Patents Examined by Thaddeus Plecha
-
Patent number: 10103872Abstract: Systems and methods include establishing a cryptographically secure communication between an application module and an audio module. The application module is configured to execute on an information-handling machine, and the audio module is coupled to the information-handling machine. The establishment of the cryptographically secure communication may be at least partially facilitated by a mutually trusted module.Type: GrantFiled: September 26, 2014Date of Patent: October 16, 2018Assignee: INTEL CORPORATIONInventors: Pradeep M. Pappachan, Reshma Lal, Rakesh A. Ughreja, Kumar N. Dwarakanath, Victoria C. Moore
-
Patent number: 9992177Abstract: A method and system for modifying an authenticated and/or encrypted message by a modifying party exchanged between a sending party and a receiving party based on a secure communication protocol, the method includes the steps of a) dividing a clear message into non-modifiable parts and modifiable parts by the sending party; b) including modifiable part information into the message by the sending party; c) authenticating and/or encrypting the message by the sending party; d) providing en- and decryptability and/or authenticability of the message to the modifying party in such a way that the modifying party can only modify the modifiable parts of the message; e) modifying one or more modifiable parts by the modifying party; and f) providing an authenticated and/or encrypted modified message according to the secure communication protocol to the receiving party.Type: GrantFiled: April 5, 2013Date of Patent: June 5, 2018Assignee: NEC CorporationInventors: Sebastian Gajek, Jan Seedorf, Oezguer Dagdelen
-
Patent number: 9990476Abstract: An interactive streaming media and application service provider system can securely stream high resolution, multiple formats of video and data. Different data sets can be included in a single stream. A rights management system controls matrix manipulation and other aspects of user control of the data, including one or more of rendering in various different 2D, 3D, or other media formats, reconstruction and modeling, zooming, frame grab, print frame, parental controls, picture in picture, preventing unauthorized copying, adapting to different data transmission formats, adapting to different resolutions and screen sizes, and actively control functionality contained in embedded data, encryption/decryption. Control can be exerted by an external entity through a user-side virtual machine. Control codes can optionally be embedded in the media, embedded in the user's device, and/or sent separately to the device.Type: GrantFiled: June 26, 2017Date of Patent: June 5, 2018Assignee: TailStream Technologies, LLCInventor: Kelley Wise
-
Patent number: 9953169Abstract: Example embodiments disclosed herein relate to modifying execution of an application under test to act as if a user is a power user. The application under test is hosted in a real-time modifier. A security crawl is performed on the application under test logged in as the user. The user is treated as a power user.Type: GrantFiled: February 28, 2013Date of Patent: April 24, 2018Assignee: Entit Software LLCInventors: Sam Ng Ming Sum, Matias Madou
-
Patent number: 9948619Abstract: A system and method for protecting streams in a mixed infrastructure includes determining processing elements that are to access a data stream in a stream processing environment and determining a security level for each processing element. Keys are generated per stream per processing element in accordance with the security level. The keys are associated with processing elements in an access control list in a location accessible by producing and consuming processing elements. The stream is decrypted for processing using keys released upon authenticating processing elements in accordance with the access control list. At security boundaries, the stream is re-encrypted in accordance with a next processing element.Type: GrantFiled: November 20, 2015Date of Patent: April 17, 2018Assignee: International Business Machines CorporationInventors: Frederick Douglis, Zachary Garbow, Fan Ye
-
Patent number: 9942750Abstract: Disclosed is an apparatus, system, and method to decrypt an encrypted account credential at a second device that is received from a first device. The second device may receive a first share of a master key and the encrypted account credential from the first device. The second device may reconstruct the master key with the first share of the master key and a second share of the master key stored at the second device. The second device may decrypt the encrypted account credential with the reconstructed master key. Based upon the decrypted account credential, the second device may be enabled to access an account based upon the decrypted account credential.Type: GrantFiled: January 23, 2013Date of Patent: April 10, 2018Assignee: QUALCOMM IncorporatedInventors: Cameron A. McDonald, Matthew C. Duggan, Craig M. Brown
-
Patent number: 9917791Abstract: In an approach, a first application executing on a first computer acquires, one or more resources of the first computer, wherein the one or more resources include one or more shared resources that are shared among applications of the first computer. The first application receives a media stream from a second computer and presents playback of the media stream. In response to detecting that priority within the first computer has shifted to a second application, the first application pauses playback of the media stream and releases the one or more shared resources while retaining one or more remaining resources that relate to a session context. In response to detecting that priority has shifted back to the first application, the first application re-acquires the one or more shared resources and resumes playback of the media stream based on the one or more remaining resources.Type: GrantFiled: September 26, 2014Date of Patent: March 13, 2018Assignee: NETFLIX, INC.Inventors: Francois Goldfain, Shaomei Chen
