Patents Examined by Peter Poltorak
-
Patent number: 9722797Abstract: A method for generating a digital signature includes grouping, with a processing device, a first record with a second record, and generating a first digital signature based at least in part on the first record and the second record.Type: GrantFiled: September 29, 2014Date of Patent: August 1, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John C. Dayka, Anthony T. Sofia
-
Patent number: 9716692Abstract: A technology-agnostic and protocol-agnostic system for transferring data between an enterprise, such as a financial institution or the like and external entities, such as commercial banking customers and the like. The embodiments described provide the user with a data transfer solution that is compatible with all major operating systems, supports mobile platforms and allows for local data transfer, as well as, data transfer from cloud services and cloud connection services. The comprehensive nature of the application provides for applicable data transfer amongst all of the different services provided by the enterprise and provides the user/external entity with a streamlined means for transferring data to and from the enterprise. The application minimizes external entity involvement from an Information Technology (IT) standpoint, such that any user can efficiently, effectively and reliably transfer data to and from an enterprise with minimal risk and high confidence.Type: GrantFiled: January 1, 2015Date of Patent: July 25, 2017Assignee: BANK OF AMERICA CORPORATIONInventors: Sorin N. Cismas, Manu Jacob Kurian
-
Patent number: 9716728Abstract: A method of managing keys and policies is provided. The method includes communicating policies from a key and policy manager in an enterprise environment to an agent in a cloud environment. The method includes generating keys at the key and policy manager and distributing one or more of the keys to computing or communication devices in the enterprise environment, in accordance with the policies. The method includes enforcing the policies in the cloud environment via an application of the policies by the agent, wherein at least one method operation is executed through a processor.Type: GrantFiled: September 10, 2013Date of Patent: July 25, 2017Assignee: Vormetric, Inc.Inventor: Derek Tumulak
-
Patent number: 9710617Abstract: Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys.Type: GrantFiled: January 18, 2013Date of Patent: July 18, 2017Assignee: Rubicon Labs, Inc.Inventor: William V. Oxford
-
Patent number: 9705677Abstract: Embodiments of systems and methods which provide highly specific control over the execution of general-purpose code block are disclosed. These embodiments may allow the exact circumstances under which a given code block is allowed to execute to be determined with specificity. Such a control mechanism may be coupled with embodiments of a data hiding system and method, based for example, on an ordered execution of a set of code segments implemented via recursive execution. When embodiments of these systems and methods are utilized together an unencumbered generality as well as a level of protection against attack that surpasses many other security systems may be obtained.Type: GrantFiled: April 2, 2013Date of Patent: July 11, 2017Assignee: Rubicon Labs, Inc.Inventor: William V. Oxford
-
Patent number: 9692782Abstract: Systems and methods for detecting malicious resources by analyzing communication between multiple resources coupled to a network are provided. According to one embodiment, a method is performed for client reputation monitoring. A monitoring unit within a network observes activities relating to multiple monitored devices within the network. For each observed activity, the monitoring unit assigns a score to the observed activity based upon a policy of multiple polices established within the monitoring unit. For each of the monitored devices, the monitoring unit maintains a current reputation score for the monitored device based upon the score and a historical score associated with the monitored device. The monitoring unit classifies one of the monitored devices as potentially being a malicious resource based upon its current reputation score.Type: GrantFiled: February 3, 2015Date of Patent: June 27, 2017Assignee: Fortinet, Inc.Inventor: Darren W. Turnbull
-
Patent number: 9684788Abstract: A method is provided to instrument applications with an instrumentation policy that is visually configurable and allows for run-time modifications of the policy. Instrumentation is achieved without modifying the source code of the applications. Modification of the instrumentation policy of an application is applied without re-compiling, re-deploying, and re-provisioning the application. The instrumentation tracks the flow of values at run time throughout the execution of an application and fixes any security violation automatically by dynamically modifying any value that violates integrity or confidentiality.Type: GrantFiled: June 29, 2015Date of Patent: June 20, 2017Assignee: International Business Machines CorporationInventors: Pietro Ferrara, Marco Pistoia, Omer Tripp, Petar I. Tsankov
-
Patent number: 9667647Abstract: Systems and methods for detecting malicious resources by analyzing communication between multiple resources coupled to a network are provided. According to one embodiment, a method of client reputation monitoring is provided. A monitoring unit executing on a network security device operable to protect a private network observes activities relating to multiple monitored devices within the private network. For each of the observed activities, a score is assigned by the monitoring unit based upon a policy of multiple polices established within the monitoring unit. For each of the monitored devices, a current reputation score is maintained by the monitoring unit based upon the score and a historical score associated with the monitored device. A monitored is classified by the monitoring unit as potentially being a malicious resource based upon the current reputation score for the monitored device.Type: GrantFiled: March 11, 2015Date of Patent: May 30, 2017Assignee: Fortinet, Inc.Inventor: Darren W. Turnbull
