Patents Examined by Syed M Ahsan
  • Patent number: 10552494
    Abstract: A content providing method of a content providing system is provided. The method includes transmitting identification information in a broadcasting manner from a first electronic device, if the identification information is received, generating user history information based on a receiving record of the identification information, at a second electronic device, transmitting the user history information to a database server from the second electronic device, transmitting the user history information to the first electronic device from the database server, transmitting the user history information to a content server at the first electronic device, transmitting a content associated with the user history information to the first electronic device from the content server, and providing the content to a user of the first electronic device.
    Type: Grant
    Filed: March 2, 2016
    Date of Patent: February 4, 2020
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Chang Hyup Jwa, Kyung Tae Kim, Jung Jik Lee, Sung Min Yoon, Sun Kee Lee
  • Patent number: 10547626
    Abstract: Examining applications for structural indications of repackaging is disclosed. A mobile application is received. The mobile application is analyzed to determine whether the mobile application matches a build-related file format fingerprint indicative of application repackaging. In response to a result of the analysis, the mobile application is categorized as a repackaged application.
    Type: Grant
    Filed: April 8, 2016
    Date of Patent: January 28, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Zihang Xiao, Zhi Xu
  • Patent number: 10548006
    Abstract: Systems, methods, apparatus and other mechanisms of authorizing a device to receive subscriber services via a network by comprising identifying a customer premises equipment (CPE) access device in communication with a device to be authorized for receiving subscriber services, determining a location associated with the CPE access device; and authorizing the device for receiving subscriber services if the CPE access device location is a valid location for a subscriber account associated with requested subscriber services.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: January 28, 2020
    Assignee: CHARTER COMMUNICATIONS OPERATING, LLC
    Inventors: Ewam de Freitas, Rich DiGeronimo
  • Patent number: 10530762
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for creating a unified passcode. One of the methods includes identifying that an application program installed on the system is assigned to a profile for an organization, identifying that the profile requires a passcode to allow access to the application program, providing a user interface with which user input is able to specify whether the system should use separate passcodes to unlock the system and provide access to the application program, receiving first user input that specifies that the system is to use a single passcode to both unlock the system and provide access to the application program, receiving, while the system is locked, second user input that specifies the single passcode, unlocking the system, receiving user input that selects a user interface element to activate the application program, and activating the application program without requesting a passcode.
    Type: Grant
    Filed: May 17, 2016
    Date of Patent: January 7, 2020
    Assignee: Google LLC
    Inventors: Timothy William Green, Paul Dermot Crowley, Lilian Zia, Clara Bayarri Romana
  • Patent number: 10511605
    Abstract: A method for securing data by embedding the data in a data structure and utilizing a sensor to detect transfer of the data structure. The data is embedded such that the data is only accessible by first executing an executable program. If the executable program determines that the device attempting to access the data (the accessing device) does not have permission to access the data, then the executable program destroys the data. If the data structure is transferred to another device, a sensor positioned to detect the data structure when transferred will identify the data. If the sensor determines that the data structure is not permitted to be transferred, then the sensor destroys the data.
    Type: Grant
    Filed: June 1, 2016
    Date of Patent: December 17, 2019
    Assignee: Bottomline Technologies (de), Inc.
    Inventors: Fred Ramberg, Trevor Ramberg
  • Patent number: 10496800
    Abstract: In one embodiment, a computer-implemented method is provided, comprising: developing at least a portion of a particular application that is configured to be installed on at least one device including an operating system, a web browser, and another application; developing a web page that includes a Hypertext Transfer Protocol (HTTP) link; causing the web page that includes the HTTP link to be hosted by at least one server in connection with a web site; causing to be stored, in connection with the particular application, first information identifying at least one aspect of the web site; causing to be stored, at the at least one server, second information identifying the particular application; via at least one network, receiving, at the at least one server and from the at least one device, a first request initiated via the web browser of the at least one device; and in response to the first request, serving, to the at least one device via the at least one network, the web page that includes the HTTP link such t
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: December 3, 2019
    Assignee: SITTING MAN, LLC
    Inventor: Robert Paul Morris
  • Patent number: 10491400
    Abstract: A NIC is provided in a cloud infrastructure. The NIC has a first information which receives least one application message from an application supported by the infrastructure. The NIC digitally signs the application message and outputs the digitally signed message to a network.
    Type: Grant
    Filed: August 23, 2016
    Date of Patent: November 26, 2019
    Assignee: SOLARFLARE COMMUNICATIONS, INC.
