Patents Examined by Phy Anh T Vu
  • Patent number: 10873842
    Abstract: A wireless device receives, from a configurator device, a managed object that includes information indicating which of different provisioning techniques is to be used to provision the wireless device. The wireless device determines, based on the information, a particular provisioning technique of the different provisioning techniques to use.
    Type: Grant
    Filed: April 8, 2016
    Date of Patent: December 22, 2020
    Assignee: BlackBerry Limited
    Inventors: Stephen McCann, Michael Peter Montemurro
  • Patent number: 10833762
    Abstract: An information transmitting method and device, and an information receiving method and device are provided. The information transmitting method includes: obtaining authentication information; converting the authentication information into a binary sequence; encoding the binary sequence into optical signals based on a correspondence between a binary number and an optical signal; and transmitting the optical signals to a receiving device, wherein the receiving device receives the optical signals, obtains the authentication information carried in the optical signals, and performs an information authentication based on the authentication information.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: November 10, 2020
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventors: Shihai Cheng, Jinhai Liu, Anqi Ren, Yaobo Hua, Liangliang Fan, Kai Liu, Xiangyao Lin, Chenglin Liu, Bin Huang
  • Patent number: 10778436
    Abstract: An active security token includes: a sentry that controls access to token data disposed on the active security token through verification of user authentication data; the token data including: reference authentication data for verification of user authentication data; and a security phantom including a password file, the security phantom being a public key certificate or a biometric template.
    Type: Grant
    Filed: August 23, 2017
    Date of Patent: September 15, 2020
    Assignee: GOVERNMENT OF THE UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF COMMERCE
    Inventor: James F. Dray, Jr.
  • Patent number: 10764032
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for obtaining blockchain information.
    Type: Grant
    Filed: January 14, 2020
    Date of Patent: September 1, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Shifeng Wang
  • Patent number: 10764275
    Abstract: A new controller (supporting device authentication) is a controller which performs encrypted communication with a device which has succeeded in mutual authentication using an electronic certificate, and the controller includes: a determining unit that determines whether or not a communication target device with which communication is to be performed is an authentication support device that supports the mutual authentication; a functional restriction unit that, when the communication target device is determined not to be the authentication support device by the determining unit, imposes a functional restriction on one or more functions of the communication target device which are operable by the new controller (supporting device authentication); and a communication unit which performs communication in plain text with the communication target device with the functional restriction imposed by the functional restriction unit.
    Type: Grant
    Filed: August 4, 2016
    Date of Patent: September 1, 2020
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventors: Tomoki Takazoe, Yoichi Masuda, Hideki Matsushima, Yuji Unagami
  • Patent number: 10754974
    Abstract: Systems, methods, and devices for implementing secure views for zero-copy data sharing in a multi-tenant database system are disclosed. A method includes generating a share object in a first account comprising a share role. The method includes associating view privileges for the share object such that an underlying detail of the share object comprises a secure view definition. The method includes granting, to a second account, cross-account access rights to the share role or share object in the first account. The method includes receiving a request from the second account to access data or services of the first account and providing a response to the second account based on the data or services of the first account. The method is such that the underlying detail of the share object that comprises the secure view definition is hidden from the second account and visible to the first account.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: August 25, 2020
    Assignee: Snowflake Inc.
    Inventors: Martin Hentschel, Allison Waingold Lee, Robert Muglia, Peter Povinec
  • Patent number: 10754814
    Abstract: A system and method for performing image-based authentication requires users to enter an image-based password in order to access a secure system or network. A user may identify at least one password image, and may enter the system or network if he or she selects each of the password images shown in a group of images on the display. Additionally, the user may designate specific locations for multiple password images on a user interface, and a user may enter the system or network if he or she locates each of the password images in its designated location on the user interface.
    Type: Grant
    Filed: December 22, 2011
    Date of Patent: August 25, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Jin Li, Siobhan M. O'Toole, Yi Sun, Nghia C. Tran, Mehmet T. Cezik, Jiun-Hung Chen, Srinivasan Krishnan, Yilun Cui
  • Patent number: 10728229
    Abstract: The objective of the present disclosure is to provide a method and device for communicating securely between a T-Box device and an ECU device in an Internet of Vehicles system. Specifically, sending, by a T-Box device, a first piece of information to a corresponding ECU device; generating, by the ECU device, a second piece of information; generating, by the T-Box device, a third piece of information; generating, by the T-Box device, a first key; encrypting, by the T-Box device, a to-be-issued instruction based on the first key; generating, by the ECU device, a second key; and decrypting, by the ECU device, the encrypted instruction based on the second key to obtain the instruction. Compared with the prior art, the present disclosure achieves the secure communication between the T-Box device and the ECU device.