-
Patent number: 9660974Abstract: A device fingerprinting system provides an additional factor of authentication. A user device may be redirected, along with user ID parameters, to authentication system. The user device may be sent instructions to execute that collect and send back device characteristic information to the authentication system. The authentication can create a unique fingerprint of the device, and determine if the fingerprint has been seen before. If seen before, the authentication system may send back an authentication token indicating the additional factor of authentication was a success. If the fingerprint has not been seen previously, the authentication system may conduct a one-time password authentication as the additional factor. If successful, the fingerprint may be stored in association with the user device for future authentication as an additional factor.Type: GrantFiled: February 13, 2015Date of Patent: May 23, 2017Assignee: SecureAuth CorporationInventors: Garret Florian Grajek, Chihwei Liu, Allen Yu Quach, Jeffrey Chiwai Lo
-
Patent number: 9660990Abstract: A root user identifier of a computing system is disabled. Thereafter, and in response to determining that a problem with the computing system requires root privileges to the computing system to solve, a code patch for installation on the computing system is received from a third party. The code patch is installed on the computing system, resulting in a user identifier temporarily having the root privileges to the computing system. The user identifier is different than the root user identifier is. A password for the user identifier is provided to the third party to permit the third party to solve the problem with the computing system using the root privileges, via the user identifier temporarily having the root privileges to the computing system. The code patch is computer code installable on the computing system.Type: GrantFiled: April 17, 2015Date of Patent: May 23, 2017Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Thomas K. Clark, Neeta Garimella, Bernhard J. Klingenberg
-
Patent number: 9652618Abstract: Example embodiments are disclosed herein for asset architecture evaluation and security enforcement within an enterprise computing platform. One example method includes receiving a proposed architecture for evaluation, wherein the proposed architecture for evaluation relates to integration of an asset into the enterprise computing platform. This example method further includes dynamically evaluating, by risk evaluation circuitry, the proposed architecture against embedded security policies, standards, baselines, or patterns established for the enterprise computing platform. In addition, the example method includes, in an instance in which dynamic evaluation of the proposed architecture identifies security gaps, determining, by the risk evaluation circuitry, changes to the proposed architecture that would remediate the identified security gaps.Type: GrantFiled: June 10, 2016Date of Patent: May 16, 2017Assignee: Optum, Inc.Inventor: Phillip F Lerner
-
Patent number: 9645794Abstract: A method of performing finite field addition and doubling operations in an elliptic curve cryptography (ECC) authentication scheme as a countermeasure to side-channel attack. The addition and doubling operations are executed using atomic patterns that involve the same sequence and number of operation types, so that the noise consumption and electromagnetic emanation profile of circuitry performing the operations is identical regardless of operation. A subtraction operation using such an atomic pattern is also disclosed.Type: GrantFiled: May 29, 2015Date of Patent: May 9, 2017Assignee: TEXAS INSTRUMENTS INCORPORATEDInventor: Eric Thierry Peeters
-
Patent number: 9641540Abstract: A method is performed at a management device to manage multiple network security devices over a network. The security devices are configured to control access to network accessible resources. A query is received. In response to the received query, a respective native security rule that references the specific resource is collected from each security device, where each native security rule is based on a respective native rule model associated with the security device from which the native security rule is collected. Each native security rule is translated into a respective normalized rule that is based on a generic rule model. The respective normalized rules are compared to each other to generate compare results. Based on the compare results, an indication of whether each security device allows or blocks access to the specific resource is generated.Type: GrantFiled: May 29, 2015Date of Patent: May 2, 2017Assignee: Cisco Technology, Inc.Inventors: Yedidya Dotan, Jason M. Perry, Denis Knjazihhin, Zachary D. Siswick, Sachin Vasant
-
Patent number: 9642005Abstract: A computer-readable medium embodies a computer program for authenticating a user. The computer program comprises computer-readable program code for: generating a first message including an identifier for a session, sending the first message through an interface associated with the session, receiving a response message including the identifier for the session, a user identifier, and at least a portion encrypted using a private key associated with a mobile device associated with the user, and authenticating the user in response to identifying that the response message includes at least the portion encrypted using the private key associated with the mobile device.Type: GrantFiled: May 21, 2012Date of Patent: May 2, 2017Assignee: Nexiden, Inc.Inventors: Klaus S. Fosmark, William A. Perry, Jr.
