Patents Examined by Syed A Zaidi
  • Patent number: 10742396
    Abstract: A network function (NF) entity in a communication network receives authentication data associated with a User Equipment (UE), determines the UE supports a blockchain registration procedure based on the authentication data, exchanges authentication messages with a Blockchain Roaming Broker (BRB) entity over a blockchain network interface, receives a blockchain authentication confirmation from the BRB entity, and registers the UE with the core network based on the blockchain authentication confirmation.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: August 11, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Om Prakash Suthar, Ammar Rayes, Michael David Geller, Ian McDowell Campbell, Aeneas Sean Dodd-Noble
  • Patent number: 10742670
    Abstract: Utility driven graph summarization for use in detecting and preventing malicious computer application. In one embodiment, a method may include receiving a graph comprising a plurality of nodes and a plurality of edges, prioritizing each of the plurality of nodes by way of assigning a relative importance value to each node of the plurality of nodes, combining at least two nodes of the plurality of nodes into a supernode based at least on the relative importance value of each node, calculating a utility penalty value for creating a superedge between the supernode and a node neighboring the supernode, creating the superedge between the supernode and the node neighboring the supernode if the utility penalty value satisfies a pre-determined penalty threshold, calculating a utility level based at least in part on creating the supernode and the superedge, and repeating the method until the calculated utility level satisfies a pre-determined threshold.
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: August 11, 2020
    Assignee: NORTONLIFELOCK INC.
    Inventors: Ashwin Kumar Kayyoor, Petros Efstathopoulos
  • Patent number: 10728255
    Abstract: A system and method for protecting entities of an availability zone include creating, by a policy engine associated with a virtual computing system, a protection policy definition for replicating a first set of entities of a first availability zone of the virtual computing system to a second availability zone of the virtual computing system. Each of the first set of entities is associated with a first common tag and the first set of entities are spread across first multiple clusters of the first availability zone. The system and method further include capturing, by the policy engine, a first plurality of snapshots of each of the first set of entities in the first availability zone in accordance with a first recovery point objective parameter and storing, by the policy engine, at least one copy of the first plurality of snapshots in the second availability zone.
    Type: Grant
    Filed: September 24, 2018
    Date of Patent: July 28, 2020
    Assignee: NUTANIX, INC.
    Inventors: Ankush Jindal, Sudish Kumar Sah, Bharath Kumar Beedu, Naveen Kumar, Ganesh Sahukari, Pranay Ega
  • Patent number: 10728241
    Abstract: Computer systems and methods are provided for receiving a first authentication request that includes an image of an identification document. A risk value is determined using one or more information factors that correspond to the authentication request. A validation user interface that includes the image of the identification document is displayed. A risk category that corresponds to the risk value is determined using at least a first risk threshold. In accordance with a determination that the risk value corresponds to a first risk category, a visual indication that corresponds to the first risk category is displayed. In accordance with a determination that the risk value corresponds to a second risk category, a visual indication that corresponds to the second risk category is displayed.
    Type: Grant
    Filed: January 26, 2018
    Date of Patent: July 28, 2020
    Assignee: Jumio Corporation
    Inventors: Philipp Pointner, Attila Balogh, Reinhard Hochrieser, Lukas Bayer, Ronald Streicher
  • Patent number: 10721246
    Abstract: Systems, computer program products, and methods are described herein for the creation of an exposure identification and distribution system for across silo channel integration. In this way, the system allows team integration of data across rails and silos for exposure identification. As such, the system generates a centralized repository for data and a communication linkage across the various systems used for identifying exposure and manipulated for linkage via a specific taxonomy overlay. Furthermore the system also includes logic that, when identification of a potential exposure indicate occurs, the system may communicate via distribution over the rails for integration and sharing for cross entity exposure identification.
