Patents Examined by Tae Kim
-
Patent number: 9690928Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.Type: GrantFiled: October 25, 2014Date of Patent: June 27, 2017Assignee: McAfee, Inc.Inventors: Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
-
Patent number: 9678836Abstract: A computer-implemented method for managing data protection of storage units may include 1) providing a user interface that enables a user to configure data protection policies for storage units, 2) selecting at least one storage unit for data protection, 3) enabling the user to configure, through the user interface, a data protection policy to schedule a data backup of the storage unit, and 4) enabling the user to configure, through the same user interface, the same data protection policy to schedule a data transfer operation from the storage unit to an additional storage unit. The data transfer operation may include at least one of a replication operation and a continuous data protection operation. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 6, 2012Date of Patent: June 13, 2017Assignee: Veritas TechnologiesInventor: Guido Westenberg
-
Patent number: 9674214Abstract: A computer-implemented method includes receiving a request to remove data that is associated with a protected social entity. The data maintained on one or more social networks is scanned, where scanning includes identifying data that is associated with one or more social entities. One or more characteristics of the identified data are determined, and a reference to the identified data that indicates the characteristic, is generated for each of the one or more characteristics. A match between the one or more generated references and one or more stored references is identified, where the one or more stored references each reference one or more characteristics associated with the protected social entity, and where the one or more stored references are stored in one or more social risk databases. A request to the one or more social networks to remove the identified data associated with the one or more generated references is submitted.Type: GrantFiled: April 20, 2015Date of Patent: June 6, 2017Assignee: ZeroFOX, Inc.Inventors: James C. Foster, Evan Blair, Christopher B. Cullison, Robert Francis
-
Patent number: 9673981Abstract: Authenticity and responsiveness of evidence (e.g., biometric evidence) may be validated without regard for whether there is direct control over a sensor that acquired the evidence. In some implementations, only a data block containing evidence that is (1) appended with a server-generated challenge (e.g., a nonce) and (2) signed or encrypted by the sensor may validate that the evidence is responsive to a current request and belongs to a current session. In some implementations, trust may be established and/or enhanced due to one or more security features (e.g., anti-spoofing, anti-tampering, and/or other security features) being collocated with the sensor at the actual sampling site.Type: GrantFiled: September 23, 2016Date of Patent: June 6, 2017Assignee: BiObex, LLCInventor: Arthur W. Joyce, III
-
Patent number: 9672370Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for sharing digital media with a space. One of the methods includes receiving a request from a first user to provide digital media for presentation in a first physical space, the request identifying the digital media and a group of authorized users allowed to view the digital media. Sensors in the first space identify the authorized users located in the first physical space. That only authorized users can view the digital media is determined from the sensors. The digital media is provided for presentation in the first physical space while determining that only authorized users can view the digital media.Type: GrantFiled: October 24, 2014Date of Patent: June 6, 2017Assignee: Google Inc.Inventors: Thor Lewis, Barbara Petit
-
Patent number: 9674191Abstract: A method for an administrator to impersonate a user is provided. A portal manager of a server detects an action initiated in the administrator portal pertaining to a user portal during a current session. The portal manager calculate a current user-to-impersonate identifier using a user identifier associated with the user portal, an administrator identifier associated with the administrator portal, and a session identifier associated with the current session. The portal manager compares the current user-to-impersonate identifier with a stored user-to-impersonate identifier. The portal manager permits the action initiated in the administrator portal to be executed in the user portal when the current user-to-impersonate identifier matches the stored user-to-impersonate identifier.Type: GrantFiled: January 15, 2013Date of Patent: June 6, 2017Assignee: Red Hat Israel, Ltd.Inventors: Gilad Chaplik, Haim Ateya
-
Patent number: 9667684Abstract: Systems and methods for saving encoded media streamed using adaptive bitrate streaming in accordance with embodiments of the invention are disclosed. In one embodiment of the invention, a playback device configured to perform adaptive bitrate streaming of media includes a video decoder application and a processor, where the video decoder application configures the processor to select a download stream from a set of alternative streams of video data, measure streaming conditions and request a stream of video data from the alternative streams of video data, receive portions of video data from the requested stream of video data, decode the received video data, save the received video data to memory, when the received video data is from the download stream and separately download and save the corresponding portion of video data from the download stream to memory, when the received video data is not from the download stream.Type: GrantFiled: February 23, 2015Date of Patent: May 30, 2017Assignee: Sonic IP, Inc.Inventors: Ben Ziskind, Song Cen, Tung Lin, Jason Braness, Kourosh Soroushian