    Type: Grant
    Filed: January 24, 2018
    Date of Patent: July 28, 2020
    Assignee: BEIJING BAIDU NETCOM SCIENCE AND TECHNOLOGY CO., LTD.
    Inventors: Mingwei Wang, Shaohua Zhang, Peng Yun
  • Patent number: 10698989
    Abstract: Systems and methods verifying a user during authentication of an integrated device. In one embodiment, the system includes an integrated device and an authentication unit. The integrated device stores biometric data of a user and a plurality of codes and other data values comprising a device ID code uniquely identifying the integrated device and a secret decryption value in a tamper proof format, and when scan data is verified by comparing the scan data to the biometric data, wirelessly sends one or more codes and other data values including the device ID code. The authentication unit receives and sends the one or more codes and the other data values to an agent for authentication, and receives an access message from the agent indicating that the agent successfully authenticated the one or more codes and other data values and allows the user to access an application.
    Type: Grant
    Filed: February 20, 2016
    Date of Patent: June 30, 2020
    Assignee: Proxense, LLC
    Inventor: John J. Giobbi
  • Patent number: 10680832
    Abstract: A computer apparatus for transmitting a certificate to a device in an installation is provided. The computer apparatus has a coupling unit for establishing and breaking a connection between the computer apparatus and the device, a processing unit for transmitting a certificate to the device by means of the established connection, wherein the certificate is valid for a first time period and is issued by a certification authority based on a certificate request, and a receiving unit for receiving a further certificate request from the device by means of the established connection, wherein the further certificate request is designed to request a certificate for a second time period, wherein the coupling unit is designed to break the connection after the certificate is transmitted and the further certificate request is received.
    Type: Grant
    Filed: August 23, 2017
    Date of Patent: June 9, 2020
    Assignee: SIEMENS SCHWEIZ AG
    Inventors: Hendrik Brockhaus, Jens-Uwe Bußer, Jürgen Gessner
  • Patent number: 10678933
    Abstract: A method, system and computer-usable medium are disclosed for injecting functionality into a security intelligence platform, comprising: providing the security intelligence platform with a plurality of backend endpoints; generating a modification to the security intelligence platform according to an application framework, the modification comprising metadata associated with functionality, the metadata corresponding to a predefined format; and, merging the modification with the security intelligence platform via a secure container system container.
    Type: Grant
    Filed: October 18, 2018
    Date of Patent: June 9, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rory F. Bray, Jason D. Keirstead, Declan J. Wilson
  • Patent number: 10650169
    Abstract: There is provided an example memory system comprising a plurality of memory modules, each memory module comprising a persistent memory to store root key information and encrypted primary data; a volatile memory to store a working key for encrypting data, the encrypted primary data stored in the persistent memory being encrypted using the working key; and a control unit to provide load and store access to the primary data. The memory system further comprises a working key recovery mechanism to retrieve first root key information from a first module and second root key information from a second module; and compute the working key for a given module based on the retrieved first root key information and the retrieved second root key information.
    Type: Grant
    Filed: September 14, 2015
    Date of Patent: May 12, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Liqun Chen, Chris I. Dalton, Fraser Dickin, Mark Lillibridge, Simon Kai Ying Shiu
  • Patent number: 10652238
    Abstract: The disclosed technology includes systems and methods for determining secondary authentication of a user's log-in attempts by comparing received behavioral biometric data and/or received scenario-specific data to saved behavioral biometric data and/or saved scenario-specific data, respectively. Responsive to determining that the received behavioral biometric data and/or received scenario-specific data is above a predetermined threshold of similarity with respect to the saved behavioral biometric data and/or saved scenario-specific data, respectively, the systems and methods can determine that the corresponding log-in attempt is secondarily authenticated. of a user device via behavioral biometric data. Responsive to determining that the level of similarity is not above the predetermined threshold, the systems and methods can initiate a secondary authentication method and can associate the received behavioral biometric data with a second user model.
