Patents Examined by Thanhnga B. Truong
-
Patent number: 10083314Abstract: A secret parallel processing device reducing communication amount includes: a randomization unit that obtains a non-randomized input sequence and outputs a randomized sequence obtained by joining the non-randomized sequence and a dummy record sequence formed of a disclosed value and subjecting the joined sequences to random replacement processing and concealed random replacement data obtained by concealing used random replacement data; a calculation unit that obtains the non-randomized sequence, the randomized sequence, and the dummy record sequence, applies a predetermined function to the sequences, and generates an output checksum for each sequence by using calculation procedure data used in the processing of applying the function; and a correctness verification unit that obtains the output checksum for each sequence and the concealed random replacement data, assesses the output checksum for each sequence, and outputs a final test result determining whether the predetermined function has been correctly applType: GrantFiled: October 3, 2014Date of Patent: September 25, 2018Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
-
Patent number: 10075431Abstract: A method, a system, and computer readable medium comprising instructions for image capture to enforce remote agent adherence. The method comprises a first computer receiving an authentication request. The method also comprises a client component executing on the first computer detecting the authentication request and the client component, based on detecting the authentication request, causing a digital image to be captured. The method also comprises the first computer transmitting the digital image to a second computer, the second computer analyzing the digital image, and the second computer authenticating the digital image based on the analysis.Type: GrantFiled: September 29, 2015Date of Patent: September 11, 2018Assignee: West CorporationInventors: Eric A. Grun, April Lynn Peek, Chad Lynn Brockman, Trent Larson
-
Patent number: 10075435Abstract: A fulfillment service may securely register and deregister third party electronic devices within a fulfillment environment. The fulfillment service may receive a service request from an electronic device. The fulfillment service may determine that the service request includes a deregistration token. Further, the fulfillment service may identify the electronic device associated with deregistration token. In response, the fulfillment service may delete fulfillment service information associated with the electronic device in response to determining the electronic device has been deregistered. In addition, the fulfillment service may send a service response to the electronic device instructing the electronic device to delete the deregistration token. In some cases, the service request may include a registration attempt. As such, the service response may include a security token for the electronic device.Type: GrantFiled: December 19, 2014Date of Patent: September 11, 2018Assignee: Amazon Technologies, Inc.Inventors: Nicholas Ray Byrd, Andrew Jay Roths
-
Patent number: 10069855Abstract: A method for identifying security vulnerabilities in a third party software component includes generating a test application for the third party software component. The test application is generated such that every externally accessible data path in the third party component is called. The test application and the third party software component are analyzed using a static application security testing (SAST) code analyzer. One or more test results are obtained from the SAST code analyzer. The one or more test results are used to identify security vulnerabilities in the third party component.Type: GrantFiled: January 8, 2016Date of Patent: September 4, 2018Assignee: Wells Fargo Bank, N.A.Inventors: Jeremy W. Long, Mitch Moon
-
Patent number: 10057056Abstract: A method for generating a secret cryptographic key, which is common to a first node and a second node, with the aid of at least one helper node. The first node wirelessly transmits a first random sequence, the second node receives the first random sequence via a generally static reciprocal first communication channel, the second node receives a first signal, which is a function of the first random sequence, with the aid of the helper node, the second node derives the key from the first signal using the first random sequence, the second node wirelessly transmits a second random sequence, the first node receives the second random sequence, the first node receives a second signal, which is a function of the second random sequence, with the aid of the helper node, and derives the key from the second signal with the aid of the second random sequence.Type: GrantFiled: April 21, 2016Date of Patent: August 21, 2018Assignee: ROBERT BOSCH GMBHInventor: Rene Guillaume
-
Patent number: 10050967Abstract: A user's access to software applications installed on a device is limited by evaluating the context in which the user requests access to the application and determining, based on the context analysis, whether or not the user is to be given access to the application. When it is determined that the user requesting access is not a primary authorized user, the primary authorized user may be notified of the attempt to access the application.Type: GrantFiled: February 18, 2014Date of Patent: August 14, 2018Assignee: NAGRAVISION S.A.Inventors: Olivier Brique, Salvatore Bocchetti
-
Patent number: 10050961Abstract: A method, performed by an authentication processor of a first network device, includes receiving a first message through a network interface circuit from a second network device. The first message contains a first data unit to be operated upon by the first network device. A second message is received through the network interface circuit from the second network device. The second message contains a reported authentication token for the second network device and a second data unit to be operated upon by the first network device. The first message is received before receipt of the second message. A check authentication token is generated based on hashing the first data unit. A command that controls operation of the first network device is selectively performed on the second data unit based on whether the check authentication token matches the reported authentication token.Type: GrantFiled: January 21, 2016Date of Patent: August 14, 2018Assignee: CA, INC.Inventors: Jameel Ahmed Kaladgi, Praveen Kumar Thakur, Kiran Kumar B. S.