-
Patent number: 9667418Abstract: There is described an electronic data communication system in which encrypted mail messages for a recipient are sent in two parts: message data encrypted by a symmetric encryption algorithm using a session key and session key data encrypted by an asymmetric encryption algorithm using a public key associated with the recipient. If the recipient uses a webmail service to access the encrypted electronic mail message, the encrypted session key data is sent to a trusted third party server which has access to the private key of the user. The trusted third party server decrypts the encrypted session key using the private key of the user, and then sends the decrypted session key to a remote network device for decryption of the encrypted message.Type: GrantFiled: October 23, 2012Date of Patent: May 30, 2017Assignee: Trend Micro IncorporatedInventor: Andrew Dancer
-
Patent number: 9661001Abstract: Embodiments of the present disclosure provide a user interface that enables a user to more easily identify servers that may be used to set access permissions for content items. The method and system described herein includes receiving user credentials that are associated with a user. In response to receiving the user credentials, one or more servers associated with the user credentials are displayed. The one or more servers are configured to manage information rights for a content item created by the user. Upon receiving a selection of one of the one or more servers, a list of one or more templates supported by the selected server is displayed to the user. The one or more templates identify information rights that may be applied to the content item.Type: GrantFiled: June 29, 2015Date of Patent: May 23, 2017Assignee: Microsoft Technology Licensing, LLCInventor: Samantha Schumacher
-
Patent number: 9659161Abstract: An authentication management system for managing use of a processing apparatus includes an authentication management apparatus including a position storing unit to store position information of the processing apparatus; a receiving unit to receive user information that identifies a portable terminal to be used for authenticating when a user requests the processing apparatus via a requester to perform a target process; a determination unit to determine whether distance between the portable terminal and the processing apparatus satisfies a proximity determination condition between the portable terminal and the processing apparatus, the distance being obtained based on position information of the portable terminal received from the portable terminal, and the position information of the processing apparatus; and an authentication unit to conduct authentication processing based on user information received from the requester, and the user information received from the portable terminal when the distance satisfiesType: GrantFiled: October 24, 2014Date of Patent: May 23, 2017Assignee: Ricoh Company, Ltd.Inventor: Kenta Nakao
-
Patent number: 9660972Abstract: A credential, such as a password, for an entity is used to generate multiple keys. The generated keys are distributed to credential verification systems to enable the credential verification systems to perform authentication operations. The keys are generated such that access to a generated key allows for authentication with a proper subset of the credential verification systems. Thus, unauthorized access to information used by one authentication system does not, by itself, allow for successful authentication with other authentication systems.Type: GrantFiled: June 25, 2012Date of Patent: May 23, 2017Assignee: Amazon Technologies, Inc.Inventors: Gregory B. Roth, Graeme D. Baer
-
Patent number: 9654544Abstract: A method, system and apparatus for time-out management for session-dependent applications. A time-out management system can include one or more of pages defining a session-dependent application. The system further can include a server-side time-out manager configured for use in a content server in detecting a time-out condition in the session-dependent application when the session-dependent application has been distributed to a content client. Finally, the system can include at least one client-side time-out manager configured to detect activity for the session-dependent application and to notify the content server when activity is detected in the session-dependent application when the session-dependent application has been distributed to the content client.Type: GrantFiled: July 19, 2004Date of Patent: May 16, 2017Assignee: International Business Machines CorporationInventors: Laurent D. Hasson, Jianren Li, Qun Zhou
-
Patent number: 9648055Abstract: A processing device executing an application that is logged in to a user account recognized by a registration service receives information identifying a device that has not been bound to any user account, wherein the application supports a plurality of registration techniques. The processing device identifies a registration technique supported by the device that is to be used for registration of the device. The processing device performs at least one of sending information associated with the registration technique to the device or receiving the information associated with the registration technique. The processing device sends the information associated with the registration technique to the registration service, and then receives a message from the registration service, wherein the message indicates that the information satisfied a criterion of the registration technique and comprises a notification that the device is bound to the user account.Type: GrantFiled: October 15, 2014Date of Patent: May 9, 2017Assignee: Ayla Networks, Inc.Inventors: Vishwesh Pai, Sudha Sundaresan, Adrian Caceres