    Type: Grant
    Filed: October 30, 2017
    Date of Patent: July 21, 2020
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Scott Anderson Sims, Kolt Arthur Bell, Michael Joseph Carroll, Andrew Dongho Kim, Elliot Piatetsky, Stephen M. Schneeweis, Michael E. Toth, Craig D. Widmann, Dharmender Kumar Satija, Sai Kishan Alapati, Hitesh J. Shah
  • Patent number: 10719598
    Abstract: The present disclosure discloses methods and systems for providing enhanced level of security for devices and/or applications on the devices. The method includes receiving a request from a user for setting a secure code as PIN with pattern option for accessing a device, for example. Then, a touch based keypad having a series of dots is displayed, each dot is associated with a pre-defined number. The secure code as input by the user is received, wherein the secure code is a combination of PIN and pattern. Then, the secure code is stored in the form of numbers along with pattern for the user. Thereafter, a request for accessing the device is received. The user is prompted to input a secure code. The secure code input by the user is matched with the stored secure code. Based on the matching, the user is allowed to access the device.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: July 21, 2020
    Assignee: Xerox Corporation
    Inventor: Purushothaman Jayakumar
  • Patent number: 10715539
    Abstract: A system and a method are disclosed for detecting an unacceptable HTTP requests by scanning the headers of the HTTP requests.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: July 14, 2020
    Assignee: United Services Automobile Association (USAA)
    Inventor: Duane E. Weldon
  • Patent number: 10715552
    Abstract: The disclosed embodiments include a method performed by a computer system. The method includes receiving first user input defining a filter of an anomaly action rule, the filter defining at least one of an attribute of an anomaly or an attribute of a computer network entity. The method also includes receiving second user input defining an action of the anomaly action rule. The method further includes generating the anomaly action rule based on the first user input and the second user input, wherein the anomaly action rule causes performance of the action upon detecting an anomaly on the computer network that satisfies the anomaly action rule.
    Type: Grant
    Filed: April 30, 2017
    Date of Patent: July 14, 2020
    Assignee: SPLUNK INC.
    Inventor: George Tsironis
  • Patent number: 10708275
    Abstract: Notebook applications may be employed to create, edit, and/or share collaborative documents. In a classroom setting, a notebook application may enable interactivity among a teacher and students. A page lock may be provided for the notebook application to prevent students from making unauthorized changes, such as editing a page after an assignment deadline or erasing teacher feedback, while still enabling the teacher read and write capabilities. For example, a notebook page may be rendered with read and write permissions for the teacher and student(s). The teacher may be provided an option to set a lock on the page to disable one or more of the students' write permissions. The teacher may select a first timing parameter associated with setting the lock, which defines a future date and time or event to trigger the disabling of the students' write permissions. The lock may be set based on the first timing parameter.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: July 7, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jason Silvis, Suleiman Jabbouri, Sharad Sharma, Michael Tholfsen
  • Patent number: 10691833
    Abstract: Disclosed is a computer-implemented method for activating a predetermined function in a device. The device in question has at least a touch-screen coupled to a processor, and is operable in a data entry mode and a command mode, the data entry mode being one in which the processor is configured to receive inputs detected at the touch-screen and the command mode being one in which the processor is configured to activate a function.
    Type: Grant
    Filed: October 17, 2017
    Date of Patent: June 23, 2020
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventor: Ajit Karnik
  • Patent number: 10693660
    Abstract: A multi-user encrypted secure data storage schema is described that is particularly suited for cloud based storage scenarios. This schema protects against an insider attacks be limiting administrator access to encrypted user data. The schema involves encrypting both the data set and user catalogs, where the catalogs contain data locations and data keys in metadata objects. The metadata objects may be share between users to provide others access to the data.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: June 23, 2020
    Inventor: Serge Vilvovsky
  • Patent number: 10680814
    Abstract: A device, method or server having memory configured to store cryptographic material required to execute one or more device functions. A communications interface for communicating over a network. Logic configured to receive from the server over the communications interface the cryptographic material required to execute the one or more device functions. The device is configured to delete the cryptographic material from the memory.
    Type: Grant
    Filed: May 31, 2016
    Date of Patent: June 9, 2020
    Assignee: VODAFONE IP LICENSING LIMITED
    Inventors: Nicholas Bone, Tim Snape
  • Patent number: 10671726
    Abstract: According to one embodiment, a computerized method comprises processing one or more objects by a first thread of execution that are part of a multi-thread process, monitoring events that occur during the processing of the one or more objects by the first thread, and storing information associated with the monitored events within an event log. The stored information comprises at least an identifier of the first thread to maintain an association between the monitored events and the first thread. Subsequently, the stored information within the event log is accessed for rendering a graphical display of the monitored events detected during processing of the one or more objects by the first thread on a display screen.
    Type: Grant
    Filed: September 22, 2014
    Date of Patent: June 2, 2020
    Assignee: FireEye Inc.
