Patents Examined by Shawnchoy Rahman
  • Patent number: 10440009
    Abstract: Techniques are disclosed to leverage third party “cookie stitchers” for cross-device user identification, which may be used by a network server to selectively provide content to a user. The techniques include a cookie stitcher associating a user with multiple computing devices, which in turn notifies the network server when the same user requests access to provided content on separate occasions from different computing devices. The cookie stitcher may also have access to a user record regarding the identified user, and may provide this record data to the network server to identify other characteristics about the user. Based upon the particular type of information that is identified, the network server may provide varying degrees of access to content and/or allow the user to interact with one or more applications supported by the network server in different ways.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: October 8, 2019
    Assignee: WALGREEN CO.
    Inventors: Peter Manwiller, Adam Crouch
  • Patent number: 10430786
    Abstract: An enhanced certificate authority system and method allows for the enhanced security, validation and Multi-Factor Authentication of user's within a digital signature and transaction system through the creation and management of a user's Digital Identity certificate so that through an enhanced certificate authority a user's identity and bona fides may be both protected and established across a diversity of electronic devices and transactions.
    Type: Grant
    Filed: April 16, 2018
    Date of Patent: October 1, 2019
    Inventor: Urayoan Camacho
  • Patent number: 10432655
    Abstract: Methods apparatus, systems, and articles of manufacture for IoT and PoS anti-malware are disclosed. An example method includes detecting a combination of function calls. Whether the combination of function calls is a forbidden combination of function calls for the device is detected based on a limited intended functionality of the device. The forbidden combination of function calls includes a first function call and a second function call. The first function call is allowed in isolation from the second function call. The second function call is allowed in isolation from the first function call. In response to determining that the combination of function calls is forbidden for the device, a responsive action is performed.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: October 1, 2019
    Assignee: Mcafee, LLC
    Inventors: Sean T. Tiernan, Simon Hunt
  • Patent number: 10423769
    Abstract: The purpose of the present invention is to provide a portable terminal and an application software start-up system whereby the application software that is started up is limited depending on the state of a user, thereby providing an improved ease of use. For this purpose, an application software start-up method for an information processing device comprises: performing identity authentication based on static biological information; determining the state of the user by comparing dynamic biological information acquired from the body of the user with previously measured dynamic biological information; and limiting the application software that is started up in accordance with the determined state of the user and on the basis of a permission level that is set in advance for each application software item.
    Type: Grant
    Filed: June 12, 2014
    Date of Patent: September 24, 2019
    Assignee: MAXELL, LTD.
    Inventors: Masayuki Hirabayashi, Yasunobu Hashimoto, Kazuhiko Yoshizawa
  • Patent number: 10412086
    Abstract: Systems and methods for validating device permissions of computing devices to execute code on a decentralized database are disclosed. Exemplary implementations may: store, on the decentralized database, a first set of code executable by the decentralized database, the first set of code being configured to instantiate objects; and store, on the decentralized database, a second set of code executable by the decentralized database, the second set of code defining functions, the functions including receiving requests from computing devices, validating whether the requesting computing devices are permitted to make the requests, modifying the state of instantiated objects in accordance with the received requests, and/or other functions.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: September 10, 2019
    Assignee: Trace, LLC
    Inventors: Paul Lintilhac, Joshua Decatur, Paul Oostenrijk, Laura Seach
  • Patent number: 10404665
    Abstract: A terminal management method and system, a server and a terminal are described. The terminal management method includes: a server configuring rich text information used for prompting a user for a terminal, the server selecting corresponding rich text information according to identification information of the terminal which is managed at current, adding the corresponding rich text information into a newly added extended field of a notification command of an OMA-DM protocol, and sending the notification command to the terminal such that the terminal prompts the user according to the rich text information.
    Type: Grant
    Filed: August 22, 2014
    Date of Patent: September 3, 2019
    Assignee: ZTE CORPORATION
    Inventor: Shibin Jing
  • Patent number: 10404727
    Abstract: In one embodiment, a networking device at an edge of a network generates a first set of feature vectors using information regarding one or more characteristics of host devices in the network. The networking device forms the host devices into device clusters dynamically based on the first set of feature vectors. The networking device generates a second set of feature vectors using information regarding traffic associated with the device clusters. The networking device models interactions between the device clusters using a plurality of anomaly detection models that are based on the second set of feature vectors.
