Patents Examined by Piotr Poltorak
  • Patent number: 10635405
    Abstract: A method of performing finite field addition and doubling operations in an elliptic curve cryptography (ECC) authentication scheme as a countermeasure to side-channel attack. The addition and doubling operations are executed using atomic patterns that involve the same sequence and number of operation types, so that the noise consumption and electromagnetic emanation profile of circuitry performing the operations is identical regardless of operation. A subtraction operation using such an atomic pattern is also disclosed.
    Type: Grant
    Filed: July 13, 2018
    Date of Patent: April 28, 2020
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Eric Thierry Peeters
  • Patent number: 10628661
    Abstract: A method for verifying the identity of a user is provided that includes generating, by a computing device, a parameter for each processed frame in a video of biometric data captured from a user. The parameter results from movement of the computing device during capture of the biometric data. Moreover, the method includes generating a signal for the parameter and calculating a confidence score based on the generated signal and a classification model specific to the user. The classification model is generated from other signals generated for the parameter. Furthermore, the method includes verifying the identity of the user as true when the confidence score is at least equal to a threshold score.
    Type: Grant
    Filed: November 29, 2016
    Date of Patent: April 21, 2020
    Assignee: DAON HOLDINGS LIMITED
    Inventor: Mircea Ionita
  • Patent number: 10609029
    Abstract: A gateway having an architecture authorizing bidirectional communication between applications located in different domains and presenting a high assurance level of protection. The gateway interconnects a first and second domain. The gateway comprises an internal protocol, first and second protocol adapters hosted within the first and second domains and configured to make a conversion between application data formatted according to an applicative protocol relative to the two domains and gateway data formatted according to the gateway internal protocol, and a security module hosted on a separate platform to communicate with the first and second protocol adapters via first and second data links according to the gateway internal protocol.
    Type: Grant
    Filed: September 1, 2016
    Date of Patent: March 31, 2020
    Assignee: AIRBUS OPERATIONS SAS
    Inventors: Bertrand Leconte, Benoit Triquet, Cristina Simache
  • Patent number: 10581851
    Abstract: Aspects described herein allow for systems and methods to monitor production changes to resources in a cloud computing environment and determine whether those changes were performed in accordance with a change management policy. A change order monitoring application receives data from cloud computing audit logs to detect infrastructure changes and combines that data with application information to determine which application was affected. The change order monitoring application then uses a machine learning algorithm to cluster multiple change events together when it is likely that the change events were part of the same change. If cluster of change activity does not appear to be authorized, the change order monitoring application sends an alert to a change management team and an application team to get more information about the activity.
    Type: Grant
    Filed: July 17, 2019
    Date of Patent: March 3, 2020
    Assignee: Capital One Services, LLC
    Inventors: Dan File, Hao Liu, Rajesh Kanna Durairaj, Peter Terrana
  • Patent number: 10574438
    Abstract: In sharing processing, a security apparatus applies secret sharing to processing information m to obtain a plurality of pieces of fragment information (where n=1, . . . , N), obtains verification information which is an image of the obtained fragment information through mapping, stores the verification information and outputs the fragment information. Each piece of the fragment information is stored in a storage apparatus. In restoration processing, the security apparatus accepts input of fragment information (where k=1, . . . , K) required for restoration, compares fourth verification information which is an image of the inputted fragment information through mapping with stored verification information, and restores the processing information m from the fragment information (where k=1, . . . , K) corresponding to the fourth verification information which matches the verification information.
    Type: Grant
    Filed: February 17, 2015
    Date of Patent: February 25, 2020
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Miki Hosaka, Yasushi Takami, Tokutaro Yoshida
  • Patent number: 10567346
    Abstract: A browsing process is directed to the generation and management of a browse session at a network computing provider. A client computing device transmits secure requests for network resources to a network computing provider. The network computing provider comprises one or more virtual network computing providers for processing secure communications between a client computing device and a content source. A virtual network computing provider handles the secure communications, decrypting and processing the communications while preventing third parties from accessing the unencrypted communication data. The virtual network computing provider may determine a browse configuration identifying processing actions to perform on the request content.
    Type: Grant
    Filed: September 14, 2015
    Date of Patent: February 18, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Sachin P. Joglekar, Peter S. Vosshall, Jonathan A. Jenkins
  • Patent number: 10558825
    Abstract: Provided is a method for sharing business information based on a mutual confirmation blockchain and more particularly, a method for sharing business information based on a mutual confirmation blockchain which secures reliability and integrity of the business information registered in each of a plurality of different nodes constituting the blockchain on the basis of the blockchain and supports rapid sharing of the business information.
    Type: Grant
    Filed: February 13, 2019
    Date of Patent: February 11, 2020
    Assignee: ASADAL, INC.
