Patents Examined by Teshome Hailu
  • Patent number: 10003610
    Abstract: An incident response system and method for tracking data security incidents in enterprise networks is disclosed. An Incident Manager application (IM) stores incident objects and incident artifacts (IAs) created in response to the incidents, where the incident objects include the information for the incident and the IAs are associated with data resources (e.g. IP addresses and malware hashes) identified within the incident objects. In response to creation of the IAs, the IM issues queries against one or more external threat intelligence sources (TISs) to obtain information associated with the IAs and augments the IAs with the obtained information. In examples, the IM can identify known threats by comparing the contents of IAs against TIS(s) of known threats, and can identify potential trends by correlating the created incident objects and augmented IAs for an incident with incident objects and IAs stored for other incidents.
    Type: Grant
    Filed: October 23, 2017
    Date of Patent: June 19, 2018
    Assignee: International Business Machines Corporation
    Inventors: Allen Hadden, Kenneth Allen Rogers
  • Patent number: 9973471
    Abstract: A protection method, which releases an attack of a malware to a firewall apparatus disposed at an application layer, includes processing a microbatching operation in a plurality of session channels and at at least an operational period according to at least one input information, to generate a plurality of session-specific firewall patterns; and merging the plurality of session-specific firewall patterns to generate an application-specific firewall pattern at the application layer, so as to dispose a script information corresponding to the application-specific firewall pattern in the firewall apparatus for releasing the attack of the malware, wherein the microbatching operation is processed to generate a plurality of independent subset-specific firewall patterns in each session channel, so as to generate a session-specific firewall pattern corresponding to each session channel.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: May 15, 2018
    Assignee: Wistron Corporation
    Inventor: Chih-Ming Chen
  • Patent number: 9967090
    Abstract: Systems and methods are provided for protecting identity in an authenticated data transmission. For example, a contactless transaction between a portable user device and an access device may be conducted without exposing the portable user device's public key in cleartext. In one embodiment, an access device may send an access device public key to a portable user device. The user device may return a blinded user device public key and encrypted user device data. The access device may determine a shared secret using the blinded user device public key and an access device private key. The access device may then decrypt the encrypted user device data using the shared secret.
    Type: Grant
    Filed: April 17, 2017
    Date of Patent: May 8, 2018
    Inventor: Eric Le Saint
  • Patent number: 9955350
    Abstract: A motion-based authentication method is operative in a mobile computing device having a display interface and that includes an accelerometer. Normally, the device software includes a locking mechanism that automatically locks the display interface after a configurable timeout. The authentication method operates to un-lock the display interface (and thus allow the user access to the device) by movement of the device in a predetermined series of physical movements and without display-based entry of a password or other access code on the display itself. In this manner, the user can un-lock the device without display-based entry of a password (on the display itself) by simply holding the device and performing the necessary movement(s) to generate the unique code.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: April 24, 2018
    Assignee: LogMeIn, Inc.
    Inventors: Zoran Vukoszavlyev, Marton B. Anka
  • Patent number: 9948604
    Abstract: Hybrid, configurable business process applications can be used in conjunction with features of a content management system. For example, a first content management system installation executes a workflow instance based on a business process application whose definition is maintained in by the first content management system installation and synchronizes a workflow state of the workflow instance to a second content management system installation using a mirrored workflow state in which both content of the workflow state and metadata characterizing parameters of the workflow state are mirrored from the first content management system repository to the second content management system repository such that a content item retained in the second content management system repository is accessed for use in the workflow instance via the mirrored workflow state at the second content management system repository. Methods, systems, and articles of manufacture are described.
    Type: Grant
    Filed: June 18, 2015
    Date of Patent: April 17, 2018
    Assignee: Alfresco Software, Inc.
    Inventors: David Caruana, Paul Holmes-Higgin
  • Patent number: 9946865
    Abstract: Systems and methods are disclosed that enable authentication based on a physical document. Specifically, a document authentication service is disclosed that utilizes characteristics of a physical document, such as an identification card already in a user's possession, to authenticate a user. In one embodiment, the characteristics of a document may be processed based at least in part on an expected wear of the document (e.g., from use by the user). Expected wear may be identified, for example, based on historical data gathered across a number of users of the document authentication service.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: April 17, 2018
    Assignee: Dragnet Solutions, Inc.