-
Patent number: 10050960Abstract: A method of adding a user account to an unassociated device may include detecting, by an associated device that is associated with a user account, an audio signal broadcast by an unassociated device that is not associated with the user account, where the audio signal includes a token. The method may include sending the token to a computing device associated with a service provider of the user account, receiving, by the associated device, a command, determining that the received command is an authorization command, and in response to determining that the received command is an authorization command, sending one or more authorization instructions to the computing device. The one or more authorization instructions may instruct the computing device to send one or more credentials associated with the user.Type: GrantFiled: August 24, 2016Date of Patent: August 14, 2018Assignee: Google LLCInventors: Alexei Czeskis, Dirk Balfanz
-
Patent number: 10042996Abstract: A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry is used to communicate with that target device using an authenticated identity of the user.Type: GrantFiled: November 25, 2015Date of Patent: August 7, 2018Assignee: ARM IP LimitedInventors: Krisztian Flautner, Hugo John Martin Vincent, Amyas Edward Wykes Phillips, Robert George Taylor
-
Patent number: 10038701Abstract: According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data convergence protocol (PDCP) control plane data unit; performing an integrity check on the at least one PDCP control plane data unit; identifying an integrity check failure with regard to the at least one PDCP control plane data unit; and performing a re-establishment procedure if the integrity check failure is identified to exist with regard to the at least one PDCP control plane data unit.Type: GrantFiled: August 24, 2015Date of Patent: July 31, 2018Assignee: LG ELECTRONICS INC.Inventors: Seung June Yi, Sung Jun Park, Young Dae Lee, Sung Duck Chun
-
Patent number: 10033741Abstract: A communication method and system according to the present invention generates a unique cryptographically secure URI in response to receiving a user post. The user post and URI are stored temporarily. The URI is sent to an intended recipient. In response to a first instance of accessing the URI, the content is retrieved and sent to the intended recipient. The original uploaded content and URI are then deleted. In response to subsequent instances of accessing the URI, random content determined in part by a current environmental state of the communication, is returned. Recent subsequent instances can return thematically similar content.Type: GrantFiled: March 17, 2017Date of Patent: July 24, 2018Assignee: BLINK.CLOUD LLCInventor: Jonathan S. Luzader
-
Patent number: 10032022Abstract: Embodiments of the presently disclosed invention provide a method and system for providing self-protecting code. In particular, embodiments provide security modules that may be embedded in a plurality of apps installed on one or more devices. In one embodiment, a central app security system is provided that facilitates the deployment and management of the formation of apps embedded with the security module. With the help of the embedded security modules, the plurality of apps, which may be referred hereinafter as a “secured formation” of apps, perform automated and dynamic scans of other apps within the same formation to ensure the integrity of each app is maintained. Each app in the secured formation may also detect viruses, malware, spyware, and other malicious software contained in the secured formation and perform curative operations in response. In this manner, the apps in any given secured formation collectively ensure that sensitive user information is protected.Type: GrantFiled: December 30, 2015Date of Patent: July 24, 2018Assignee: JPMorgan Chase Bank, N.A.Inventors: Jeffrey Hague, John D. Rouse
-
Patent number: 9998486Abstract: Systems and computer-readable media are disclosed for utilizing one or more databases to detect a point of compromise (“POC”). A POC detection computing platform may receive data associated with a potential point of compromise from a first computing system. The POC detection computing platform may extract data associated with the potential point of compromise from one or more central servers and/or databases. The extracted data may then be analyzed to determine if a point of compromise has been detected. The POC detection computing platform may transmit the results of the analysis to a second computing system.Type: GrantFiled: February 11, 2016Date of Patent: June 12, 2018Assignee: Bank of America CorporationInventors: Kolt Bell, Brandon Weeks, Alvino Sarran, Michael Ayers-Morris, Alex Stapleton, Craig D. Widmann, John Tuders, Amijo Bearley
-
Patent number: 9998922Abstract: Methods and systems are provided for enabling a user to enroll with a security system and create access credentials via a mobile device. In particular, a mobile device user may use the mobile device to enter user information, including identification information, communicate the information to a manufacturer for creating access credentials associated with the user. The user information may be verified before it is sent to manufacturing. Verification may be based on rules stored in memory and can be configured to prevent fraud. In addition, aspects of the present disclosure anticipate that a user may monitor a status of manufacturing associated with the access credentials.Type: GrantFiled: March 6, 2014Date of Patent: June 12, 2018Assignee: ASSA ABLOY ABInventors: Mark Robinton, Nils Wahlander, Masha Leah Davis
