Patents Examined by Shu C Gao
-
Patent number: 10372937Abstract: A computing device is described herein that automatically enters a data protection mode in response to the detected presence or absence of certain user input and/or user input behaviors during a device boot-up state, a user login state, or a device shut-down state. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.Type: GrantFiled: June 27, 2014Date of Patent: August 6, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Jerry Huang, Zhen Liu, QingHu Li, Chen Liu
-
Patent number: 10311245Abstract: A cybersecurity system includes a controller that functions as a gateway between an end user device and an offline data storage device. When the end user device wants to access a file on the offline data storage device the controller severs a connection between a temporary storage memory and the end user device, establishes a connection with the offline data storage device, pulls the data from the offline data storage device to a temporary storage memory, then severs the connection with the offline data storage device, then establishes the connection with the end user device and communicates the data from the temporary storage memory to the end user device before overwriting the data in the temporary storage memory.Type: GrantFiled: March 8, 2017Date of Patent: June 4, 2019Inventors: Kalpesh S. Patel, Shilpi D. Bhargava
-
Patent number: 10304086Abstract: In one embodiment, techniques are provided for estimating demographic information. A current device demographic profile for a mobile device is retrieved. An estimated geographic location of the mobile device and a time at which the mobile device visited the estimated geographic location is determined. Based on this, a location demographic profile for a geographic area that includes the estimated geographic location and for a time frame that includes the determined time is retrieved. The current device demographic profile for the mobile device is updated based on the location demographic profile. Further, the location demographic profile is updated based on a plurality of device demographic profiles of a plurality of mobile devices that visit geographic locations within the geographic area, the plurality of mobile devices including the mobile device.Type: GrantFiled: March 28, 2016Date of Patent: May 28, 2019Assignee: Skyhook Wireless, Inc.Inventors: Andrew J. Broadstone, Russel Kipp Jones, Edward James Morgan, Farshid Alizadeh-Shabdiz, Nicolas Brachet
-
Patent number: 10305691Abstract: The invention discloses a translation system and a method, and belongs to the translation field. Said system consists of the following steps that: a user client sends a translation request to a server; the server determines candidate translator clients corresponding to the translation request after receiving the translation request; the server sends a translation order corresponding to the translation request to the candidate translator clients; the translator clients selectively send scramble commands to the server after receiving the translation order; the server determines a target translator client among the translator clients who have sent the scramble commands after receiving the scramble commands, and sends the translation request to the target translator client. The invention helps reach the effects of being capable of acquiring translation services from translator clients, improving the translation accuracy, and meeting the needs of most people.Type: GrantFiled: May 20, 2016Date of Patent: May 28, 2019Inventor: Zhong Feng
-
Patent number: 10268815Abstract: An apparatus is described herein. The apparatus includes a controller and a proxy entity. The controller is to detect a peripheral device and authenticate the peripheral device according to a first protocol. The proxy entity that is to configure the peripheral device in an operable protocol in response to the authentication.Type: GrantFiled: June 26, 2015Date of Patent: April 23, 2019Assignee: Intel CorporationInventor: Robert A. Dunstan
-
Patent number: 10270790Abstract: The present invention relates to an insider threat detection system which includes at least two stages: a front end sensor stage with activity detection from detectors, and a behavior reasoning component (BRC) with following automated reporting. As opposed to typical monitoring systems that seek to identify network activities as endpoint activities, work on a small number of static triggered rules or anomalous deviations from established norms, the present invention includes a behavior reasoning component (BRC) that uses network activity as precursor indicators to subsequent malicious or non-malicious behaviors, using BRC pattern classifiers, to predict likely malicious insider behaviors and alert security personnel to insider threat from high probability sabotage, fraud, or theft of sensitive, proprietary, classified data/information.Type: GrantFiled: December 9, 2015Date of Patent: April 23, 2019Assignee: Anbeco, LLCInventor: Gary M Jackson
-
Patent number: 10257226Abstract: A system and method are provided that enable identifying and trapping cyber security attacks via wireless connectivity on enterprise and corporate networks. A deceptive network emulation of a specific customer network is used to invite and draw in possible attackers. The attacker is also enticed to initiate attack on the emulated deceptive network. Packet header inspection and deep packet evaluation of the attack are used for generating possible signatures of the attacker and the attack. The information from deep packet inspection combined with the understanding of attack modality derived from enablement of attack on the deceptive network are used to generate detailed defensive methodologies, response capabilities and attack signatures, so that various types of cyber attacks including zero-day attacks from the attacker can be identified, prevented or addressed and responded to.Type: GrantFiled: June 7, 2016Date of Patent: April 9, 2019Assignee: 802 Secure, Inc.Inventors: Garry Drummond, Paul Vilevac
