Patents Examined by Shin-Hon Chen
  • Patent number: 9344433
    Abstract: Various embodiments of the present technology involve the sharing of a content item though a synchronized content management system (CMS) without requiring a user to register or provide login credentials. For example, the CMS can receive a request from a first user of a computing device to share a content item with a second user. Instead of requiring the user to register or provide their login credentials, the CMS can generate an unregistered user account using a unique identifier associated with the computing device. Accordingly, in order to share the content item, the CMS can generate a link to retrieve the content item and send the link to the second user. Thus, creation of an unregistered user account can require no login credentials, thereby providing a simple, user friendly interface for initiating interactions with the CMS.
    Type: Grant
    Filed: July 15, 2014
    Date of Patent: May 17, 2016
    Assignee: Dropbox, Inc.
    Inventors: John Adams, Aditi Jain, Matteus Pan
  • Patent number: 9344431
    Abstract: Disclosed herein is a system and method for efficiently gathering information about applications for mobile communications devices (e.g., smartphones, netbooks, and tablets) and using that information to produce assessments of the applications. To gather information, a server may send a request for application data to a mobile communications device. In response, the server may receive some but not all of the first-requested application data. The server may then a second request for application data to a second mobile communications device that also has access to the application. The server may receive application data from the second mobile communications device, and store the received first- and second-requested application data. The server then uses the stored application data to assess the application.
    Type: Grant
    Filed: April 16, 2015
    Date of Patent: May 17, 2016
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, David Golombek, Daniel Lee Evans, David Luke Richardson, Timothy Micheal Wyatt, James David Burgess, Anthony McKay Lineberry, Kyle Barton
  • Patent number: 9331906
    Abstract: A device has physical network interface port through which a user can monitor and configure the device. A backend process and a virtual machine (VM) execute on a host operating system (OS). A front end user interface process executes on the VM, and is therefore compartmentalized in the VM. There is no front end user interface executing on the host OS outside the VM. The only management access channel into the device is via a first communication path through the physical network interface port, to the VM, up the VM's stack, and to the front end process. If the backend process is to be instructed to take an action, then the front end process forwards an application layer instruction to the backend process via a second communication path. The instruction passes down the VM stack, across a virtual secure network link, up the host stack, and to the backend process.
    Type: Grant
    Filed: November 23, 2014
    Date of Patent: May 3, 2016
    Assignee: Netronome Systems, Inc.
    Inventors: Jason Scott McMullan, Trevor William Patrie, Peter Liudmilov Djalaliev, Roelof Nico Du Toit
  • Patent number: 9325495
    Abstract: In some examples, a device may include an accelerometer configured to provide a measurement of vibration created by relative contact with another device, and a processor, operatively coupled to the accelerometer, configured to: create an encryption key based on, at least, the measurement of the vibration, receive an output encrypted with the encryption key from the another device, and verify the identity of the encryption key by which the output received from the another device is encrypted.
    Type: Grant
    Filed: November 8, 2013
    Date of Patent: April 26, 2016
    Assignee: Empire Technology Development LLC
    Inventor: Michael John Roberts
  • Patent number: 9319411
    Abstract: A cloud management node (102) in a public cloud (100) works together with a private management system (116) in a private cloud (114) to manage provisioning and access to cloud services from the private cloud (114). Private data does not need to be held or duplicated in the public cloud so that the data security is enhanced. The private management system (116) issues tokens for authorization so that user access to cloud services may be controlled. The cloud management node (102) receives provisioning requests from the private cloud (114) and selects and informs an appropriate service provider node (112) that a provisioning request is waiting. In examples an administrator at the private cloud (114) is able to manage cloud service access for many users in a simple effective manner and users are able to operate multiple cloud services from a single account.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: April 19, 2016
    Assignee: Proximitum Limited
    Inventors: James Wharton, David Worrall
  • Patent number: 9319623
    Abstract: An information processing apparatus stores sets of image data associated with sets of user identification information. When receiving a set of the user identification information and a set of apparatus identification information identifying one of image display apparatuses, the information processing apparatus stores information of a stored set of image data associated with the received set of user information in a manner of associating the stored set of image data with the received set of apparatus identification information, and, in response to receiving a request from the image display apparatus identified by the set of apparatus identification information, transmits the set of image data associated with the set of apparatus identification information to the image display apparatus.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: April 19, 2016
    Assignee: Ricoh Company, Ltd.