    Inventors: Stephen J. Krawczyk, Gregory M. Cote, Marc S. McClung
  • Patent number: 9935937
    Abstract: A method for implementing network security policies in a multi-tenant network environment may include receiving a request for implementation of at least one network security policy on one or more computing devices of a service provider cloud environment. The network security policy identified by the request may be retrieved. The network security policy may be encrypted using encrypting credentials of the one or more computing devices. Decrypting credentials corresponding to the encrypting credentials are stored in a Trusted Platform Module (TPM) within the one or more computing devices. The encrypted network security policy may be pushed to the one or more computing devices, for decryption and implementation at the one or more computing devices.
    Type: Grant
    Filed: November 5, 2014
    Date of Patent: April 3, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Nachiketh Rao Potlapally, Alexander Robin Gordon Lucas
  • Patent number: 9935966
    Abstract: A method, a system, and computer readable medium comprising instructions for message delivery security validation are provided. At least one authentication setting from an end user is received at a data collection system. A validation key is generated based on the at least one authentication setting. A message and the validation key are sent to a device of a recipient. The device of the recipient are automatically authenticated using the validation key. The message is delivered to the device of the recipient upon authentication.
    Type: Grant
    Filed: April 11, 2017
    Date of Patent: April 3, 2018
    Assignee: West Corporation
    Inventors: David C Mussman, Ronald Wayne Mathis, Bruce Andersen
  • Patent number: 9916459
    Abstract: Methods, systems, and computer program products for encrypting photograph metadata are provided. An image file is received. The image file includes digital image data and a plurality of data fields. A first data field of the plurality of data fields includes a first metadata. A rule set for modifying the first metadata is received. In response to determining that at least one rule of the rule set corresponds to the first metadata, the first metadata is encrypted based to create a second metadata. The second metadata is stored in the image file.
    Type: Grant
    Filed: August 21, 2015
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Erik Rueger, Tim U. Scheideler, Matthias Seul, Thomas A. Snellgrove
  • Patent number: 9906361
    Abstract: An apparatus comprises a storage system and a key manager incorporated in or otherwise associated with the storage system. The storage system comprises first storage of a first type and second storage of a second type with the first storage providing enhanced data protection relative to the second storage. The key manager is configured to maintain a master key hierarchy for the storage system. The master key hierarchy comprises a plurality of levels each including one or more master keys, with an uppermost level of the master key hierarchy comprising a root master key that is stored in the first storage and at least one lower level of the master key hierarchy comprising a plurality of master keys that are stored in the second storage under encryption by the root master key. Keys of a lowermost level of the master key hierarchy are associated with respective groups of data items.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: February 27, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Radia Perlman, Xuan Tang, Thomas Dibb, Greg Lazar
  • Patent number: 9898878
    Abstract: An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a security controller having standard network interface capabilities including IEEE 802.x and takes advantage of the convenience and security offered by smart cards and related devices for both physical and logical security purposes. The invention is based on standard remote authentication dial-in service (RADIUS) protocols or TCP/IP using SSL, TLS, PCT or IPsec and stores a shared secret required by the secure communication protocols in a secure access module coupled to the security controller. The security controller is intended to be a networked client or embedded intelligent device controlled remotely by to an authentication server. In another embodiment of the invention one or more life cycle management transactions are performed with the secure access module.
    Type: Grant
    Filed: April 12, 2017
    Date of Patent: February 20, 2018
    Assignee: Assa Abloy AB
    Inventors: Dominique Louis Joseph Fedronic, Wu Wen
  • Patent number: 9898326
    Abstract: Methods, systems, and computer program products are included for loading a code module. A method includes providing, by a hypervisor, a virtual machine that includes a guest operating system. The code module and a signature corresponding to the code module are sent by the guest operating system to the hypervisor. One or more relocations are applied to the code module. The hypervisor verifies the signature corresponding to the code module. After verifying the signature, the hypervisor allows the guest operating system to execute the code module.
    Type: Grant
    Filed: February 23, 2016
    Date of Patent: February 20, 2018
    Assignee: RED HAT ISRAEL, LTD.