    Inventors: Steven L. Pope, David J. Riddoch
  • Patent number: 10484336
    Abstract: The present disclosure is directed towards systems and methods for rewriting a HTTP response transmitted via a clientless SSL VPN session. An intermediary device may identify, in a HTTP response transmitted via a clientless SSL VPN session, an absolute URL that includes a first hostname of the server. The device may provide a unique string corresponding to the first hostname of the server. The device may generate a URL segment by combining the unique string with a second hostname of the device. The device may rewrite the absolute URL by replacing the first hostname in the absolute URL with the generated URL segment. A domain name system (DNS) server for the client may be configured with a DNS entry comprising a wildcard combined with the second hostname, to cause the DNS server to resolve the rewritten absolute URL to an IP address of the device.
    Type: Grant
    Filed: May 13, 2016
    Date of Patent: November 19, 2019
    Assignee: CITRIX SYSTEMS, INC.
    Inventors: Pintu Kumar, Punit Gupta, Vignesh Rajendran
  • Patent number: 10476872
    Abstract: A spoken command analyzer computing system includes technologies configured to analyze information extracted from a speech sample and, using a joint speaker and phonetic content model, both determine whether the analyzed speech includes certain content (e.g., a command) and to identify the identity of the human speaker of the speech. In response to determining that the identity matches the authorized user's identity and determining that the analyzed speech includes the modeled content (e.g., command), an action corresponding to the verified content (e.g., command) is performed by an associated device.
    Type: Grant
    Filed: February 2, 2016
    Date of Patent: November 12, 2019
    Assignee: SRI International
    Inventors: Mitchell Leigh McLaren, Aaron Dennis Lawson
  • Patent number: 10474819
    Abstract: A shadow sandbox is maintained for malware detection. The shadow sandbox is a virtual machine replica of a target computing environment from a protected computing system. The shadow sandbox is maintained through all change events that occur to the target computing environment. The described systems and methods of detecting or preventing malware execution include maintaining a virtual machine replica of a target computing system by monitoring the target computing system for a plurality of possible events, the plurality of possible events including change events and risk events, detecting a change event on the target computing system, and updating the virtual machine based on the detected change event. The described systems and methods detect a risk event on the target computing system, execute the risk event on the virtual machine, and determine whether the risk event is malicious based on observation of execution of the risk event on the virtual machine.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: November 12, 2019
    Assignee: Lastline, Inc.
    Inventors: Roman Vasilenko, Clemens Kolbitsch
  • Patent number: 10469513
    Abstract: Systems and methods are described to enable a DNS service to encode information into a network address to be advertised by the DNS service. Information encoded by a DNS service may include, for example, an identifier of a content set to which the network address corresponds (e.g., a domain name) and validity information, such as a digital signature, that verifies the validity of the network address. On receiving a request to communicate with the network address, a destination device associated with the network address may decode the encoded information within the network address to assist in processing the request. In some instances, the encoded information may be used to identify malicious network transmissions, such as transmissions forming part of a network attack, potentially without reliance on other data, such as separate mappings or contents of the data transmission.
    Type: Grant
    Filed: December 22, 2016
    Date of Patent: November 5, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Hardeep Singh Uppal, Jorge Vasquez, Craig Wesley Howard, Anton Stephen Radlein
  • Patent number: 10454900
    Abstract: A passwordless reset technique includes actions to receive a request for a password reset, wherein the request password reset is initiated at a first device, determine that the first device is a trusted device, authenticate the user in order to obtain a cloud key from a network device, wherein the cloud key is associated with the first device, derive a key encryption key using the cloud key, decrypt a local storage key using the key encryption key, decrypt a local storage using the local storage key to obtain a content encryption key, obtain a new password via user input, re-encrypt the content encryption key, and transmit it to the network device, derive a new authentication token using the new password, and transmit the new authentication token to the network device.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: October 22, 2019
    Assignee: McAfee, LLC
    Inventors: Francois Proulx, Mathieu Rene, Richard Reiner
  • Patent number: 10454967
    Abstract: Clustering is provided of computer security attacks by the threat actor based on features of the attacks. Attack data is obtained for a given attack and a plurality of features of the given attack are extracted from a plurality of attack attributes. A feature-based score is computed for the given attack based on the extracted features relative to each of a plurality of attack clusters. Each attack cluster is comprised of a plurality of attacks performed by a particular attacker. The given computer security attack is assigned to a particular attack cluster if the feature-based score for the particular attack satisfies a predefined score criteria.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: October 22, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Alex Zaslavsky, Oren Karmi, Uri Fleyder, Lior Ben-Porat, Marcelo Blatt
  • Patent number: 10454949
    Abstract: Cross-Site Request Forgery attacks are mitigated by a CSRF mechanism executing at a computing entity. The CSRF mechanism is operative to analyze information associated with an HTTP request for a resource. The HTTP request typically originates as an HTTP redirect from another computing entity, such as an enterprise Web portal. Depending on the nature of the information associated with the HTTP request, the HTTP request may be rejected because the CSRF mechanism determines that the request is or is likely associated with a CSRF attack. To facilitate this determination, the approach leverages a new type of “referer” attribute, a trustedReferer, which indicates that the request originates from a server that has previously established a trust relationship with the site at which the CSRF mechanism executes. The trustedReferer attribute typically is set by the redirecting entity, and in an HTTP request header field dedicated for that attribute.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: October 22, 2019
    Assignee: International Business Machines Corporation
    Inventors: Lewis Lo, Ching-Yun Chao, Li Yi, Leonardo A. Uzcategui, John Yow-Chun Chang, Rohan Gandhi
  • Patent number: 10452830
    Abstract: An example method includes receiving a digital certificate corresponding to a user at a stylus device. The method includes transmitting the digital certificate and associated digital ink data to a touch device to authenticate the user based at least on the digital certificate and the associated digital ink data in response to detecting that the stylus device is within a threshold range of the touch device.