    Type: Grant
    Filed: June 8, 2016
    Date of Patent: September 3, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Jean-Philippe Vasseur, Sébastien Gay, Grégory Mermoud, Pierre-André Savalle, Alexandre Honoré, Fabien Flacher
  • Patent number: 10395014
    Abstract: The invention relates to a method for initiating a login (L) of a user into a system, the login (L) being passed by inputting a username into a username field, inputting a password into a password field (S2), and verifying whether the inputted username is stored by the system and whether the inputted password is a stored password corresponding to the inputted username (S4), the method comprising the system requiring during inputting character by character of the username and/or the password in addition waiting a predefined delay (A2) and/or inputting at least one character at at least one position within a character sequence of the username and/or the password, respectively, wherein the at least one character differs from the character of the username at the at least one position when inputting the username and/or differs from the character of the password at the at least one position when inputting the password.
    Type: Grant
    Filed: July 1, 2015
    Date of Patent: August 27, 2019
    Assignee: Unify GmbH & Co. KG
    Inventors: Vasileios Giatilis, Labros Pappas
  • Patent number: 10397269
    Abstract: The disclosure relates to methods for establishing a secure communication link between a mobile station and a secondary base station in a mobile communication system. The disclosure is also providing mobile communication system for performing these methods, and computer readable media the instructions of which cause the mobile communication system to perform the methods described herein. Specifically, the disclosure suggests that in response to the detected or signaled potential security breach, the master base station increments a freshness counter for re-initializing the communication between the mobile station and the secondary base station; and the mobile station and the secondary base station re-initialize the communication there between. The re-initialization is performed under the control of the master base station and further includes deriving a same security key based on said incremented freshness counter, and establishing the secure communication link utilizing the same, derived security key.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: August 27, 2019
    Assignee: Sun Patent Trust
    Inventors: Prateek Basu Mallick, Joachim Loehr
  • Patent number: 10396983
    Abstract: A cryptographic communications system enables two entities related by an insecure communication channel and having initially no privately shared knowledge, to agree on a shared unconditionally secure information. Each one of the entities has the capability to generate a new form of randomness called Deep Random, such that any other entity than itself cannot know anything about the probability distribution except a given public characteristic. The internal system of each entity is made up with: (1) a Deep Random Generator (DRG) capable of generating Deep Random signals and of making calculations using the generated signals, and (2) an Interactive Communication Module (ICM) capable of publishing to and reading from the insecure channel. The two entities execute a communication protocol such that they can each compute their respective estimations of the shared information that are probabilistically as close as desired from perfect equality.
    Type: Grant
    Filed: April 6, 2016
    Date of Patent: August 27, 2019
    Inventor: Thibault De Valroger
  • Patent number: 10395040
    Abstract: A system and method of security assessment of a network is described. The system may include one or more security assessment computers controlled by a security assessor, and connected to a network, and first executable program code for acting as an agent on a first end device on the network. The first executable program code is configured to be executed by a browser application of the first end device, and is configured to collect software information, hardware information, and/or vulnerability information of the first end device and transmit the same to a first security assessment computer of the one or more security assessment computers. The information may be transmitted as part of a domain name server (DNS) request. The DNS request may include information identifying the first end device to thus allow modification of the first end device in response to analysis of the collected information.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: August 27, 2019
    Assignee: vThreat, Inc.
    Inventors: Marcus J. Carey, Tolulope Oyeniyi
  • Patent number: 10396995
    Abstract: A method of providing a hash value for a piece of data is disclosed, where the hash value provides for a time-stamp for the piece of data upon verification, for limiting a risk of collisions between hash values. The method comprises collecting one or more root time-stamps for a root of a hash tree structure defining a hash function, wherein the root-time stamp is a root time-stamp from the past, determining whether a nonce may be received from a server, and upon failure to receive the nonce from the server, providing the hash value by a hash function of the root time-stamp and the piece of data, or upon success in receiving the nonce from the server, providing the hash value by the hash function of the root time-stamp, the piece of data and the nonce. An electronic device and a computer program are also disclosed.
    Type: Grant
    Filed: January 18, 2016
    Date of Patent: August 27, 2019
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (publ)
    Inventors: Alexander Maximov, Martin Hell, Bernard Smeets
  • Patent number: 10387656
    Abstract: A method for testing a software application program includes recording a sequence of functional tests that are applied to the program and automatically identifying and collapsing sessions within the recorded functional tests. Modified tests are created by replacing parameters in the collapsed sessions with malicious inputs. The modified tests are applied to the program in order to detect security vulnerabilities in the program.
    Type: Grant
    Filed: March 9, 2017
    Date of Patent: August 20, 2019
    Assignee: Checkmarx Ltd.
