November 28, 2017Assignee: SageSurfer Inc.Inventor: Anupam Khandelwal
-
Patent number: 9830600Abstract: The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet. Trust is disclosed to be a multivalent commodity, in that the trust that is to be enhanced relates to information about the subject matter of the transactions (e.g., the suitability of the goods and services sold), the bona fides of the supplier of the goods and services, the appropriateness of a pricing structure for a particular transaction or series of transactions, a quantum of additional transactional value that may be imparted to the transactional relationship, security of information exchange, etc.Type: GrantFiled: March 24, 2015Date of Patent: November 28, 2017Assignee: WISTARIA TRADING LTDInventor: Scott A. Moskowitz
-
Patent number: 9805172Abstract: Generic rights expression language allowing interoperability across different computing environments including resource usage of different applications. A formal framework for usage management provides scaffolding upon which interoperable usage management systems can be built. Certain features of the framework are standardized, such as the operational semantics, including areas free of standards that necessitate choice and innovation to achieve a balance of flexibility and usability for interoperability in usage management systems.Type: GrantFiled: November 17, 2010Date of Patent: October 31, 2017Assignee: STC.UNMInventors: Gregory L. Heileman, Pramod A. Jamkhedkar, Christopher C. Lamb
-
Patent number: 9780946Abstract: A method in an elliptic curve cryptographic system, the method being executed by an electronic device and including a multiplication operation of multiplying a point of an elliptic curve by a scalar number, the point having affine coordinates belonging to a Galois field, the multiplication operation including steps of detecting the appearance of a point at infinity during intermediate calculations of the multiplication operation, and of activating an error signal if the point at infinity is detected and if the number of bits of the scalar number processed by the multiplication operation is lower than the rank of the most significant bit of an order of a base point of the cryptographic system.Type: GrantFiled: August 5, 2015Date of Patent: October 3, 2017Assignee: Inside SecureInventor: Vincent Dupaquis
-
Patent number: 9736131Abstract: A network service may receive an authentication request from a subscriber device, the authentication request including a user credential and a device identifier of the subscriber device. The service may validate the authentication request based at least in part on the included user credential, and when the authentication request is validated, provide an authentication reply to the subscriber device indicative of allowance of the subscriber device to access the service, the authentication reply including a hash token keyed to the device identifier of the subscriber device for use in validation of subsequent authentication requests. The service may further generate a second hash token based on the device identifier of a subsequent authentication request; validate a subsequent authentication request according to the hash token and the second hash token; and when the subsequent authentication request is validated, allowing the subscriber device to access the service.Type: GrantFiled: September 24, 2013Date of Patent: August 15, 2017Assignee: Cellco PartnershipInventors: Mohammad Raheel Khalid, Ansar Kassim
-
Patent number: 9710645Abstract: Systems and methods to detect and neutralize malware infected electronic communications are described. The system may receive a request for interface information from over a network from a client machine. In response to receiving the request the system may generate the interface information to include at least one input mechanism to receive user information from the user and countermeasure information for utilization on the client machine to detect whether the interface information is modified on the client machine to receive user information from the user that is not authorized. Finally, the system may communicate the interface information, over the network, to the client machine.Type: GrantFiled: December 23, 2010Date of Patent: July 18, 2017Assignee: eBay Inc.Inventor: Joren Bartley McReynolds
-
Patent number: 9680842Abstract: Techniques for inferring the existence of suspicious software by detecting multiple name server requests for the same sets of non-existent domains. Implementations can allow for detecting the existence of malware or other suspicious software without requiring reverse engineering of the malware's domain generation algorithm.Type: GrantFiled: August 9, 2013Date of Patent: June 13, 2017Assignee: VERISIGN, INC.Inventors: Matthew Thomas, Michael Noll
-
Patent number: 9660821Abstract: A system for distributing digital content obtained from a variety of sources in a variety of formats is described that utilizes a content distribution system configured to receive and store the content files, convert the content file both into a standardized format file and into a thumbnail file, and associate the content with one or more tags that can signify characteristics or relevant facts about the content file. Users of the system select one or more tags on their remote devices in order that the content distribution system automatically transmit to the remote device thumbnail images of those content files that match the selected tags. Users can then select the thumbnail image in order to cause the system to transmit to the remote device the standardized format version of the content.Type: GrantFiled: June 13, 2014Date of Patent: May 23, 2017Assignee: Pushfor, Ltd.Inventor: John Safa