Patents Examined by Thanhnga B. Truong
  • Patent number: 10083314
    Abstract: A secret parallel processing device reducing communication amount includes: a randomization unit that obtains a non-randomized input sequence and outputs a randomized sequence obtained by joining the non-randomized sequence and a dummy record sequence formed of a disclosed value and subjecting the joined sequences to random replacement processing and concealed random replacement data obtained by concealing used random replacement data; a calculation unit that obtains the non-randomized sequence, the randomized sequence, and the dummy record sequence, applies a predetermined function to the sequences, and generates an output checksum for each sequence by using calculation procedure data used in the processing of applying the function; and a correctness verification unit that obtains the output checksum for each sequence and the concealed random replacement data, assesses the output checksum for each sequence, and outputs a final test result determining whether the predetermined function has been correctly appl
    Type: Grant
    Filed: October 3, 2014
    Date of Patent: September 25, 2018
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
  • Patent number: 10075431
    Abstract: A method, a system, and computer readable medium comprising instructions for image capture to enforce remote agent adherence. The method comprises a first computer receiving an authentication request. The method also comprises a client component executing on the first computer detecting the authentication request and the client component, based on detecting the authentication request, causing a digital image to be captured. The method also comprises the first computer transmitting the digital image to a second computer, the second computer analyzing the digital image, and the second computer authenticating the digital image based on the analysis.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: September 11, 2018
    Assignee: West Corporation
    Inventors: Eric A. Grun, April Lynn Peek, Chad Lynn Brockman, Trent Larson
  • Patent number: 10075435
    Abstract: A fulfillment service may securely register and deregister third party electronic devices within a fulfillment environment. The fulfillment service may receive a service request from an electronic device. The fulfillment service may determine that the service request includes a deregistration token. Further, the fulfillment service may identify the electronic device associated with deregistration token. In response, the fulfillment service may delete fulfillment service information associated with the electronic device in response to determining the electronic device has been deregistered. In addition, the fulfillment service may send a service response to the electronic device instructing the electronic device to delete the deregistration token. In some cases, the service request may include a registration attempt. As such, the service response may include a security token for the electronic device.
    Type: Grant
    Filed: December 19, 2014
    Date of Patent: September 11, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Nicholas Ray Byrd, Andrew Jay Roths
  • Patent number: 10069855
    Abstract: A method for identifying security vulnerabilities in a third party software component includes generating a test application for the third party software component. The test application is generated such that every externally accessible data path in the third party component is called. The test application and the third party software component are analyzed using a static application security testing (SAST) code analyzer. One or more test results are obtained from the SAST code analyzer. The one or more test results are used to identify security vulnerabilities in the third party component.
    Type: Grant
    Filed: January 8, 2016
    Date of Patent: September 4, 2018
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Jeremy W. Long, Mitch Moon
  • Patent number: 10057056
    Abstract: A method for generating a secret cryptographic key, which is common to a first node and a second node, with the aid of at least one helper node. The first node wirelessly transmits a first random sequence, the second node receives the first random sequence via a generally static reciprocal first communication channel, the second node receives a first signal, which is a function of the first random sequence, with the aid of the helper node, the second node derives the key from the first signal using the first random sequence, the second node wirelessly transmits a second random sequence, the first node receives the second random sequence, the first node receives a second signal, which is a function of the second random sequence, with the aid of the helper node, and derives the key from the second signal with the aid of the second random sequence.
    Type: Grant
    Filed: April 21, 2016
    Date of Patent: August 21, 2018
    Assignee: ROBERT BOSCH GMBH
    Inventor: Rene Guillaume
  • Patent number: 10050967
    Abstract: A user's access to software applications installed on a device is limited by evaluating the context in which the user requests access to the application and determining, based on the context analysis, whether or not the user is to be given access to the application. When it is determined that the user requesting access is not a primary authorized user, the primary authorized user may be notified of the attempt to access the application.
    Type: Grant
    Filed: February 18, 2014
    Date of Patent: August 14, 2018
    Assignee: NAGRAVISION S.A.
    Inventors: Olivier Brique, Salvatore Bocchetti
  • Patent number: 10050961
    Abstract: A method, performed by an authentication processor of a first network device, includes receiving a first message through a network interface circuit from a second network device. The first message contains a first data unit to be operated upon by the first network device. A second message is received through the network interface circuit from the second network device. The second message contains a reported authentication token for the second network device and a second data unit to be operated upon by the first network device. The first message is received before receipt of the second message. A check authentication token is generated based on hashing the first data unit. A command that controls operation of the first network device is selectively performed on the second data unit based on whether the check authentication token matches the reported authentication token.
