Patents Examined by Shewaye Gelagay
  • Patent number: 10581888
    Abstract: A method includes generating a tokenized representation of a given software script, the tokenized representation comprising two or more tokens representing two or more commands in the given software script. The method also includes mapping the tokens of the tokenized representation to a vector space providing contextual representation of the tokens utilizing an embedding layer of a deep learning network, detecting sequences of the mapped tokens representing sequences of commands associated with designated types of script behavior utilizing at least one hidden layer of the deep learning network, and classifying the given software script based on the detected sequences of the mapped tokens utilizing one or more classification layers of the deep learning network. The method further includes modifying access by a given client device to the given software script responsive to classifying the given software script as a given software script type.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: March 3, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Arie Agranonik, Zohar Duchin
  • Patent number: 10581603
    Abstract: Provided is a process including: encrypting each of a plurality of data encryption keys with a first public cryptographic key to form encrypted data encryption keys; obtaining a second public cryptographic key; generating a transformation key based on the first public-private cryptographic key pair and the second public cryptographic key; and transforming the encrypted data encryption keys with proxy re-encryption based on the transformation key; and obtaining the second private cryptographic key and the transformed encrypted data encryption keys.
    Type: Grant
    Filed: May 8, 2018
    Date of Patent: March 3, 2020
    Assignee: ZeroDB, Inc.
    Inventors: Mikhail Egorov, MacLane Scott Wilkison, David Nu{grave over (n)}ez, Isaac Agudo
  • Patent number: 10574440
    Abstract: Provided is a computer system and method that enables delegated access to encrypted information for distributed messaging and queuing frameworks, or in general, to publish/subscribe architectures. In said frameworks and architectures, data is published by data producers and organized in channels or queues, which consumer applications can subscribe to, and that are managed by one or multiple broker entities.
    Type: Grant
    Filed: May 8, 2018
    Date of Patent: February 25, 2020
    Assignee: ZeroDB, Inc.
    Inventors: Mikhail Egorov, MacLane Scott Wilkison, David Nu{grave over (n)}ez, Isaac Agudo
  • Patent number: 10560431
    Abstract: A request to establish an encrypted VPN connection between a network external to a provider network connected to the provider network via a dedicated direct physical link and a set of resources of the provider network is received. A new isolated virtual network (IVN) is established to implement an encryption virtual private gateway to be used for the connection. One or more protocol processing engines (PPEs) are instantiated within the IVN, address information of the one or more PPEs is exchanged with the external network and a respective encrypted VPN tunnel is configured between each of the PPEs and the external network. Routing information pertaining to the set of resources is provided to the external network via at least one of the encrypted VPN tunnels, enabling routing of customer data to the set of resources within the provider network from the external network via an encrypted VPN tunnel implemented over a dedicated direct physical link between the external network and the provider network.
    Type: Grant
    Filed: December 5, 2016
    Date of Patent: February 11, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Po-Chun Chen, Omer Hashmi, Sanjay Bhal
  • Patent number: 10552614
    Abstract: An example method includes receiving an indication of a first level of authentication for an electronic device, the first authentication being associated with a first authentication device associated with the user; receiving an indication of a second level of authentication for the electronic device, the second authentication being associated with a second authentication device associated with the user, the second authentication device being different from the first authentication device; and upon receiving the indication of at least the first level of authentication and the second level of authentication, allow access to the electronic device.
    Type: Grant
    Filed: January 31, 2014
    Date of Patent: February 4, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Nam H Nguyen, Chi So, Shaheen Saroor
  • Patent number: 10541819
    Abstract: A forged command filtering system includes: a secure command generating device for performing a digital signature operation on a selected command to generate a command request; a command transmitting device for receiving and transmitting the command request; a target device; and a command authentication circuit. The command authentication circuit includes: a communication interface for communicating with the command transmitting device or the target device; a secure micro-controller for storing a signature verification key of the secure command generating device; a control circuit for cooperating with the secure micro-controller to authenticate the command request using the signature verification key; and a storage circuit for storing data required for the operations of the control circuit.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: January 21, 2020
    Assignee: JRSYS INTERNATIONAL CORP.
    Inventor: Jia-Hong Chen
  • Patent number: 10536483
    Abstract: One example provides a collaborative policy refinement service to aggregate policy inputs from organizational layers and to generate security policies that are consistent across the organizational layers. This includes an interactive policy component to facilitate collaborative interaction between the organizational layers and to facilitate determination of the security policies.