    Inventors: Alexander Roichman, Maty Siman, Shimon Eshkenazi
  • Patent number: 10380376
    Abstract: A reader unit (31) is configured to be operationally coupled with an assay unit (11) that is capable of performing one or more diagnostic tests (13) on one or more physiological samples (15), and is configured (32, 36) to obtain test raw data (73) of diagnostic tests performed on an assay unit operationally coupled with the reader unit. The reader unit comprises an encryption module (33) that is configured to encrypt input data with locking key data (75), the input data comprising the test raw data, or data derived from said test raw data. The reader unit is configured to provide access to the encrypted data (77), but not to the input data.
    Type: Grant
    Filed: October 15, 2014
    Date of Patent: August 13, 2019
    Assignee: ONE DROP DIAGNOSTICS SÀRL
    Inventors: Luc Gervais, Jörg Ziegler
  • Patent number: 10372898
    Abstract: A non-transitory memory storing a digital signature of a consumable product where the digital signature indicates that an identifier and host device setting data are from a trusted source.
    Type: Grant
    Filed: October 23, 2017
    Date of Patent: August 6, 2019
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Paul L. Jeran, Stephen D. Panshin, Jefferson P. Ward
  • Patent number: 10375054
    Abstract: Provided herein are systems and methods of controlling access to a web-based application. Such a system may include an access determination server, an authorization control system, and a first web-based application accessible over a network to a first user device of a first user. The processing device of the access determination server receives application request information from the authorization control system, the application request information including an identifier of the first web-based application and an identifier of the first user, determines an access response based on the application request information and access information feed, transmits the access response to the authorization control system, receives an access result from the authorization control system, the access result being based on a response from a second user device to a notification, and stores the access result in an access information feed system.
    Type: Grant
    Filed: May 2, 2017
    Date of Patent: August 6, 2019
    Assignee: Netflix, Inc.
    Inventor: Raju Uppalapati
  • Patent number: 10367789
    Abstract: The present disclosure provides a data synchronization method and apparatus, for synchronizing data between a first system and a second system on a same terminal. Data stored in a storage area corresponding to the first system of the terminal is retrieved; the retrieved data is sent to a remote device to process the data; the processed data is sent back to the terminal and stored in a storage area corresponding to the second system.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: July 30, 2019
    Assignee: Alibaba Group Holding Limited
    Inventor: Yuanbo Sun
  • Patent number: 10361846
    Abstract: This disclosure relates to a method and system implementing same for identifying and/or measuring an orientation mismatch and/or relative angular velocity between at least two spaced apart stations, the first and second stations having first and second reference frames, respectively, as well as a method and system implementing same for aligning reference frames. The method comprises receiving, at the second station, a reference signal from the first station, the reference signal having a predetermined coding associated with the first reference frame, and splitting the signal into first and second components with respect to the second reference frame by way of an optical device. The method then comprises measuring first and second intensities of the first and second components, and using the measured first and second intensities to determine an approximate angle of deviation, if any, between first and second reference frames. The determined angle may be used to correct the deviation.
    Type: Grant
    Filed: May 12, 2015
    Date of Patent: July 23, 2019
    Assignee: University of KwaZulu-Natal
    Inventors: Marco Mariola, Abdul Rahim Mirza, Francesco Petruccione
  • Patent number: 10348774
    Abstract: A policy management system includes a policy management device that is configured to manage a policy input and/or a template and/or a functional model, a policy enforced device that is directly or indirectly connected to the policy management device via a network and that is configured such that at least a part of the functional model managed by the policy management device reflects the functional features/behaviors of the policy enforced device, a policy enforcement device that is configured to execute policy enforcement on the policy enforced device, and a policy decision device that is configured to receive machine-enforceable rule and/or configuration from the policy management device.
    Type: Grant
    Filed: June 25, 2018
    Date of Patent: July 9, 2019
    Inventors: Ulrich Lang, Rudolf Schreiner
  • Patent number: 10346600
    Abstract: According to at least one embodiment, a computer-implemented method to interface with an automation system is disclosed. One or more activation parameters and deactivation parameters may be identified associated with a mobile control panel. A concealed interface of the mobile control panel may be activated based at least in part on the one or more activation parameters. The activated interface of the mobile control panel may be deactivated based at least in part on one or more sleep parameters.
    Type: Grant
    Filed: September 18, 2016
    Date of Patent: July 9, 2019
    Assignee: Vivint, Inc.
    Inventors: Scott Bevan, James Beagley, Jason C. Flint, Jeffrey G. Thomas