-
Patent number: 9916449Abstract: Disclosed are devices, systems, apparatus, methods, products, media, and other implementations, including a method that includes computing for one or more inputs of a circuit associated metrics representative of degree of influence that values of each of the one or more inputs have on at least one output dependent on the one or more inputs, and determining based, at least in part, on the computed metrics associated with the one or more inputs of a more inputs whether the at least one output dependent on the one or more inputs is part of a potentially malicious implementation.Type: GrantFiled: November 12, 2013Date of Patent: March 13, 2018Assignee: The Trustees of Columbia University in the City of New YorkInventors: Lakshminarasimhan Sethumadhavan, Adam Waksman, Matthew Suozzo
-
Patent number: 9904810Abstract: An electronic device with data protection features in case of unauthorized disassembly includes top cover, bottom cover, a printed circuit board (PCB) fixed on the top cover, and a plate coupled to the bottom cover. The PCB includes a plurality of terminal couplers and a protruding portion. The plate includes a plurality of terminal grooves and a latching member. At least two signal terminals are correspondingly received in at least two of the plurality of terminal grooves. When the signal terminals are electrically connected to the terminal couplers, a first relation signal, which is dependent upon the electrical paths defined by the signal terminals in the terminal grooves, is generated to enable the electronic device. When the signal terminals are not connected to the original terminal couplers, a second and different relation signal is generated by the PCB to disable the electronic device.Type: GrantFiled: December 30, 2015Date of Patent: February 27, 2018Assignees: NANNING FUGUI PRECISION INDUSTRIAL CO., LTD., HON HAI PRECISION INDUSTRY CO., LTD.Inventor: Ying-Jui Huang
-
Patent number: 9904802Abstract: A system on chip having two or more responder units and two or more protection units is provided. Each of the responder units comprises a set of responder elements. Each of the protection units is associated with and protects one of the responder units and is arranged to provide a group mapping. The group mapping assigns one or more group identifiers to each of the responder elements of the respective responder unit.Type: GrantFiled: November 23, 2012Date of Patent: February 27, 2018Assignee: NXP USA, Inc.Inventors: Michael Rohleder, Stefan Singer, Manfred Thanner
-
Patent number: 9900320Abstract: The invention provides a mobile station comprising a mobile end device, security resources, and a discovery module implemented in the mobile station, with which the security resources of the mobile station are discoverable, at least one security level of the mobile station that is achievable by means of the security resources is derivable, and derived security levels of the mobile station are outputable. Further, there are stated an application loading system having such a mobile station, and a risk assessment system for mobile stations.Type: GrantFiled: April 14, 2014Date of Patent: February 20, 2018Assignee: GIESECKE + DEVRIENT MOBILE SECURITY GMBHInventors: Claus Dietze, Gero Galka
-
Patent number: 9876789Abstract: The present disclosure provides methods and systems for secure logon. One or more method includes: determining, via authentication information provided by a user of an electronic device, that the user is authorized to access an online account provided by the online account provider; providing the user with a selectable option to enable an expedited logon process by which the user can access the online account by solely providing a particular authentication item of the user; receiving a verification credential in response to a next logon attempt using the expedited logon process; and verifying that the received verification credential matches an assigned verification credential provided to the user for use in conjunction with the next logon attempt using the expedited logon process.Type: GrantFiled: April 3, 2015Date of Patent: January 23, 2018Assignee: United Services Automobile Association (USAA)Inventors: Thomas B. Buckingham, Richard A. Davey, Tammy Sanclemente, Ryan M. Johnson, Adam J. Leatham, Christopher Thomas Wilkinson
-
Patent number: 9860273Abstract: A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such communications for purposes of identifying communication issues that may affect user QoE (quality of experience). In certain embodiments, an application may be modified to log communication data before encryption and after decryption. For example, the application program may be decompiled and logging instructions may be inserted before portion that result in data encryption and after portions where received data is decrypted. The modified application program may then be recompiled and executed on a device to produce an unencrypted log of data. In other embodiments, elements of the device operating system may be modified to log data before encryption and after decryption.Type: GrantFiled: October 9, 2015Date of Patent: January 2, 2018Assignee: T-Mobile USA, Inc.Inventor: Peter P. Myron
-