    Inventor: Chang Nyoung Suh
  • Patent number: 10560272
    Abstract: Disclosed is a method of providing bio-information data based on a plurality of blockchains. The method includes enabling a user blockchain node to store user block data including user information, a shared key, and a hash key for each user of a plurality of users, enabling an electronic contract blockchain node to store contract block data including contract information for a first user requesting a second user to generate bio-information data, the first user and the second user being included in the plurality of users, enabling a data transfer blockchain node to store transfer block data including storage information for at least one storage server that stores the bio-information data, and delivering the transfer block data from the data transfer blockchain node to the first user.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: February 11, 2020
    Assignees: MACROGEN, INC., Macrogen Corp.
    Inventors: Sungwoo Yang, Jaekyung Chon, Ik Jung Choi, Hyun Min Park, Jieun Park, Jeongsun Seo, Changhoon Kim
  • Patent number: 10554410
    Abstract: Disclosed is a security authentication system for a membership login of an online website capable of ensuring a safe membership login without having to directly entering a membership ID and a password for a membership login of a certain online website on a user terminal being used in association with a smartphone for a private or public purpose, and a method thereof.
    Type: Grant
    Filed: February 11, 2016
    Date of Patent: February 4, 2020
    Assignee: eBay Inc.
    Inventor: Jin Yong Lee
  • Patent number: 10554627
    Abstract: A method for relaying a message is provided. The method includes transmitting, by an electronic device, a first message including a first anonymous identifier of the electronic device to at least one external device, and receiving a second message including the first anonymous identifier and a second anonymous identifier of the at least one external device.
    Type: Grant
    Filed: March 4, 2015
    Date of Patent: February 4, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jin-Hong Jeong, Sun-Kee Lee, Cheol-Ho Cheong, Joon-Young Cho, Bo-Kun Choi
  • Patent number: 10547639
    Abstract: The present invention provides apparatuses, methods, computer programs, computer program products and computer-readable media regarding SDN security. The method comprises checking whether messages in the user plane comply to a preconfigured rule, and if it is determined that the messages comply to the preconfigured rule, checking whether a number of specific signaling messages related to address allocation that are sent to a controller has reached a predetermined threshold, and if the predetermined threshold has been reached, throttling transmission of the specific signaling messages to the controller.
    Type: Grant
    Filed: June 10, 2016
    Date of Patent: January 28, 2020
    Assignee: NOKIA SOLUTIONS AND NETWORKS GMBH & CO. KG
    Inventor: Klaus Hoffmann
  • Patent number: 10546135
    Abstract: The present disclosure provides a method, system, and device for inquiry response mapping for determining a cybersecurity risk level of an entity. To manage and/or evaluate a cybersecurity risk level based on a relationship between a first entity and a second entity, questionnaires (e.g., requests or inquires) are often exchanged between two entities. One or more aspects of the present disclosure provide populating data sets (e.g., questionnaires) indicative of risk level for the first entity or the second entity. One or more other aspects of the present disclosure further provide determining a cybersecurity risk level of an entity by mapping responses to a plurality of inquiry sets directed to the first entity or the second entity.
    Type: Grant
    Filed: March 6, 2019
    Date of Patent: January 28, 2020
    Assignee: SecurityScorecard, Inc.
    Inventors: Samuel Kassoumeh, Dolly Krishnaswamy, A. Robert Sohval
  • Patent number: 10536468
    Abstract: Aspects of the present disclosure involve systems, methods, computer program products, and the like, for identifying and mitigating attacks on a voice component of a telecommunications network. In general, the process includes obtaining Layer 3 through Layer 7 transmission information from one or more edge devices to the telecommunications network. In one particular embodiment, a plurality of edge devices (also referred to herein as “session border controllers” or SBCs) is included in the telecommunications network in disparate geographical locations. Each SBC may provide Layer 3 through Layer 7 transmission information for each packet or communication transmitted through the SBC to a local database, which in turn may provide the information to a Central Analysis System or database. In one particular embodiment, the Layer 3 through Layer 7 information includes Session Initiation Protocol routing information for the communications sent to each of the SBCs of the network.
    Type: Grant
    Filed: December 19, 2016
    Date of Patent: January 14, 2020
    Assignee: Level 3 Communications, LLC
    Inventors: Dana A. Johnston, Clyde David Cooper, III
  • Patent number: 10534817
    Abstract: Configurations for sharing an instance of an executing process for a plug-in based on a session and a cookie data store associated with the session are disclosed. A cookie data store can be associated with a tab running in a corresponding security mode. By way of example, instead of initiating a new process for the plug-in in a new tab, the subject technology can first determine whether a previous tab is running an instance of a plug-in process. If this is the case, the subject technology can then determine whether the previous tab is running in the same security mode (e.g., protected or unprotected) as the new tab. The subject technology then shares the existing plug-in process in the previous tab without instantiating a new plug-in process in the new tab.
