Patents Examined by Roderick Tolentino
  • Patent number: 10855451
    Abstract: Security of data storage devices and servers can be improved by the system and methods described herein. In some embodiments, a key management server may be locally or externally located. An encryption key may be used for locking a portion or the entirety of a storage device. The key management server may communicate with data storage devices regarding encryption keys using secure protocols. For example, the key management server may generate a communication key that may be used to securely encrypt messages between the server and a data storage device.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: December 1, 2020
    Assignee: SEAGATE TECHNOLOGY LLC
    Inventor: Christopher Nicholas Allo
  • Patent number: 10848482
    Abstract: Systems and methods for authenticating a user are provided. A method may comprise providing interactive media on a computing device associated with a user. The interactive media may comprise a plurality of images. The plurality of images may be presented on a graphical display of the computing device. The method may also comprise receiving input data from the computing device when the user selects a sequence of images from the plurality of images on the graphical display of the computing device. The selected sequence of images may correspond to a sequence of grammatical words. The method may further comprise analyzing the input data by comparing the sequence of grammatical words to a passcode, and authenticating the user when the sequence of grammatical words is equal to the passcode.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: November 24, 2020
    Assignee: Trusona, Inc.
    Inventors: Ori Eisen, Clayton Lengel-Zigich, Nikolas Mangu-Thitu
  • Patent number: 10810286
    Abstract: Systems and methods are provided for intelligently accessing media content based on rights. This may be accomplished by a media guidance application that generates a DRM score associated with a first copy of the media asset. The media guidance application determines that plurality of alternative copies of a media asset are available from other sources and determines DRM scores for the alternative copies. The media guidance application determines that one of the alternative copies has a lower digital rights management score as compared to the first copy of the media asset and stores the alternative copy instead of the first copy of the media asset.
    Type: Grant
    Filed: April 24, 2018
    Date of Patent: October 20, 2020
    Assignee: ROVI GUIDES, INC.
    Inventors: Benjamin H. Maughan, Kevin B. Lenhart, Sean Matthews
  • Patent number: 10805282
    Abstract: A notification system automatically sends notifications to users based on the defined roles of the notifications. The notification system allows an application to define in a secure manner users to roles. The notification system also allows the users to register in a secure manner their devices with the notification system. The notification system allows the application to then send a notification to users with a target role. Upon receiving the notification, the notification system identifies the devices of the users with the target role and sends the notification to those devices.
    Type: Grant
    Filed: April 11, 2018
    Date of Patent: October 13, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Brian Raymond Allrich, Michael Steven Hammond, Yury Mikheev, Kevin Martin Racer
  • Patent number: 10803205
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for performing an attestation verification. One of the methods includes sending an attestation request to a relay system node by a relay system controller. The relay system controller receives an attestation evidence of the relay system node from the relay system node. The relay system controller sends the attestation evidence of the relay system node to an attestation verification server. The relay system controller receives an attestation verification report from the attestation verification server. The relay system controller sends the attestation verification report to a relay system smart contract.
    Type: Grant
    Filed: December 13, 2019
    Date of Patent: October 13, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Yirong Yu, Honglin Qiu
  • Patent number: 10798094
    Abstract: This disclosure relates to account management. In one aspect, a method includes receiving a permission query message from a service system. Verification information is obtained from a first client based on the permission query message. The verification information is associated with an identity of the current user. In response to determining that the verification information is valid, proxy permission information for the current user is obtained from a blockchain. The proxy permission information includes at least operation permission information of the current user for the enterprise account. The proxy permission information is sent to the service system. The proxy permission information configured to be usable by the service system to determine whether to authorize the current user to perform an operation on the enterprise account.
    Type: Grant
    Filed: February 27, 2020
    Date of Patent: October 6, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Yawen Wei
  • Patent number: 10771495
    Abstract: The example embodiments are directed to a system and method for neutralizing abnormal signals in a cyber-physical system. In one example, the method includes receiving input signals comprising time series data associated with an asset and transforming the input signals into feature values in a feature space, detecting one or more abnormal feature values in the feature space based on a predetermined normalcy boundary associated with the asset, and determining an estimated true value for each abnormal feature value, and performing an inverse transform of each estimated true value to generate neutralized signals comprising time series data and outputting the neutralized signals.