Patent number: 9858402Abstract: A multi-party security protocol that incorporates biometric-based authentication and withstands attacks against any single party (e.g., mobile phone, cloud, or the user). The protocol involves the function split between mobile and cloud and the mechanisms to chain-hold the secrets. A key generation mechanisms binds secrets to a specific device or URL (uniform resource locator) by adding salt to a master credential. An inline CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) handling mechanism uses the same sensor modality as the authentication process, which not only improves the usability, but also facilitates the authentication process. This architecture further enhances existing overall system security (e.g., handling untrusted or compromised cloud service, phone being lost, impersonation, etc.) and also improves the usability by automatically handling the CAPTCHA.Type: GrantFiled: August 21, 2015Date of Patent: January 2, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Guobin Shen, Fan Yang, Lidong Zhou
-
Patent number: 9860224Abstract: Techniques for improving security of transactions requesting user authentication data entry via mobile devices are described herein. The mobile device is configured to wirelessly communicate using a near field communications (NFC) standard used to communicate over very short distances. The mobile device includes a graphical user interface (GUI) configured to display a virtual keypad arranged in a randomly generated pattern, the pattern being configured to be changed in a random manner at each instance of displaying the virtual keypad. Security of transaction is improved by randomly changing positions of virtual keys of the virtual keypad configured to receive the user authentication data.Type: GrantFiled: December 15, 2011Date of Patent: January 2, 2018Assignee: Intel CorporationInventor: Arupratan Gupta
-
Patent number: 9860261Abstract: A computer-implemented method and system for analyzing and maintaining data security in backup data, comprising of: accessing backup data of file systems on-site or remotely from a backup server; determining which data is present in a backup system; defining an abnormality data selection criteria to identify security components within the scope of said backup system; performing a data security analysis on backup data; if data abnormality in data are detected in backup data, determining compromised target files, identifying all other files created or modified associated with said compromised target files, including files having a parent-child relationship in both up and down directions of the parent-child tree, including files that are other children of the compromised files in the parent-child tree, including files created or modified by of the compromised files, and including data launched from those files.Type: GrantFiled: October 12, 2015Date of Patent: January 2, 2018Inventors: Guy Halfon, Boaz Apt
-
Patent number: 9853944Abstract: Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service is integrated within a network security appliance by automatically configuring access settings for the logging service and creating an account for the security appliance with the logging service. A log is created within the logging service by making use of the automatically configured access settings and the account. A request is received by the security appliance to access data associated with the log. Responsive thereto and without requiring separate registration of a network administrator with the cloud-based logging service, the data is retrieved by the security appliance from the logging service and is presented via a graphical user interface of the security appliance.Type: GrantFiled: August 14, 2016Date of Patent: December 26, 2017Assignee: Fortinet, Inc.Inventor: Jun Yin
-
Patent number: 9853977Abstract: Particular systems, methods, and program products for web-based security systems for user authentication and processing in a distributed computing environment are disclosed. A computing sub-system may receive an electronic processing request and a first signed data packet having a first payload that was hashed and encrypted using a first private key. The first payload may comprise first processing output and a first timestamp. The sub-system may verify the first signed data packet by decrypting it using a first public key. The sub-system may execute computing operations to satisfy the electronic processing request, producing second processing output. The sub-system may configure a data packet with a second payload comprising at least the second processing output and a second timestamp. The sub-system may encrypt the second payload using a second private key producing a second signed data packet. The sub-system may transmit to a second sub-system the second signed data packet.Type: GrantFiled: January 26, 2016Date of Patent: December 26, 2017Assignee: WINKLEVOSS IP, LLCInventors: Andrew Laucius, Cem Paya, Eric Winer
-
Patent number: 9846781Abstract: Example embodiments disclosed herein relate to unused parameters. A request to a web page of an application under test is made. It is determined whether the web page includes one or more unused parameter fields. Another request to the web page of the application under test is made using one or more parameters corresponding to the unused parameter fields.Type: GrantFiled: April 19, 2013Date of Patent: December 19, 2017Assignee: EntIT Software LLCInventors: Nidhi GovindRam Kejriwal, Ronald Joseph Sechman, Sasi Siddharth Muthurajan
-
Patent number: 9843567Abstract: Provision of a wireless network service is described in relation to network security. Automatic authentication is performed on an object entering a first area, and when the object passing the authentication in the first area enters a second area, the object is authorized to obtain a network service. An area (e.g., a first area) where a Wireless Local Area Network (WLAN) is used securely is divided, so that after an object device completes automatic authentication in this area, to the object can be directly authorized in a larger area (a second area) to obtain the network service. In this case, both security and convenience of use of the WLAN are considered.Type: GrantFiled: December 10, 2013Date of Patent: December 12, 2017Assignee: BEIJING ZHIGU RUI TUO TECH CO., LTD.Inventors: Hongjiang Zhang, Weicai Huang