-
Patent number: 9641527Abstract: An information processing apparatus, method, and recording medium. The information processing apparatus includes processing circuitry that starts second software stored in a second medium to execute a second maintenance program when a type of a first medium is a maintenance type, and starts a first software stored in the first medium to execute a first maintenance program when the type of the first medium is not the maintenance type, the processing circuitry does not start the second software when the type of the first medium is not the maintenance type.Type: GrantFiled: February 11, 2015Date of Patent: May 2, 2017Assignee: RICOH COMPANY, LTD.Inventor: Hiroaki Uchiyama
-
Patent number: 9619671Abstract: A platform including a security system is described. The security system comprises, in one embodiment, a multi-state system having a plurality of modes, available whenever the platform has a source of power. The modes comprise an unarmed mode, in which the security system is not protecting the platform, an armed mode, in which the platform is protected, the armed mode reached from the unarmed mode, after an arming command, and a suspecting mode, in which the platform is suspecting theft, the suspecting mode reached from the armed mode, when a risk behavior is detected.Type: GrantFiled: December 22, 2011Date of Patent: April 11, 2017Assignee: Intel CorporationInventors: Michael Berger, Mukesh Kataria, Jeffrey M. Tripp, Yasser Rasheed, David Birnbaum, Hung P. Huynh, Eli Kupermann, Mazen G. Gedeon, Joshua M. Resch
-
Patent number: 9614830Abstract: A relay apparatus includes a storage unit, a first reception unit, a first request unit, a second reception unit, a second request unit, a third reception unit, and an access unit. The storage unit stores, for each user, authorization information for accessing a service providing apparatus. The first reception unit receives from a client apparatus an access request including a request for access to the service providing apparatus and identification information for identifying the user. The first request unit issues an acquisition request for the authorization information to a different relay apparatus. The second reception unit receives authorization information transmitted from the different relay apparatus. The second request unit requests the different relay apparatus to update the received authorization information. The third reception unit receives updated authorization information transmitted from the different relay apparatus.Type: GrantFiled: February 12, 2015Date of Patent: April 4, 2017Assignee: FUJI XEROX CO., LTD.Inventor: Yutaka Sakai
-
Patent number: 9589154Abstract: An improved secure programming technique involves reducing the size of bits programmed in on-chip secret non-volatile memory, at the same time enabling the typical secure applications supported by secure devices. A technique for secure programming involves de-coupling chip manufacture from the later process of connecting to ticket servers to obtain tickets. A method according to the technique may involve sending a (manufacturing) server signed certificate from the device prior to any communication to receive tickets. A device according to the technique may include chip-internal non-volatile memory to store the certificate along with the private key, in the manufacturing process.Type: GrantFiled: July 7, 2014Date of Patent: March 7, 2017Assignee: Acer Cloud Technology Inc.Inventors: Pramila Srinivasan, John Princen
-
Patent number: 9584489Abstract: Controlling access resource functions. Establishing, by a resource access manager, enrollment information (e) for each of a plurality of users. Encrypting, by the access manager, each received (e) in an authorization data item for the corresponding user. Transmitting, by the access manager, each authorization data item to a corresponding user device. Receiving, by a resource control point, from a user device, a request for access to a function of the resource, the request for access comprising the received authorization data item and verification information (v). Decrypting, by the control point, the received authorization data item to extract (e). Determining, by the control point, a similarity measure between (v) and (e). For a determined similarity measure greater than or equal to a threshold, authorizing, by the control point, the request for access. For a determined similarity measure less than the threshold, denying, by control point, the request for access.Type: GrantFiled: May 29, 2015Date of Patent: February 28, 2017Assignee: GOOGLE INC.Inventors: Roger Trias Sanz, Erwin Aitenbichler
-
Patent number: 9571452Abstract: A firewall uses a variety of techniques to obtain a useful domain name from a network request, that is, a domain name that facilitates the accurate enforcement of domain-based security rules for network traffic at the firewall. If the network request includes an Internet Protocol (IP) address instead of the domain name, the firewall may begin with a reverse domain name lookup. If this technique fails to adequately resolve the domain name, then the firewall may attempt a hypertext transfer protocol (HTTP) GET request to the IP address and investigate the header for useful domain name information. The firewall may also or instead initiate a secure connection to the IP address and analyze a certificate returned from the destination for the presence of domain name information. These measures can produce one or more domain names that can be collectively analyzed to select a suitable domain name for the application of a domain-based security rule or policy by the firewall.Type: GrantFiled: June 29, 2015Date of Patent: February 14, 2017Assignee: Sophos LimitedInventor: Jonathan Egan Salcedo