    Type: Grant
    Filed: March 9, 2017
    Date of Patent: September 8, 2020
    Assignee: General Electric Company
    Inventors: Lalit Keshav Mestha, Olugbenga Anubi, Masoud Abbaszadeh
  • Patent number: 10764255
    Abstract: An industrial control system that includes a cloud platform facilitates secure execution of command data for an industrial device in communication with the cloud platform. The system includes an interface component, a validation component and an execution component. The interface component transmits industrial data associated with an industrial device to the cloud platform that analyzes the industrial data. The interface component also receives, from the cloud platform, command data for the industrial device that is generated based on the industrial data. The validation component validates the command data received from the cloud platform based on execution data indicative of a set of conditions for the command data. The validation component also establishes a secure communication link with the industrial device in response to a determination that the command data is approved for execution on the industrial device. The execution component initiates execution of the command data via the industrial device.
    Type: Grant
    Filed: September 21, 2016
    Date of Patent: September 1, 2020
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Juan L. Asenjo, Francisco Maturana
  • Patent number: 10757121
    Abstract: In one embodiment, a device in a network performs anomaly detection functions using a machine learning-based anomaly detector to detect anomalous traffic in the network. The device identifies an ability of one or more nodes in the network to perform at least one of the anomaly detection functions. The device selects a particular one of the anomaly detection functions to offload to a particular one of the nodes, based on the ability of the particular node to perform the particular anomaly detection function. The device instructs the particular node to perform the selected anomaly detection function.
    Type: Grant
    Filed: July 18, 2016
    Date of Patent: August 25, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Sukrit Dasgupta, Jean-Philippe Vasseur, Andrea Di Pietro
  • Patent number: 10755242
    Abstract: A Bitcoin mining hardware accelerator is described. A System on Chip implementing a Bitcoin mining hardware accelerator may include a processor core and a hardware accelerator coupled to the processor core, the hardware accelerator to mine digital currency. The hardware accelerator may include a first computational block, including a message digest datapath, wherein the first computational block is to: precompute a first summation of a 32-bit message (Wi), a 32-bit round constant (Ki), and a content of a first shifted state register (Gi?1), and store a result of the first summation in a state register (Hi). The Bitcoin mining hardware accelerator may further include a second computational block comprising a message scheduler datapath.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: August 25, 2020
    Assignee: Intel Corporation
    Inventors: Vikram Suresh, Sudhir Satpathy, Sanu Mathew
  • Patent number: 10749891
    Abstract: Systems and methods for electronic network threat analysis and remediation using network monitored sensors are provided herein. An example system includes one or more network devices deployed within a network or networks to collect entity information and to monitor network data and traffic of the network or networks that is related to security information. The network or networks include computing systems that are subject to a security risk policy having breach parameters defining one or more events that are indicative of an electronic threat. A threat analyser and threat assessment system are used to automatically detect occurrence of one or more of the events that are indicative of an electronic threat, automatically determine the breach parameters that apply for the one or more events that occurred, and generates a remediation of network security device security parameters for the network or networks based upon predicted losses arising from observed electronic threats.
    Type: Grant
    Filed: September 13, 2018
    Date of Patent: August 18, 2020
    Inventor: Phillip King-Wilson
  • Patent number: 10749857
    Abstract: A system for network mapping includes an interface and a processor. The interface is configured to receive an indication to scan a set of addresses using a fingerprint. The processor is configured to for an address of the set of addresses: receive a response associated with the address; determine whether the response matches the fingerprint; and store the address in a client network database in the event the response matches the fingerprint.
    Type: Grant
    Filed: September 26, 2016
    Date of Patent: August 18, 2020
    Assignee: EXPANSE, INC.
    Inventors: Timothy Junio, Matthew Kraning
  • Patent number: 10742655
    Abstract: Access to a resource controlled by a resource server (6, 8) is provided using a validity token issued by a validation server (4). When a resource request from a user (12) is received at the resource server (6, 8), then the resource server (6, 8) determines if the resource request satisfies a policy. If the resource request satisfies the policy, then access to the resource may be permitted without confirming the validity of the validation token with the validation server (4). Conversely, if the resource request does not satisfy the policy, then validation of the validation token with the validation server (4) is performed before the access requested is permitted.
    Type: Grant
    Filed: May 29, 2015
    Date of Patent: August 11, 2020
    Assignee: ARM IP Limited
    Inventors: Robert George Taylor, Milosch Meriac, Andrew John Pritchard, Hannes Tschofenig, Christopher Mark Paola
  • Patent number: 10742663
    Abstract: Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.