    Type: Grant
    Filed: June 16, 2011
    Date of Patent: January 14, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Marco Casassa Mont, Siani Pearson, Pete Bramhall
  • Patent number: 10521498
    Abstract: A document editor may manage suggested edits in a collaborative document. The document editor may instantiate a document model associated with the collaborative document. When a first editing suggestion is received for the collaborative document, a first suggestion command is associated with the first editing suggestion based on a type of the first editing suggestion and a type of the document model. The document editor may apply the first suggestion command on the document model to present the first editing suggestion within the collaborative document. When an acceptance indication for the first editing suggestion is received, the document model can be updated with the first suggestion command in response to the received acceptance indication.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: December 31, 2019
    Assignee: GOOGLE LLC
    Inventors: Luiz Do Amaral De Franca Pereira Filho, Steven Joseph Saviano, Kevin Markman, Thomas John Schirripa, Isaac Quinn Shum, Kevin Winter, Ian Gunn, Stephen Alexander Garcia-Wright, Olga Sergeyevna Saviano, Venkat Ganesan, Augustin O. Venezuela, III
  • Patent number: 10499064
    Abstract: The present invention discloses an encoding apparatus using a Discrete Cosine Transform (DCT) scanning, which includes a mode selection means for selecting an optimal mode for intra prediction; an intra prediction means for performing intra prediction onto video inputted based on the mode selected in the mode selection means; a DCT and quantization means for performing DCT and quantization onto residual coefficients of a block outputted from the intra prediction means; and an entropy encoding means for performing entropy encoding onto DCT coefficients acquired from the DCT and quantization by using a scanning mode decided based on pixel similarity of the residual coefficients.
    Type: Grant
    Filed: October 16, 2017
    Date of Patent: December 3, 2019
    Assignees: Electronics and Telecommunications Research Institute, Kwangwoon University Research Institute for Industry Cooperation, Industry-Academia Cooperation Group of Sejong University
    Inventors: Se-Yoon Jeong, Hae-Chul Choi, Jeong-Il Seo, Seung-Kwon Beack, In-Seon Jang, Jae-Gon Kim, Kyung-Ae Moon, Dae-Young Jang, Jin-Woo Hong, Jin-Woong Kim, Yung-Lyul Lee, Dong-Gyu Sim, Seoung-Jun Oh, Chang-Beom Ahn, Dae-Yeon Kim, Dong-Kyun Kim
  • Patent number: 10489576
    Abstract: Generating verification codes includes selecting at least two verification code generators from a verification code generator set comprising a plurality of verification code generators to compose a current use set, executing each verification code generator in the current use set to obtain corresponding partial verification codes, composing a current verification code from the partial verification codes, outputting the current verification code to a user, receiving a user response that is made in response to the current verification code, and comparing the current verification code and the user response to determine whether the user is verified.
    Type: Grant
    Filed: May 5, 2015
    Date of Patent: November 26, 2019
    Assignee: Alibaba Group Holding Limited
    Inventors: Jiajia Li, Xinlin Yu
  • Patent number: 10423800
    Abstract: Provided are exemplary systems and methods for secure intelligent networked architecture, processing and execution. Exemplary embodiments include an intelligent networked architecture comprising an intelligent agent, a secure cloud of a plurality of specialized intelligent historical agents, a plurality of secure cloud based specialized insight servers configured to transform secure digital data into a scrubbed situational deployment trigger, and an intelligent operational agent configured to receive the scrubbed situational deployment trigger.
    Type: Grant
    Filed: July 1, 2016
    Date of Patent: September 24, 2019
    Assignee: Capitalogix IP Owner, LLC
    Inventors: Howard M. Getson, Sean Vallie, Rob Jump, Prince Modi, Derek Ainsworth, Daniel Hittler
  • Patent number: 10419487
    Abstract: Techniques are provided for processing authorization requests. In some embodiments, an authorization request specifying a non-hierarchical resource can be processed without having to sequentially process the various security policies configured for a collection of resources.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: September 17, 2019
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Kamalendu Biswas, Andrei Kapishnikov, Sastry Hari
  • Patent number: 10389689
    Abstract: Systems and methods securely provide media content from a media server to a media client via a network. The media content is segmented to create multiple media segments that are each identified in a playlist, and at least one of the media segments is encrypted using a cryptographic key. The cryptographic key is also identified in the playlist, and the playlist is provided from the media server to the media client via the network. The various media segments and cryptographic keys may then be requested from and provided by the media server using hypertext transport protocol (HTTP) or similar constructs to allow the media client to receive and decrypt the various segments of the media content.