    Type: Grant
    Filed: January 21, 2016
    Date of Patent: August 14, 2018
    Assignee: CA, INC.
    Inventors: Jameel Ahmed Kaladgi, Praveen Kumar Thakur, Kiran Kumar B. S.
  • Patent number: 10050960
    Abstract: A method of adding a user account to an unassociated device may include detecting, by an associated device that is associated with a user account, an audio signal broadcast by an unassociated device that is not associated with the user account, where the audio signal includes a token. The method may include sending the token to a computing device associated with a service provider of the user account, receiving, by the associated device, a command, determining that the received command is an authorization command, and in response to determining that the received command is an authorization command, sending one or more authorization instructions to the computing device. The one or more authorization instructions may instruct the computing device to send one or more credentials associated with the user.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: August 14, 2018
    Assignee: Google LLC
    Inventors: Alexei Czeskis, Dirk Balfanz
  • Patent number: 10042996
    Abstract: A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry is used to communicate with that target device using an authenticated identity of the user.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: August 7, 2018
    Assignee: ARM IP Limited
    Inventors: Krisztian Flautner, Hugo John Martin Vincent, Amyas Edward Wykes Phillips, Robert George Taylor
  • Patent number: 10038701
    Abstract: According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving at least one packet data convergence protocol (PDCP) control plane data unit; performing an integrity check on the at least one PDCP control plane data unit; identifying an integrity check failure with regard to the at least one PDCP control plane data unit; and performing a re-establishment procedure if the integrity check failure is identified to exist with regard to the at least one PDCP control plane data unit.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: July 31, 2018
    Assignee: LG ELECTRONICS INC.
    Inventors: Seung June Yi, Sung Jun Park, Young Dae Lee, Sung Duck Chun
  • Patent number: 10033741
    Abstract: A communication method and system according to the present invention generates a unique cryptographically secure URI in response to receiving a user post. The user post and URI are stored temporarily. The URI is sent to an intended recipient. In response to a first instance of accessing the URI, the content is retrieved and sent to the intended recipient. The original uploaded content and URI are then deleted. In response to subsequent instances of accessing the URI, random content determined in part by a current environmental state of the communication, is returned. Recent subsequent instances can return thematically similar content.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: July 24, 2018
    Assignee: BLINK.CLOUD LLC
    Inventor: Jonathan S. Luzader
  • Patent number: 10032022
    Abstract: Embodiments of the presently disclosed invention provide a method and system for providing self-protecting code. In particular, embodiments provide security modules that may be embedded in a plurality of apps installed on one or more devices. In one embodiment, a central app security system is provided that facilitates the deployment and management of the formation of apps embedded with the security module. With the help of the embedded security modules, the plurality of apps, which may be referred hereinafter as a “secured formation” of apps, perform automated and dynamic scans of other apps within the same formation to ensure the integrity of each app is maintained. Each app in the secured formation may also detect viruses, malware, spyware, and other malicious software contained in the secured formation and perform curative operations in response. In this manner, the apps in any given secured formation collectively ensure that sensitive user information is protected.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: July 24, 2018
    Assignee: JPMorgan Chase Bank, N.A.
    Inventors: Jeffrey Hague, John D. Rouse
  • Patent number: 9998486
    Abstract: Systems and computer-readable media are disclosed for utilizing one or more databases to detect a point of compromise (“POC”). A POC detection computing platform may receive data associated with a potential point of compromise from a first computing system. The POC detection computing platform may extract data associated with the potential point of compromise from one or more central servers and/or databases. The extracted data may then be analyzed to determine if a point of compromise has been detected. The POC detection computing platform may transmit the results of the analysis to a second computing system.
    Type: Grant
    Filed: February 11, 2016
    Date of Patent: June 12, 2018
    Assignee: Bank of America Corporation
    Inventors: Kolt Bell, Brandon Weeks, Alvino Sarran, Michael Ayers-Morris, Alex Stapleton, Craig D. Widmann, John Tuders, Amijo Bearley
  • Patent number: 9998922
    Abstract: Methods and systems are provided for enabling a user to enroll with a security system and create access credentials via a mobile device. In particular, a mobile device user may use the mobile device to enter user information, including identification information, communicate the information to a manufacturer for creating access credentials associated with the user. The user information may be verified before it is sent to manufacturing. Verification may be based on rules stored in memory and can be configured to prevent fraud. In addition, aspects of the present disclosure anticipate that a user may monitor a status of manufacturing associated with the access credentials.