-
Patent number: 9990500Abstract: Disclosed herein are techniques for determining vulnerabilities in applications under testing. It is determined whether a first database instruction of an application enters information into a database and whether a second database instruction thereof obtains said information from the database. If the first database instruction enters the information in the database and the second database instruction obtains the information therefrom, it is determined whether the application is vulnerable to entry of malicious code via the database.Type: GrantFiled: July 25, 2012Date of Patent: June 5, 2018Assignee: ENTIT SOFTWARE LLCInventors: Sasi Siddharth Muthurajan, Prajakta Subhash Jagdale, Leonid Promyshlyansky Bensman, Iftach Ragoler, Philip Edward Hamer
-
Patent number: 9977886Abstract: An identity of an entity (120) is authenticated at an authentication device (110) using at least one authentication process. The result of the authentication is indicated. The authentication result identifies at least the identity of the entity (120) and the at least one authentication process used to authenticate the identity of the entity (120).Type: GrantFiled: August 20, 2015Date of Patent: May 22, 2018Inventor: Paul Simmonds
-
Patent number: 9973508Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. In some embodiments, a computing platform may receive, from a contact feed generation computer system, one or more contact feeds comprising contact data identifying one or more contacts associated with one or more user accounts. The computing platform may analyze the one or more contact feeds to identify a first subset of user accounts of the one or more user accounts having one or more attributes associated with one or more predetermined account security concern characteristics. Subsequently, the computing platform may add the first subset of user accounts of the one or more user accounts to an alert table maintained by the computing platform, and may send, to an analyst computer system, alert table listing information identifying contents of the alert table maintained by the computing platform.Type: GrantFiled: February 11, 2016Date of Patent: May 15, 2018Assignee: Bank of America CorporationInventors: Kolt Bell, John Tuders, Alvino Sarran, Michael Ayers-Morris, Alex Stapleton, Craig D. Widmann, Paulette Price
-
Patent number: 9965625Abstract: Provided are a control system and an authentication device capable of detecting abnormality of a development device for distributing a control program and of preventing destruction and tampering of the program caused by the abnormality. To solve the above problem, there is provided: a control device that controls a controlled object; a development device that manages a plurality of control programs executed by the control device and sends the predetermined control program and information accompanying the control program to the network; and an authentication device having an authentication list storing the information accompanying the control program in association with the control program.Type: GrantFiled: September 5, 2014Date of Patent: May 8, 2018Assignee: Hitachi, Ltd.Inventors: Hiromichi Endoh, Tsutomu Yamada, Satoshi Ohkubo
-
Patent number: 9954901Abstract: A learning-based computer network security system may include a service delivery controller executing on one or more of hardware processors that receives requests for transmitting network flows to one or more destination machines via a communication network. The service delivery controller may group the network flows into one or more similarity groups, and direct the network flows in a particular similarity group to a learning-based security appliance instance designated for the particular similarity group. Based on receiving feedback from the security appliance instance, the service delivery controller may regroup the similarity groups, and/or redirect the network flows, and/or redistribute the training results between the appliances, and/or modify assignment of appliances to similarity groups.Type: GrantFiled: January 4, 2017Date of Patent: April 24, 2018Assignee: International Business Machines CorporationInventors: Katherine Barabash, Yaniv Ben-Itzhak, Hani T. Jamjoom, Anna Levin, Eran Raichstein, Shriram Rajagopalan
-
Patent number: 9953160Abstract: Methods, systems, and computer program products for applying multi-level clustering at scale to unlabeled data for anomaly detection and security are disclosed. A computer-implemented method may include receiving transactional data associated with a plurality of user accounts, analyzing the transactional data of the accounts in view of a clustering model, associating each of the accounts with one of multiple peer groups from the clustering model, detecting anomalous account behavior in a peer group in view of a scatteredness score computed for each account in the peer group where each scatteredness score is computed based on a neighborhood of accounts in the peer group determined for each respective account of the peer group, and creating a report comprising account and scatteredness score information for one or more of the accounts in the peer group associated with detected anomalous account behavior.Type: GrantFiled: October 13, 2015Date of Patent: April 24, 2018Assignee: PayPal, Inc.Inventors: Avani Goel Sharma, Fransisco Kurniadi