    Inventors: Sushant Paithane, Michael Vincent, Sai Vashisht
  • Patent number: 10673636
    Abstract: The present disclosure provides generally for system and method of authenticating a source of electronic communication. According to the present disclosure, authenticable communications may allow for authentication of a source of the electronic communication, which may limit potential damage caused by fraudulent communications. In some aspects, an authenticable communication may allow the recipient to confirm that the indicated source is the actual source of the authenticable communication. In some embodiments, the authentication may not require an exchange of encrypted communications or an exchange of communications solely within the same communication system. Authenticable communications may provide a separate layer of security that may allow a recipient to review the contents with confidence that the communication is not fraudulent. Further, authenticable communications may provide the additional security without requiring specialized software.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: June 2, 2020
    Inventors: Benjamin Finke, Christopher Freedman
  • Patent number: 10673856
    Abstract: A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. Secured Devices request content from the Distribution Hub, the Distribution Hub retrieves the content from the Data Warehouse, and then Distribution Hub manages the transfer of content to the Secured Devices. In some embodiments, Distribution Hub utilizes Content Filter to determine whether or not a particular Secured Device can access particular content.
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: June 2, 2020
    Assignee: Global Tel*Link Corporation
    Inventor: Stephen Lee Hodge
  • Patent number: 10664619
    Abstract: The implementation of an automated agent for data copy verification. Specifically, the implementation entails the execution of an intelligent, machine-learning based method and system for determining the integrity of data copies (i.e., for identifying whether data copies of a same data set have been impacted by malicious activities). Upon determining that data integrity is likely compromised, one or more corrective actions may be triggered. These actions may mitigate the spread of corruption and/or infection.
    Type: Grant
    Filed: January 23, 2018
    Date of Patent: May 26, 2020
    Assignee: EMC IP Holding Company LLC
    Inventor: Peter Marelas
  • Patent number: 10657128
    Abstract: The present disclosure relates to a method for processing queries in a database system having a first database engine and a second database engine. The method includes: storing a first instance of a first table in the first database engine in plaintext; encrypting at least one predefined column of the first table, resulting in a second instance of the first table containing at least part of the data of the first table in encrypted format. The second instance of the first table in the second database engine is stored in the second database engine. It may be determined whether to execute a received query in the first database engine on the first table or in the second database engine on the second instance of the first table, where the determination involves a comparison of the query with encryption information.
    Type: Grant
    Filed: May 13, 2019
    Date of Patent: May 19, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Felix Beier, Nicole Finnie, Namik Hrle, Jens Müller
  • Patent number: 10659054
    Abstract: A device, including: an unsecure non-volatile memory; a secure device including: a processor; and a secure non-volatile memory; wherein the secure device is configured to: calculate a TMC value from an offset and a base value; store a TMC version value in the secure non-volatile memory and the insecure non-volatile memory, wherein the TMC version value is updated when TMC value is incremented the first time after the secure device is powered up; store the base value in the unsecure non-volatile memory; store the offset value in the unsecure non-volatile memory when the secure device is in a system power down state; store the offset value in the secure non-volatile memory when the secure device is in a rescue state; and store a TMC link value in the unsecure memory, wherein the TMC link value is based upon the base value and TMC version value stored in the unsecure memory.
    Type: Grant
    Filed: February 23, 2018
    Date of Patent: May 19, 2020
    Assignee: NXP B.V.
    Inventors: Achim Werner, Vitaly Ocheretny
  • Patent number: 10659484
    Abstract: In one embodiment, a centralized controller maintains a plurality of hierarchical behavioral modules of a behavioral model, and distributes initial behavioral modules to data plane entities to cause them to apply the initial behavioral modules to data plane traffic. The centralized controller may then receive data from a particular data plane entity based on its having applied the initial behavioral modules to its data plane traffic. The centralized controller then distributes subsequent behavioral modules to the particular data plane entity to cause it to apply the subsequent behavioral modules to the data plane traffic, the subsequent behavioral modules selected based on the previously received data from the particular data plane entity. The centralized controller may then iteratively receive data from the particular data plane entity and distribute subsequently selected behavioral modules until an attack determination is made on the data plane traffic of the particular data plane entity.
    Type: Grant
    Filed: February 19, 2018
    Date of Patent: May 19, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Saman Taghavi Zargar, Subharthi Paul, Prashanth Patil, Jayaraman Iyer, Hari Shankar
  • Patent number: 10659483
    Abstract: The implementation of an automated agent for data copies verification. Specifically, the implementation entails the execution of an intelligent, machine-learning based method and system for determining the integrity of data copies (i.e., for identifying whether data copies of a same data set have been impacted by malicious activities).
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: May 19, 2020
    Assignee: EMC IP Holding Company LLC
    Inventor: Peter Marelas