    Type: Grant
    Filed: March 6, 2014
    Date of Patent: June 12, 2018
    Assignee: ASSA ABLOY AB
    Inventors: Mark Robinton, Nils Wahlander, Masha Leah Davis
  • Patent number: 9990500
    Abstract: Disclosed herein are techniques for determining vulnerabilities in applications under testing. It is determined whether a first database instruction of an application enters information into a database and whether a second database instruction thereof obtains said information from the database. If the first database instruction enters the information in the database and the second database instruction obtains the information therefrom, it is determined whether the application is vulnerable to entry of malicious code via the database.
    Type: Grant
    Filed: July 25, 2012
    Date of Patent: June 5, 2018
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Sasi Siddharth Muthurajan, Prajakta Subhash Jagdale, Leonid Promyshlyansky Bensman, Iftach Ragoler, Philip Edward Hamer
  • Patent number: 9977886
    Abstract: An identity of an entity (120) is authenticated at an authentication device (110) using at least one authentication process. The result of the authentication is indicated. The authentication result identifies at least the identity of the entity (120) and the at least one authentication process used to authenticate the identity of the entity (120).
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: May 22, 2018
    Inventor: Paul Simmonds
  • Patent number: 9973508
    Abstract: Aspects of the disclosure relate to deploying and utilizing a dynamic record identification and analysis computer system with event monitoring components. In some embodiments, a computing platform may receive, from a contact feed generation computer system, one or more contact feeds comprising contact data identifying one or more contacts associated with one or more user accounts. The computing platform may analyze the one or more contact feeds to identify a first subset of user accounts of the one or more user accounts having one or more attributes associated with one or more predetermined account security concern characteristics. Subsequently, the computing platform may add the first subset of user accounts of the one or more user accounts to an alert table maintained by the computing platform, and may send, to an analyst computer system, alert table listing information identifying contents of the alert table maintained by the computing platform.
    Type: Grant
    Filed: February 11, 2016
    Date of Patent: May 15, 2018
    Assignee: Bank of America Corporation
    Inventors: Kolt Bell, John Tuders, Alvino Sarran, Michael Ayers-Morris, Alex Stapleton, Craig D. Widmann, Paulette Price
  • Patent number: 9965625
    Abstract: Provided are a control system and an authentication device capable of detecting abnormality of a development device for distributing a control program and of preventing destruction and tampering of the program caused by the abnormality. To solve the above problem, there is provided: a control device that controls a controlled object; a development device that manages a plurality of control programs executed by the control device and sends the predetermined control program and information accompanying the control program to the network; and an authentication device having an authentication list storing the information accompanying the control program in association with the control program.
    Type: Grant
    Filed: September 5, 2014
    Date of Patent: May 8, 2018
    Assignee: Hitachi, Ltd.
    Inventors: Hiromichi Endoh, Tsutomu Yamada, Satoshi Ohkubo
  • Patent number: 9954901
    Abstract: A learning-based computer network security system may include a service delivery controller executing on one or more of hardware processors that receives requests for transmitting network flows to one or more destination machines via a communication network. The service delivery controller may group the network flows into one or more similarity groups, and direct the network flows in a particular similarity group to a learning-based security appliance instance designated for the particular similarity group. Based on receiving feedback from the security appliance instance, the service delivery controller may regroup the similarity groups, and/or redirect the network flows, and/or redistribute the training results between the appliances, and/or modify assignment of appliances to similarity groups.
    Type: Grant
    Filed: January 4, 2017
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Katherine Barabash, Yaniv Ben-Itzhak, Hani T. Jamjoom, Anna Levin, Eran Raichstein, Shriram Rajagopalan
  • Patent number: 9953160
    Abstract: Methods, systems, and computer program products for applying multi-level clustering at scale to unlabeled data for anomaly detection and security are disclosed. A computer-implemented method may include receiving transactional data associated with a plurality of user accounts, analyzing the transactional data of the accounts in view of a clustering model, associating each of the accounts with one of multiple peer groups from the clustering model, detecting anomalous account behavior in a peer group in view of a scatteredness score computed for each account in the peer group where each scatteredness score is computed based on a neighborhood of accounts in the peer group determined for each respective account of the peer group, and creating a report comprising account and scatteredness score information for one or more of the accounts in the peer group associated with detected anomalous account behavior.
    Type: Grant
    Filed: October 13, 2015
    Date of Patent: April 24, 2018
    Assignee: PayPal, Inc.
    Inventors: Avani Goel Sharma, Fransisco Kurniadi