    Type: Grant
    Filed: June 1, 2016
    Date of Patent: August 20, 2019
    Assignee: SLING MEDIA L.L.C.
    Inventor: Rajesh Kanungo
  • Patent number: 10389714
    Abstract: Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: August 20, 2019
    Assignee: Idaax Technologies Private Limited
    Inventor: Vishnu Sharma
  • Patent number: 10382415
    Abstract: Systems and methods securely determine whether a human or a hacking computing device attempts to engage an application. Embodiments of the present disclosure relate to identifying a defined pattern to be displayed by a user interface for an individual to trace. The defined pattern is dynamically displayed so that characteristics associated with the defined pattern change as the defined pattern is displayed. A background is displayed simultaneously with the defined pattern. The background randomly changes as the characteristics associated with the defined pattern change. The likelihood that a hacking computing device can recognize the dynamically changing defined pattern from the dynamically changing background is low while the likelihood that the human brain can do so is high. Thus, user attempting to engage the application is confirmed as a human when a trace of the defined patter is received.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: August 13, 2019
    Assignee: Ohio University
    Inventors: Chang Liu, Siang Lee Hong
  • Patent number: 10375046
    Abstract: Methods, devices, and systems for determining whether a received user generated response key matches the generated first unique key, thereby providing an autonomous authentication system to verify the user. The validation computing system may use a unique key to associate with each request for authentication from a client and further validate that unique key. Additionally, the authentication may be validated as an added security measure by a webhost.
    Type: Grant
    Filed: January 19, 2016
    Date of Patent: August 6, 2019
    Inventor: Arsen Samvelian
  • Patent number: 10367646
    Abstract: A method and apparatus for distributing cryptographic material are disclosed. In the method and apparatus, cryptographic material is obtained and it is determined that the cryptographic material is to be made available for use by one or more computing resources. The cryptographic material is then sent to one or more secure modules, whereby a secure module of the one or more secure modules is programmatically accessible to a computing resource of the one or more computing resources and programmatic access enables the computing resource to request performance of one or more cryptographic operations using the cryptographic material while exporting the cryptographic material to the computing resource is denied.
    Type: Grant
    Filed: October 21, 2014
    Date of Patent: July 30, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Todd Lawrence Cignetti, Andrew Jeffrey Doane, Stefan Popoveniuc, Matthew Allen Estes, Alexander Edward Schoof, Robert Eric Fitzgerald, Peter Zachary Bowen
  • Patent number: 10348725
    Abstract: Techniques are disclosed herein for establishing a file transfer connection via wearable devices (e.g., head-mounted wearable devices). A service executing on a cloud platform receives a connection authentication request including authentication data from wearable devices, each associated with a mobile device. Upon validating the connection authentication request, a file transfer connection between the wearable devices is established. The service receives a request from one of the wearable devices to transfer a file maintained by an associated mobile device to another mobile device. Upon validating this request, the service sends an authorization to transfer the file.
    Type: Grant
    Filed: January 10, 2017
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporatino
    Inventors: Su Liu, Jun Su, John D. Wilson, Yin Xia
  • Patent number: 10334650
    Abstract: The technology disclosed relates to secure exchange of private data between mobile devices. Pairwise cryptographic connections are automatically established between a first and other mobile devices. Independently generated distinctive visual traits are generated that allow a user to verify which two devices will exchange information, upon acceptance of a match between respective visual traits.
    Type: Grant
    Filed: January 29, 2015
    Date of Patent: June 25, 2019
    Assignee: Yodel Code LLC
    Inventor: Aleksey Novicov
  • Patent number: 10326781
    Abstract: Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. The data packets constitute at least a part of a file being addressed to a client machine coupled to the gateway device. The gateway device forwards an identification of the file to a remote datacenter in parallel with forwarding the data packets to the client machine. The datacenter performs signature matching on the identification and returns a result of the signature matching to the gateway device. The gateway device determining whether to block the file from the client machine based on the result of the signature matching from the datacenter.
    Type: Grant
    Filed: January 26, 2017
    Date of Patent: June 18, 2019
    Assignee: SONICWALL INC.
    Inventors: Aleksandr Dubrovsky, Senthilkumar G. Cheetancheri, Boris Yanovsky