-
Patent number: 10255201Abstract: A method and system provide local key management for storage enclosures. The method includes retrieving first security content from a security vault of a service processor, then dynamically detecting a hardware interface communicatively coupled to the service processor. A data storage device, communicatively coupled to the hardware interface is dynamically detected. A dynamic determination is made as to whether the data storage device is a self-encrypting capable data storage device. In response to the data storage device being a self-encrypting capable data storage device, a second security content is retrieved from the data storage device, and a validation regarding an association between the first security content and the second security content is made. Finally, in response to a positive validation of the association between the first security content and the second security content, security keys are transmitted to the data storage device, and access to the data storage device is enabled.Type: GrantFiled: May 18, 2016Date of Patent: April 9, 2019Assignee: Dell Products, L.P.Inventors: Dinesh Kunnathur Ragupathi, Rama Rao Bisa, Pavan Kumar, Syama Sundar Poluri, Sanjeev S. Dambal, Satyajit Dipakbhai Desai, Kevin Warren Mundt
-
Patent number: 10227053Abstract: A method for use in an in-vehicle network system is provided. The in-vehicle network system includes a plurality of electronic control units that communicate a data frame having a message authentication code (MAC) added thereto with one another via a bus in accordance with the Controller Area Network (CAN) protocol. The method includes detecting the state of a vehicle having the in-vehicle network system mounted therein and updating a MAC key used to generate the MAC under the condition that the detected state of the vehicle is a predetermined state.Type: GrantFiled: May 24, 2016Date of Patent: March 12, 2019Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICAInventors: Yoshihiro Ujiie, Hideki Matsushima, Tomoyuki Haga, Manabu Maeda, Yuji Unagami, Takeshi Kishikawa
-
Patent number: 10225320Abstract: An arrangement is provided in which a Universal Plug and Play (UPnP) device exposes a service for mapping a UPnP discovered content item to a server message block (SMB) location. The service is arranged to expose an SMB share path to a user at a remote client using a UPnP protocol. The user is then enabled with access to the share via SMB to gain file access, write changes or exercise file level control of the discovered content item. Authentication is optionally utilized to verify that the user is authorized to receive the SMB share location from the service or to verify that the user is authorized to access the SMB share.Type: GrantFiled: July 27, 2016Date of Patent: March 5, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: James Walter, Daniel Plastina, Srinivas Kasy Aiyar, Anders Klemets, William F. Schiefelbein
-
Patent number: 10210318Abstract: A method of capturing biometric data is provided that includes calculating, by a terminal device, an angle between a surface of the terminal device and an X-axis of the terminal device. When the angle is other than ninety degrees, a prompt is displayed on the terminal device that is designed to cause a terminal device user to adjust the position of the terminal device into an optimal position. After adjusting the position of the terminal device, the terminal device calculates the angle and when the angle is ninety degrees the terminal device captures biometric data from the user.Type: GrantFiled: December 9, 2015Date of Patent: February 19, 2019Assignee: DAON HOLDINGS LIMITEDInventors: John Anthony Duggan, Conor Robert White
-
Patent number: 10192052Abstract: According to one embodiment, a computerized method comprises conducting a first static scan on content within a file. Thereafter, if the first static scan did not result in the file being classified as malicious, the file is deconstructed to gain access to one or more objects within the file. A second static scan associated with the one or more objects is performed to determine whether the one or more objects are suspected of including malware. The file may then be classified as malicious based on results of the second static scan.Type: GrantFiled: September 30, 2013Date of Patent: January 29, 2019Assignee: FireEye, Inc.Inventors: Abhishek Singh, Yichong Lin, Angshuman Mukherjee, Zheng Bu
-
Patent number: 10193698Abstract: A device may receive a message, associated with establishing a secure session, including a first certificate chain associated with a server device. The device may generate a first certificate fingerprint associated with the first certificate chain and determine a policy identifier associated with a security policy on which the first certificate chain is to be validated. The device may identify a second certificate fingerprint associated with a second certificate chain that has been validated based on the security policy. The device may determine whether the first certificate fingerprint matches the second certificate fingerprint.Type: GrantFiled: June 26, 2015Date of Patent: January 29, 2019Assignee: Juniper Networks, Inc.Inventors: Premenjit Das, Rajeev Chaubey
-
Patent number: 10192042Abstract: The present disclosure provides a user verifying method, a terminal device, a server and a storage medium. The method may include: receiving, by a terminal device, a motion instruction from a server, and displaying the motion instruction on a display interface of the terminal device; obtaining sensed data of a gyroscope equipped in the terminal device and sending the sensed data to the server; determining, by the server, whether a motion trail of the terminal device constructed according to the sensed data meets a requirement of the motion instruction; and determining, by the server, that a user of the terminal device passes a user verification if the motion trail of the terminal device constructed according to the sensed data meets the requirement of the motion instruction. The method ensures that only human can accomplish the verifying process, which promotes the security of the user verification and improves the user experience.Type: GrantFiled: April 18, 2016Date of Patent: January 29, 2019Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Jiwei Guo, Haibo Zuo, Luyi Lin, Yijun Huang