    Type: Grant
    Filed: September 2, 2016
    Date of Patent: January 14, 2020
    Assignee: GOOGLE LLC
    Inventors: Cynthia W. Lau, Johann Tomas Sigurdsson, Marc-André Decoste
  • Patent number: 10509922
    Abstract: A system described herein may allow for the masking of user input and/or sensor data, which could otherwise be used to uniquely identify and track a user. For example, user inputs (e.g., keyboard or mouse inputs) and/or sensor data (e.g., data from a touchscreen, pressure sensor, gyroscope, etc.) may be normalized and randomized. The normalization and/or randomization may include modifying metadata associated with user inputs or sensor data (e.g., modification of timestamps and/or modification of raw data) prior to outputting the user inputs or sensor data to an application, and/or to a service that attempts to uniquely identify users based on such metadata.
    Type: Grant
    Filed: September 28, 2017
    Date of Patent: December 17, 2019
    Assignee: VERIZON PATENT AND LICENSING INC.
    Inventors: Bruno Mendez, Manuel Enrique Caceres
  • Patent number: 10509921
    Abstract: A system may include transaction storage devices. Each transaction storage device may include a data store configured to receive, from a first entity, a request to push a detailed transaction corresponding to a secure identifier. The secure identifier may be generated, using an encoding function, from a user identifier of a user. The data store may be further configured to store the detailed transaction based on a first determination to trust the first entity. The system may further include an access controller configured to perform the first determination by applying a first security rule corresponding to a type of the secure identifier to the request to push the detailed transaction, and a registry configured to store at least the first security rule.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: December 17, 2019
    Assignee: Intuit Inc.
    Inventors: George Chiramattel Kunjachan, Amit Arya, Peter Allen Vogel
  • Patent number: 10505930
    Abstract: Data and data requests of users of applications are filtered using a client-resident agent. A user profile may contain data pertaining to restrictions on content the user is permitted to view or types of requests the user is permitted to make. within one or more applications. Data in the user profile may be used to grant or deny access to applications, filter particular content from the user's view, or filter particular data requests made by the user.
    Type: Grant
    Filed: August 12, 2014
    Date of Patent: December 10, 2019
    Assignee: IMPRIVATA, INC.
    Inventor: David M. T. Ting
  • Patent number: 10498583
    Abstract: An Active Directory Bridge (AD Bridge) provides the ability to register, represent, and manage external network resources on an internal network. The external network resources may include cloud resources, such as Internet of Things (IoT) devices, Software-as-a-Service applications (SaaS apps), cloud-hosted virtual machines (VMs), cloud-hosted computers, and other networked cloud resources. The external network resources may be unable to communicate directly with or join the internal network due to various network connection obstacles. The AD Bridge includes an AD Bridge Gateway, an AD Bridge Gatekeeper, and an AD Bridge Agent. The AD Bridge Agent resides on each external network resource, and provides the connection of the host external network resource through the AD Bridge Gatekeeper and through the AD Bridge Gateway to the internal network. The AD Bridge provides the ability to register, represent, and manage these external network resources on an internal network.
    Type: Grant
    Filed: March 4, 2019
    Date of Patent: December 3, 2019
    Assignee: FullArmor Corporation
    Inventors: Charles A. Davis, Danny Kim, Michael Hilton Manlief, Christopher Ryan Dixson-Boles
  • Patent number: 10484371
    Abstract: A computing device may accumulate behavior parameters of a controller or media with an authentication module of the controller prior to generating a unique signature with the authentication module. The unique signature can then be verified responsive to an initialization command from a host device before data is transferred by the controller between the host device and the media in response to the controller issuing at least one data access command.
    Type: Grant
    Filed: May 22, 2017
    Date of Patent: November 19, 2019
    Assignee: Seagate Technology LLC
    Inventor: Jackson Ellis
  • Patent number: 10469263
    Abstract: An embodiment of a method of providing identity services includes receiving identity data from an identity user, the identity data related to an identity of the identity user; receiving validation data from an identity provider, the validation data related to the identity data; if the validation data indicates that the identity data is valid, generating a transaction to store data related to the identity of the identity user on a blockchain of a blockchain system, the data to be stored including a representation of at least one of: the identity data, or the validation data; and transmitting the transaction to at least one distributed node of the blockchain system.
    Type: Grant
    Filed: February 14, 2017
    Date of Patent: November 5, 2019
    Assignee: REFINITIV US ORGANIZATION LLC
    Inventors: Robert Joseph Schukai, Scott Ryan Manuel