    Inventor: Minami Ogawa
  • Patent number: 9317704
    Abstract: Systems and methods for providing trust provisioning are disclosed. A utilization request requesting to utilize data stored by a secure element associated with the device may be processed by a software application. In response to processing the utilization request, a registration request message for registering the software application may be communicated to a management server. A validation code may be received from the management server in reply to the registration request message. The received validation code may be verified to match a second validation code. Subsequent to successful verification, a passcode and an identifier of the secure element may be communicated to the management server. In response to communicating the passcode and the secure element identifier, an acknowledgement may be received from the management server specifying whether registration of the software application was successful.
    Type: Grant
    Filed: June 12, 2013
    Date of Patent: April 19, 2016
    Assignee: Sequent Software, Inc.
    Inventors: David Brudnicki, Kaushik Roy, Patrick Lim
  • Patent number: 9319382
    Abstract: Certain embodiments described herein provide a computer system, a log collection device, and methods for protecting a plurality of guarded networks from internet threats. The computer system includes at least one processor in operative communication with a plurality of log collection circuits via the internet and in operative communication with a plurality of intelligence sources via the internet. The log collection circuit includes at least one processor in operative communication with a computer system via the internet and in operative communication with at least one firewall of the guarded network.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: April 19, 2016
    Assignee: Cautela Labs, Inc.
    Inventors: Eduardo Don, Jr., Neeraj Gupta, Frank Landberg, John Sturges
  • Patent number: 9317451
    Abstract: According to one embodiment, a nonvolatile semiconductor storage device includes an encrypting circuit for operating in a predetermined encrypting system, a memory cell array preliminarily storing complementary data to be used in the operation, and a page buffer having a first region for storing the data being read out from the memory cell array, and a second region used when executing the operation.
    Type: Grant
    Filed: January 8, 2015
    Date of Patent: April 19, 2016
    Assignee: KABUSHIKI KAISHA TOSHIBA
    Inventors: Toshihiro Suzuki, Noboru Shibata, Hideo Shimizu
  • Patent number: 9313221
    Abstract: In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: April 12, 2016
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Chuck A Black, Daniel E Ford
  • Patent number: 9311474
    Abstract: Provided is an information processing apparatus configured to execute at least one function, including: a storage configured to store a first code; an authentication unit configured to obtain a second code from an external storage medium, and to verify the second code against the first code to thereby authenticate the second code; an execution allowing unit configured, when the authentication unit succeeds in authentication, to allow execution of a predetermined function out of the at least one function; and an update unit configured, when the authentication unit succeeds in authentication, to update the first code stored in the storage with another first code, and to update the second code stored in the external storage medium with another second code such that the authentication unit will succeed in authentication based on the updated first code.
    Type: Grant
    Filed: July 16, 2014
    Date of Patent: April 12, 2016
    Assignee: MITUTOYO CORPORATION
    Inventor: Masanobu Kataoka
  • Patent number: 9306981
    Abstract: The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other bioinformatic information. Certain embodiments may facilitate policy-based governance of access to and/or use of bioinformatic information, improved interaction with and/or use of distributed bioinformatic information, parallelization of various processes involving bioinformatic information, and/or reduced user involvement in bioinformatic workflow processes, and/or the like. Further embodiments may provide for memoization processes that may persistently store final and/or intermediate results of computations performed using genomic data for use in connection with future computations.