    Type: Grant
    Filed: February 2, 2016
    Date of Patent: October 22, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Narasimhan Raghunath
  • Patent number: 10447659
    Abstract: Aspects of the subject technology relate to systems and methods for sharing encrypted information among multiple devices. A peer-to-peer connection between a first computing device associated with a user account and a second computing device associated with the user account is established. Information associated with at least a portion of a file system of the second computing device may be received by the first computing device, where the portion of the file system comprises encrypted data. The portion of the file system of the second computing device may be mounted on the first computing device based on the received information.
    Type: Grant
    Filed: March 2, 2016
    Date of Patent: October 15, 2019
    Assignee: GOOGLE LLC
    Inventors: Katie Leah Roberts-Hoffman, Alberto Martin Perez
  • Patent number: 10440042
    Abstract: In an embodiment, a data processing method providing an improvement in computer security, comprises selecting, from a domain name queue comprising a plurality of domain names, a particular domain name to analyze; extracting one or more features of the particular domain name; determining a particular risk priority score of the particular domain name based on analyzing the one or more features of the particular domain name by applying a classifier to the one or more features of the particular domain name; inserting the particular risk priority score and an identifier associated with the particular domain name into a priority queue comprising a plurality of risk priority scores and a plurality of domain names; repeating the selecting, extracting, determining, and inserting steps for the remaining domain names in the domain name queue; retrieving from the priority queue, based upon the risk priority score, the identifier associated with the particular domain name; determining the particular domain name associated
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: October 8, 2019
    Assignee: Area 1 Security, Inc.
    Inventors: Peter Stein, Connie Siu, Donghyun Michael Choi, Rahul Sridhar, Hunter van Adelsberg
  • Patent number: 10404684
    Abstract: Techniques of the present disclosure register a device to a mobile device management (MDM) network to enable access of the MDM network. In some embodiments, a registration service receives a request to register a device as a device managed by an enterprise associated with the registration service. In response, the registration service sends a response redirecting the device to authenticate via an authentication service, where the device is configured via an authentication profile to authenticate via the authentication service. The device sends a token issued by the authentication service of the enterprise. The registration service provides access to the registration service based the received token, including by allowing the registration service to be used to register the device as a device managed at least in part by the enterprise. The present techniques improve security of communications by registering a device without requiring input of sensitive authentication information.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: September 3, 2019
    Assignee: MOBILE IRON, INC.
    Inventors: Sudheer Babu Chittireddy, Mansu Kim
  • Patent number: 10404477
    Abstract: A root user device associated with a user receives a request from a non-root user device associated with the user to issue a digital certificate to the non-root user device. The root user device utilizes a shared secret to determine whether the request is valid. If the request is determined to be valid, the root user device uses a public cryptographic key of a cryptographic key pair generated by the non-root user device to generate the digital certificate. The root user device digitally signs the digital certificate by using its private cryptographic key of a cryptographic key pair generated by the root user device. The root user device issues the digitally signed digital certificate to the non-root user device for use in authentication of the non-root user device.
    Type: Grant
    Filed: February 25, 2016
    Date of Patent: September 3, 2019
    Assignee: Amazon Technologies, Inc.
    Inventor: Michael Bannon Deck
  • Patent number: 10396977
    Abstract: A method and system. Ciphertext is generated by applying both an initialization vector and an encryption key directly to plaintext. The initialization vector is combined with the ciphertext to generate encrypted data, by using an embedding rule to perform the combining.
    Type: Grant
    Filed: January 23, 2017
    Date of Patent: August 27, 2019
    Assignee: International Business Machines Corporation
    Inventor: Yasuhiro Onoda