-
Patent number: 9628268Abstract: Systems and methods are disclosed for facilitating remote key management services in a collaborative cloud-based environment. In one embodiment, the remote key management architecture and techniques described herein provide for local key encryption and automatic generation of a reason code associated with content access. The reason code is used by a remote client device (e.g., an enterprise client) to control a second (remote) layer of key encryption. The remote client device provides client-side control and configurability of the second layer of key encryption.Type: GrantFiled: October 17, 2013Date of Patent: April 18, 2017Assignee: Box, Inc.Inventors: Andy Kiang, Chris Byron, Jeffrey Queisser
-
Patent number: 9619262Abstract: Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security checks are executed against the VM in the isolated environment. Results from the security checks are then reported.Type: GrantFiled: May 31, 2011Date of Patent: April 11, 2017Assignee: Micro Focus Software Inc.Inventors: Jason Allen Sabin, Michael John Jorgensen, Lloyd Leon Burch, Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Matthew Holt
-
Patent number: 9621554Abstract: The present disclosure describes a network appliance and associated access policy protocol (APP) that communicates and obeys access policies within a network. The network appliance (APP node) propagates access policies to other APP nodes that can utilize the policies most effectively. When an access policy reaches the network boundary, intra network bandwidth is optimized. The access policies may be distributed and executed in the cloud—e.g. proxy firewall, proxy policy execution.Type: GrantFiled: June 26, 2012Date of Patent: April 11, 2017Assignee: Cisco Technology, Inc.Inventors: Rodney Fong, Jaya Sreedharan, Vinayak Kumar
-
Patent number: 9614668Abstract: In a general aspect, a conversion scheme is used with a cryptographic system. In some aspects, a pad bit vector is generated based on a size of a message bit vector, and a record bit vector is generated based on the pad bit vector. The record bit vector indicates the size of the pad bit vector. The record bit vector, the message bit vector, and the pad bit vector are combined to yield a first bit vector. A hash function is applied to the first bit vector, and an encryption function is applied to a portion of the first bit vector. A ciphertext is generated based on the output of the hash function and the output of the encryption function.Type: GrantFiled: September 14, 2016Date of Patent: April 4, 2017Assignee: ISARA CorporationInventors: Sean Simmons, Jiayuan Sui
-
Patent number: 9614837Abstract: Exemplary methods and systems for verifying human interaction with a computer interface are described herein. An exemplary method includes a human-interaction verification system detecting a request by an access device to access network-based content, providing, for display by the access device, a visually dynamic representation of one or more security images associated with a passcode in response to the access request, receiving, by way of the access device, challenge-response input associated with the visually dynamic representation of the one or more security images, and performing an access operation based at least in part on a comparison of the challenge-response input to the passcode.Type: GrantFiled: August 27, 2014Date of Patent: April 4, 2017Assignee: Verizon Patent and Licensing Inc.Inventors: Steven T. Archer, Robert A. Clavenna, II, Kristopher Pate, Paul V. Hubner
-
Patent number: 9613211Abstract: A computer-implemented method for identifying suspicious text-messaging applications on mobile devices may include (1) identifying at least one outgoing text message on a mobile device, (2) analyzing at least one attribute of the outgoing text message identified on the mobile device, (3) determining that the outgoing text message is illegitimate based at least in part on analyzing the attribute of the outgoing text message, (4) identifying, in response to the determination, a suspicious text-messaging application that created the illegitimate outgoing text message on the mobile device, and then (5) performing, in response to the determination, at least one security action on the suspicious text-messaging application to prevent the suspicious text-messaging application from creating additional illegitimate text messages on the mobile device. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 10, 2012Date of Patent: April 4, 2017Assignee: Symantec CorporationInventors: Joseph Chen, Rui Jing
-
Patent number: 9613242Abstract: A system having a UHF RFID transceiver is adapted to communicate exclusively with a single electro-magnetically coupled transponder located in a predetermined confined transponder operating region. The system includes a near field coupling device comprising a plurality of lines connected in parallel with an unmatched load. The near field coupling device may be formed, for example on a printed circuit board with a plurality of electrically interconnected traces and a ground plane. The system establishes, at predetermined transceiver power levels, a mutual electro-magnetic coupling which is selective exclusively for a single transponder located in a defined transponder operating region. Also included are methods for selective communication with the transponder in an apparatus such as a printer-encoder.Type: GrantFiled: October 31, 2013Date of Patent: April 4, 2017Assignee: ZIH Corp.Inventors: Karl Torchalski, Daniel F. Donato