    Type: Grant
    Filed: October 14, 2019
    Date of Patent: August 11, 2020
    Assignee: CUPP Computing AS
    Inventors: Ami Oz, Shlomo Touboul
  • Patent number: 10721077
    Abstract: A first digital identification document is transmitted from an identification authority to a mobile device of an identified individual. This first digital identification document is digitally signed and includes a set of attributes about the identified individual. In the same manner, a second digital identification document is also transmitted to the identified individual's mobile device. The second digital identification document is also digitally signed but includes a different set of attributes about the identified individual. The identified individual is then confronted by a series of challengers, wherein each challenger requires a different amount of information about the identified individual. Based on the identity of each challenger, the identified individual selects an appropriate identification document and transmits it to the applicable challenger's device.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: July 21, 2020
    Assignee: International Business Machines Corporation
    Inventor: Richard Redpath
  • Patent number: 10715529
    Abstract: An apparatus for privacy management may include a processor. The processor may be configured to access one or more privacy options. In this regard, each privacy option may be configured to provide members of one or more groups access to content. The processor may also be configured to provide for selection of a privacy option in association with the content. Associated methods and computer program products may also be provided.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: July 14, 2020
    Assignee: Conversant Wireless Licensing S.a r.l.
    Inventors: Udo Szabo, Kristian Luoma
  • Patent number: 10708309
    Abstract: A method is performed at a Fibre Channel (FC) switch of an FC switch fabric through which servers connected to the FC switch fabric access logical partitions of a storage array connected to the FC switch fabric. The FC switch receives from the storage array information indicative of port zoning rules and logical partition masking that collectively define which server ports are permitted access to which storage array ports and to which logical partitions of the storage array. The FC switch generates from the information authorization rules for enforcing the port zoning rules and the logical partition masking, and programs the authorization rules into memory. The FC switch receives FC frames from the server ports. The FC frames convey respective input-output (IO) operations destined for the logical partitions. The FC switch authorizes each IO operation based on a lookup of the programmed authorization.
    Type: Grant
    Filed: January 10, 2018
    Date of Patent: July 7, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Harsha Bharadwaj, J Michel Metz
  • Patent number: 10698999
    Abstract: This document describes authentication using an interactive cord. An interactive cord includes a cable, and a fabric cover that covers the cable. The fabric cover includes one or more conductive threads woven into the fabric cover to form one or more capacitive touchpoints which are configured to enable reception of touch input that causes a change in capacitance to the one or more conductive threads. The interactive cord can be used to authenticate a user. For example, rather than using a password entered into a computing device, a touch input pattern can be provided to interactive cord that is coupled to the computing device to authenticate the user.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: June 30, 2020
    Assignee: Google LLC
    Inventors: Thad Eugene Starner, Karissa A. Sawyer
  • Patent number: 10693844
    Abstract: Systems and methods for efficient migration for encrypted virtual machines (VMs) by active page copying are disclosed. An example method may include receiving a request to migrate a VM, identifying a first page of memory of the VM on the source host machine for migration, the first page of memory encrypted with a VM-specific encryption key, protecting the first page from access by the VM, executing a send command to modify the first page from encrypted with the guest-specific encryption key to encrypted with a migration key while the first page remains in place in the memory, allocating a second page in a buffer, copying contents of the first page to the second page, executing a receive command to modify the first page from encrypted with the migration key to encrypted with the guest-specific encryption key while the first page remains in place in the memory, and transmitting contents of the second page.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: June 23, 2020
    Assignee: Red Hat, Inc.
    Inventors: Karen Noel, Michael Tsirkin
  • Patent number: 10685109
    Abstract: Systems and methods for managing antivirus records. A method can include providing a data store of antivirus records, providing an antivirus application to be executed on each of a plurality of user computers, and executing instructions by a remote server to implement a processing tool configured to collect an antivirus record parameter for a particular antivirus record and collect statistical data of a detection events associated with the antivirus record, and a processing tool to configured to determine a false activation using the antivirus record parameter and the statistical data.
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: June 16, 2020
    Assignee: AO KASPERSKY LAB
    Inventors: Denis I. Parinov, Konstantin Y. Sviridov, Sergey I. Ulasen