    Inventors: Michael Tsirkin, Paolo Bonzini
  • Patent number: 9898617
    Abstract: The present disclosure relates to a computer system for querying a database residing on a server computer of the computer system, said database storing data records, the database further comprising a relation, wherein the relation comprises data items, wherein the data items are encrypted with a first encryption method in the relation, wherein the data items form a partially ordered set in the relation, the partial order being formed with respect to the data items in non-encrypted form, wherein a referential connection exists assigning each encrypted data item in the relation to a respective data record of the data records, wherein the encrypted data items are annotated with data elements of a linear order in the database, the linear order corresponding the order in which the encrypted data items are stored in the relation with respect to the partial ordered set, the computer system further comprising a client computer, the client computer being configured for sending to the server computer a request for data
    Type: Grant
    Filed: February 1, 2016
    Date of Patent: February 20, 2018
    Inventors: Jan Lehnhardt, Tobias Rho
  • Patent number: 9900300
    Abstract: In an approach for protecting against use of clones of electronic devices, a first sequence value is initialized on the server and an equal second sequence value is initialized on an electronic device. In response to a first login request to the server from a user operating the electronic device, the first and second sequence values are compared. If the values are equal, processing of the login process continues. Otherwise, the login request is rejected. If the login is successful, a next value is computed for the first and second sequence values, and the next first and second sequence values are stored on the server and on the electronic device, respectively.
    Type: Grant
    Filed: April 22, 2015
    Date of Patent: February 20, 2018
    Assignee: IONU Security, Inc.
    Inventors: David W. Bennett, Alan M. Frost
  • Patent number: 9892271
    Abstract: A device includes a thermal infrared sensor and a processor, operatively coupled to the thermal IR sensor. The processor is configured to determine that the device has been successfully unlocked by a user using a security procedure, obtain a thermal signature for the user using thermal sensor data from the thermal infrared sensor, monitor proximity of the user to the device using the thermal signature and maintain the device unlocked if the thermal signature is detectable and is within the detection proximity of the thermal infrared sensor.
    Type: Grant
    Filed: July 21, 2015
    Date of Patent: February 13, 2018
    Assignee: Motorola Mobility LLC
    Inventors: Amit Kumar Agrawal, Rachid M Alameh, Patrick J Cauwels
  • Patent number: 9893960
    Abstract: A device hub system includes: a control unit configured to: generate a workroom for providing access to a workroom accessible resource, including an enterprise multifunctional printer, protected by a network firewall; provide authentication for a participant device to access the workroom; receive a workroom request through the workroom; generate a workroom sharable information from the workroom request; and a communication unit, coupled to the control unit, configured to distribute the workroom sharable information within the workroom.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: February 13, 2018
    Inventors: Ramon Rubio, Joseph Yang, Wei-jhy Chern
  • Patent number: 9894055
    Abstract: An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An authentication response is generated based on credentials received from the user. The authentication response includes an assertion on behalf of the user. A delivery resource locator for the assertion is rewritten to a resource locator of a proxy in order to redirect the assertion to the proxy. The authentication response is sent to the client device together with the resource locator of the proxy in order to cause the client device to send the assertion to the proxy that decodes the re-written resource locator and sends the assertion to the service provider.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: February 13, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Vincent E. Parla, David McGrew, Andrzej Kielbasinski
  • Patent number: 9888029
    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
    Type: Grant
    Filed: August 12, 2015
    Date of Patent: February 6, 2018
    Assignee: Phantom Cyber Corporation
    Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
  • Patent number: 9876796
    Abstract: The field of the invention relates to network connected authentication systems, and more particularly to systems and methods that enable authentication of one or more users of a group using network connected devices. In an embodiment, the system includes a network connected authentication server coupled to a network for access by a plurality of user devices in a group to authenticate a user of one or more third party applications. When a user of the group visits a third party application and initiates a group authentication, the network connected authentication server retrieves authentication rules and sends authentication requests to the user devices of the group based on the authentication rules.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: January 23, 2018
    Assignee: iovation Inc.
    Inventors: Devin M. Egan, Yo Sub Kwon, Geoffrey R. Sanders, Christopher C. Shepherd, Kristin F. Tomasik
  • Patent number: 9871826
    Abstract: Systems and techniques are provided for creating sensor based rules for detecting and responding to malicious activity. Evidence corresponding to a malicious activity is received. The evidence corresponding to malicious activity is analyzed. Indicators are identified from the evidence. The indicators are extracted from the evidence. It is determined that an action to mitigate or detect a threat needs to be taken based on the indicators and evidence. A sensor to employ the prescribed action is identified. Whether a sensor based rule meets a threshold requirement is validated. A configuration file used to task the sensor based rule to the identified sensor is created. The number of sensor based rule triggers is tracked.
    Type: Grant
    Filed: January 24, 2017
    Date of Patent: January 16, 2018
    Assignee: Analyst Platform, LLC
    Inventors: Russell Scott Messick, Jason Daniel Smith