    Type: Grant
    Filed: June 10, 2019
    Date of Patent: May 12, 2020
    Assignee: CAPITAL ONE SERVICES, LLC
    Inventors: Joshua Edwards, Jason Ji, Ljubica Chatman, Michael Mossoba, Carlos Rodriguez
  • Patent number: 10645098
    Abstract: A malware analysis system includes a preliminary analysis unit, a determination unit, and a designation unit. The preliminary analysis unit executes malware obtained as a candidate for an analyzing subject to obtain information related to communication transmitted from the malware. The determination unit determines whether the malware is handled as an analyzing subject based on information obtained by the preliminary analysis unit. The designation unit designates an analyzing order with respect to malware having been determined by the determination unit as an analyzing subject based on information obtained by the preliminary analysis unit.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: May 5, 2020
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu
  • Patent number: 10629019
    Abstract: A processor-implemented access control method includes receiving credential and policy directory information to configure an access controller to allow self-provisioning of the access controller through periodic, automated query of the directory by the access controller; acquiring from the directory, credential and policy information for one or more individuals who may require access; storing in a local cache the acquired credential and policy information; receiving an access request to allow an individual access; comparing the access request to the credential and policy information in the cache; and when the comparison indicates a match, granting the individual access.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: April 21, 2020
    Assignee: AVIGILON ANALYTICS CORPORATION
    Inventor: E. Terry Neely
  • Patent number: 10620855
    Abstract: A method includes: receiving an operational command directed to a solid-state drive (SSD) and a security credential; issuing an asynchronous event from the SSD to an authentication agent including the security credential and a security certificate, wherein the security certificate is encoded based on the security credential and is stored in the SSD; forwarding the security credential and the security certificate from the authentication agent to an authentication server; validating the security certificate based on the security credential at an authentication server; providing a validation response from the authentication server to the authentication agent; forwarding the validation response from the authentication agent to the SSD; and executing the operational command based on the validation response.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: April 14, 2020
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Gunneswara Marripudi, Ajit Yagaty, Subramanyam Varanasi, Vishwanath Maram
  • Patent number: 10601823
    Abstract: A networked system for authenticating devices that comprise constrained devices connected in a network either directly to cloud based and/or dedicated servers or though gateways to cloud based and/or dedicated servers.
    Type: Grant
    Filed: April 6, 2016
    Date of Patent: March 24, 2020
    Assignee: TYCO FIRE & SECURITY GMBH
    Inventors: Craig Trivelpiece, Keith A. Roberts, Richard Campero
  • Patent number: 10602361
    Abstract: A storage device of the disclosure includes: a storage section that stores data; a communication section that performs wireless communication with one or a plurality of electronic apparatuses; an interface section that performs exchange of the data with a host apparatus; and a control section that determines a distance to each of the electronic apparatuses through the wireless communication, and controls access to the storage section by the host apparatus, on the basis of the distance and whether the host apparatus is accessing the storage section.
    Type: Grant
    Filed: April 22, 2016
    Date of Patent: March 24, 2020
    Assignee: Sony Corporation
    Inventors: Yuto Hosogaya, Shingo Aso, Yuya Ishikawa
  • Patent number: 10601782
    Abstract: Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key. The plaintext object keys are generated in advance of uploads. The plaintext object keys can be stored in an object database in the cloud. Alternatively, the plaintext object keys can be provided to a customer's HSM, encrypted, and returned to the cloud, such that encrypted object keys, encrypted by the customer, are stored in the cloud. The cloud can alternatively encrypt the customer's object keys with a master key for the customer, which is then encrypted by the customer's HSM before being stored in the cloud. Proxies are also deployed for efficiently communicating with customer security modules.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: March 24, 2020
    Assignee: Egnyte, Inc.
    Inventors: Sachin Shetty, Amrit Jassal, Krishanu Lahiri, Yogesh Rai, Manoj Chauhan, Leszek Jakubowski
  • Patent number: 10588015
    Abstract: Embodiments of the present invention disclose a terminal authenticating method, including: receiving, by a UE-to-network relay UE-R, a first request message sent by user equipment UE; sending, by the UE-R, a second request message to a control network element according to the first request message sent by the UE; receiving, by the UE-R, an authentication request message sent by the control network element, and determining whether the authentication request message is for authenticating on the UE; if the authentication request message is for authenticating on the UE, sending, by the UE-R, an authentication request message to the UE; and receiving, by the UE-R, an authentication response message sent by the UE according to the authentication request message, and sending the authentication response message to the control network element.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: March 10, 2020
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Bo Zhang, Chengdong He