    Type: Grant
    Filed: April 24, 2014
    Date of Patent: April 5, 2016
    Assignee: Intertrust Technologies Corporation
    Inventors: Jarl Nilsson, William Knox Carey
  • Patent number: 9306944
    Abstract: An information handling system analyzes secondary information captured with an image of a two-dimensional barcode to perform a function. For example, a mobile phone camera captures an image of a QR code at a product plus characters printed next to the QR code, uses optical code recognition to determine the characters, and applies information from the QR code and the characters to register the product. As another example, a security indicator is captured with an image of the QR code and applied to access information of the QR code, such as by using GPS position information, local network information, or telephone number information to encrypt and/or decrypt information stored in the QR code.
    Type: Grant
    Filed: March 3, 2015
    Date of Patent: April 5, 2016
    Assignee: Dell Products L.P.
    Inventors: Kevin D. Terwilliger, Orin M. Ozias, Scott C. Lauffer
  • Patent number: 9306960
    Abstract: A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. In various embodiments, the computer worm may be transported from a production network, where the computer worm is not readily identifiable, to an alternate network in the worm sensor where the computer worm may be readily identifiable. Computer worm identifiers generated by a worm sensor of one containment system can be provided not only to the blocking system of the same containment system, but can also be distributed by the management system to blocking systems of other containment systems.
    Type: Grant
    Filed: August 19, 2013
    Date of Patent: April 5, 2016
    Assignee: FireEye, Inc.
    Inventor: Ashar Aziz
  • Patent number: 9300666
    Abstract: Detecting proxy-based communications via a computer network by sending a uniform resource locator via a computer network to a recipient at a first computer network address, identifying a request associated with the uniform resource locator, where the request is associated with a second computer network address, and determining that a value of a characteristic of the second computer network address is inconsistent with a value associated with the recipient, thereby identifying the first computer network address as being associated with a proxy.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventor: Amit Klein
  • Patent number: 9298900
    Abstract: Disclosed herein are example embodiments for behavioral fingerprinting via inferred personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be inferred via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user.
    Type: Grant
    Filed: October 31, 2012
    Date of Patent: March 29, 2016
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xeudong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
  • Patent number: 9300654
    Abstract: In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the certification authority includes the object identifier, thereby allowing improved management of the identity certificate at the user device and elsewhere.
    Type: Grant
    Filed: August 8, 2014
    Date of Patent: March 29, 2016
    Assignee: BlackBerry Limited
    Inventors: Van Quy Tu, Neil Patrick Adams
  • Patent number: 9298533
    Abstract: In a method in a portable data carrier for securing the data carrier against external attacks on the data carrier, there is employed at least one counter in the data carrier. A specified command is secured here such that it is executed by the data carrier only when the at least one counter lies in a specified, permissible values range, in particular does not undershoot a specified minimum value. The at least one counter is actuated, normally decremented, according to the invention when it is recognized on the basis of a rollback buffer of the data carrier that a preceding execution of a command has been disturbed.
    Type: Grant
    Filed: December 9, 2011
    Date of Patent: March 29, 2016
    Assignee: GIESECKE & DEVRIENT GMBH
    Inventor: Oliver Gibis
  • Patent number: 9300538
    Abstract: An example method for facilitating on-demand bandwidth provisioning in a network environment is provided and includes receiving a request from a client at a first network for accommodating flow characteristics at a second network that is associated with executing an application at the first network, determining that the request cannot be fulfilled with available network resources allocated to the client by the second network, advising the client of additional cost for accommodating the flow characteristics, and authorizing additional network resources in the second network to accommodate the flow characteristics after receiving notification from the client of payment of the additional cost.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: March 29, 2016
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: K. Tirumaleswar Reddy, Prashanth Patil, Daniel G. Wing, William C. VerSteeg, Christopher Wild
  • Patent number: 9294500
    Abstract: A server creates categorization-based application policies and selects a specific policy to send to a mobile communications device. In one embodiment, the mobile communication device applies the categorization-based application policy received from the server to information about a data object (e.g., application) that the device wants to access (or has accessed). Based on the application of the categorization-based policy, the device may be permitted to access the data object or the device may not be permitted to access the data object.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: March 22, 2016
    Assignee: LOOKOUT, INC.
    Inventor: Kevin Patrick Mahaffey