-
Patent number: 10187365Abstract: The present invention relates to a method that may be used in a digital data communication system comprising a communication network constituted of a plurality of nodes, and a plurality of subscriber equipment units each connected to a node, includes: a transmission phase (P1) including the steps of limiting of the size of each frame to be transmitted, adding identification-authentication credentials, and transmitting the frames with a predetermined transmission interval; and a transmission phase (P2) including the steps of monitoring-checking for compliance with the input conditions; removal of each frame that is non-compliant, replicating each frame that is compliant, monitoring-checking for compliance with the output conditions, removing each frame that is non-compliant, transmitting each frame that is compliant, and recording and storing of the identification-authentication credential for each frame transmitted.Type: GrantFiled: December 9, 2015Date of Patent: January 22, 2019Assignee: THALESInventors: Patrice Georges Paul Toillon, Paul Marie Boivin-Champeaux, David José Faura, Michael André Templier, William Terroy
-
Patent number: 10181947Abstract: An information processing apparatus is provided that performs information processing for encrypting data using AES, which includes performing a process of generating round key data on a one-byte-by-one-byte basis, performing a row shift transformation that is a process of performing row shifting for the data by use of a row shift table, performing a byte substitution transformation that is a process of performing byte substitution for the data having undergone the row shift transformation by use of a byte substitution table that is a one-dimensional array, performing a column mix transformation that is a process of performing column mixing for the data having undergone the byte substitution transformation based on equivalent expressions, performing a key add transformation that is a process of performing an exclusive-OR operation based on the round key data and the data having undergone the column mix transformation, wherein the row shift transformation, the byte substitution transformation, the column mix trType: GrantFiled: March 8, 2016Date of Patent: January 15, 2019Assignee: FUJI ELECTRIC CO., LTD.Inventor: Kenji Takatsukasa
-
Patent number: 10177957Abstract: Briefly, in accordance with an embodiment, a method of managing, without human intervention, at least one private network is disclosed. For example, managing the at least one private network includes connecting the at least one private network to the Internet. Furthermore, the at least one private network communicates selected signal packets from at least one network device in one of at least two separate logical broadcast domains transmitted to at least one network device in another of at least two separate logical broadcast domains as if the logical broadcast domains are not separate. The selected signal packets are transmitted between the network devices of the at least two separate logical broadcast domains via a tunnel server.Type: GrantFiled: March 13, 2013Date of Patent: January 8, 2019Assignee: Cradlepoint, Inc.Inventors: Scott Andrew Hankins, Andrew John Mastracci
-
Patent number: 10178129Abstract: A network security method and a device relating to the field of network communication where the method includes, recording a correspondence between an Internet Protocol (IP) address and an security group tag (SGT), and executing a network security policy on a receiver of a data packet according to the recorded correspondence between the IP address and the SGT such that SGT information of the receiver does not need to be specially propagated, thereby decreasing network resource consumption and reducing network complexity.Type: GrantFiled: May 12, 2016Date of Patent: January 8, 2019Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Yibin Xu, Bing Sun, Jun Li
-
Patent number: 10152594Abstract: Disclosed are a method and a device for identifying a virus APK. The method comprises: presetting a virus database comprising virus characteristic codes; detecting that a designated file in a target Android installation package APK contains at least one of the virus characteristic codes; and determining that the target Android installation package APK is a virus APK. In the application, the virus APK and a variation thereof can be rapidly, accurately and effectively identified, thereby improving the security of an APK application.Type: GrantFiled: February 23, 2017Date of Patent: December 11, 2018Assignee: Beijing Qihoo Technology Company LimitedInventors: Xun Wang, Xu Zhang
-
Patent number: 10152600Abstract: An embodiment: (a) receives a request for a measurement of a hypervisor from at least one computing node that is external to the at least one machine; (b) executes a previously measured measuring agent to measure the hypervisor, after the hypervisor is measured and booted, to generate a measurement while: (b)(i) the at least one machine is in virtual machine extension (VMX) root operation, and (b)(ii) the measuring agent is in a protected mode; (c) attest to the measurement, based on at least one encryption credential, to generate an attested measurement output; and (d) communicate the attested measurement output to the at least one computing node. The hypervisor does not include the at least one encryption credential while the measuring agent is measuring the booted hypervisor. Other embodiments are described herein.Type: GrantFiled: March 3, 2016Date of Patent: December 11, 2018Assignee: Intel CorporationInventors: Carlos V. Rozas, Vincent R. Scarlata