Patents Examined by Trang Doan
  • Patent number: 9734352
    Abstract: A computing device is described herein that automatically enters a data protection mode in response to determining that a certain number of persons are located proximate to the computing device, that an owner or authorized user is not located proximate to the computing device, or that a certain user gesture has or has not been recognized. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: August 15, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jerry Huang, Zhen Liu, QingHu Li, Chen Liu
  • Patent number: 9736154
    Abstract: A system and method are described for integrating an authentication service within an existing network infrastructure.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: August 15, 2017
    Assignee: Nok Nok Labs, Inc.
    Inventors: Brendon J. Wilson, Davit Baghdasaryan
  • Patent number: 9705879
    Abstract: A computing device, or a security component of a computing device, implements delayed attestation by initially providing first credentials to a remote access device to establish a first level of trust. The first credentials may be provided before or while the computing device or the security component is obtaining security information from a remote security device. The security information is used to generate second credentials that are subsequently provided to the remote access device to establish a second level of trust. The first credentials may comprise an encryption key that can be generated by the security component without having to retrieve information via a network, and the second credentials may comprise an attestation statement that is more trustworthy than the encryption key and that is generated based on a certificate retrieved from a remote security device (e.g., a certificate authority server).
    Type: Grant
    Filed: February 24, 2015
    Date of Patent: July 11, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anoosh Saboori, Victor W. Heller, Xiaohong Su, Dayi Zhou, Kinshuman Kinshumann, James Hugh Morgan, Stefan Thom
  • Patent number: 9697340
    Abstract: An administrative system generates a sequence of passwords by iterative evaluation of a hash function, initiated from a private key value and continuing to a final, public key value. A current token is created that includes a current one of the passwords. A protected device tests the validity of the current password by inputting it to a hash function sub-chain. The current password is considered valid if, after hashing the current password n+1 times, where n corresponds to the number of tokens previously received, the result is a revealed value, such as a previously verified password of the public key value. At least one unit of a one-time programmable hardware device, such as processor fuses or anti-fuses, is then physically and permanently altered, thereby incrementing a count entry indicating the number of tokens received. The protected device performs a desired action only if the current password is verified.
    Type: Grant
    Filed: June 14, 2015
    Date of Patent: July 4, 2017
    Assignee: GUARDTIME IP HOLDINGS, LTD.
    Inventor: Nicholas Child
  • Patent number: 9697375
    Abstract: A computing device is described that utilizes two file systems to enable sensitive data stored thereon to be deleted automatically, quickly, and discretely when the computing device is in a risky environment or context or when data protection has otherwise been activated. A first file system on the computing device manages a first memory area that stores non-sensitive data while a second file system on the computing device manages a second memory area that stores sensitive data. Only the first file system operates to receive data requests from other processes executing on the computing device. In a first operating mode, the first file system interacts with the second file system to ensure that both non-sensitive and sensitive data is returned in response to data requests. In a second operating mode, communication between the two file systems is disabled and the second file system deletes the sensitive data.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: July 4, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jerry Huang, Zhen Liu
  • Patent number: 9697349
    Abstract: Data loss prevention (DLP) systems may be implemented with collaborative services that may be integrated with or work in coordination with productivity services. Administrators may be enabled to configure DLP policies in the collaborative service to mitigate their organization's information disclosure risks, along with the detection and remediation of sensitive information. Access blocking may be a feature of the DLP system, where provision of access blocking may include determining if a detected action associated with content processed by the collaborative service matches access blocking criteria defined by DIP policy rules. In response to the determination that the action matches at least one access blocking criterion defined by the DLP policy rules, a block access tag associated with the content may be activated, previously defined permissions associated with the content may be ignored or altered, and access to the content may be restricted to a number of predefined users.
    Type: Grant
    Filed: February 24, 2015
    Date of Patent: July 4, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yu Li, Willard Bruce Jones, Ryan Wilhelm, Richard Wesley Holley
  • Patent number: 9692599
    Abstract: Techniques for security module endorsement are provided. An example method includes receiving a generalized endorsement key at a security module, wherein the security module is associated with a computing device and wherein the generalized endorsement key is independent of characteristics of the computing device, automatically extending integrity measurements stored in one or more registers of the security module with information characterizing the computing device, wherein the integrity measurements are based on one or more software processes at the computing device, digitally signing the extended integrity measurements with a digital signature, and generating a specialized endorsement credential as a combination of the digitally signed extended integrity measurements, the digital signature and the generalized endorsement key, wherein the specialized endorsement credential is used to validate authenticity of the security module.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: June 27, 2017
    Assignee: Google Inc.
    Inventor: Darren Krahn
  • Patent number: 9686245
    Abstract: A system and method for secure authentication performed on a mobile communication device. The method includes an authentication application carrying out the steps of: receiving a unique identifier for a transaction from a first application provided on the same mobile communication device as the authentication application; receiving an encrypted transaction from a remote secure server; decrypting or obtaining decryption of the transaction with a private key of the authentication application; signing or obtaining signing of the transaction with the private key; signing the transaction with the unique identifier; and transmitting the signed transaction back to the remote secure server.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: June 20, 2017
    Assignee: ENTERSEKT INTERNATIONAL LIMITED
    Inventor: Christiaan Johannes Petrus Brand
  • Patent number: 9686074
    Abstract: A method of encrypting information using a computational tag may include, by a mobile electronic device, detecting a computational tag within a near field communication range of the mobile electronic device, identifying a document to be encrypted by the mobile electronic device, transmitting the document to the computational tag by the mobile electronic device, receiving, from the computational tag, an encrypted document, wherein the encrypted document comprises an encrypted version of the document that was to be encrypted, and storing the encrypted document in a memory of the mobile electronic device.
    Type: Grant
    Filed: October 9, 2014
    Date of Patent: June 20, 2017
    Assignee: Xerox Corporation
    Inventors: Gavan Leonard Tredoux, Kanishk Jain
  • Patent number: 9686072
    Abstract: A system obtains assurance by a content provider that a content control key is securely stored in a remote security module for further secure communications between the content provider and the security module. A security module manufacturer, which has a pre-established trustful relation with the security module, imports a symmetric transport key into the security module. The symmetric transport key is unique to the security module. The content provider shares the symmetric transport key with the security module manufacturer. The content provider exchanging messages with the security module through a security module communication manager in order to get the proof that the security module stores the content control key. At least a portion of the messages exchanged between the content provider and the security module are protected using the symmetric transport key. The symmetric transport key is independent of said content control key.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: June 20, 2017
    Assignee: Assa Abloy AB
    Inventors: Dominique Fedronic, Eric Le Saint, John Babbidge, Hong Liu
  • Patent number: 9686294
    Abstract: Methods and systems for protecting components of a linked vehicle from cyber-attack are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; tunneling the packet to a terrestrial-based security service, analyzing whether the packet is harmful to a component in the vehicle, and at least one action to protect at least one component.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: June 20, 2017
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Alon Kantor, Tamir Zegman
  • Patent number: 9686251
    Abstract: Devices and techniques for controlling disclosure of sensitive information are provided. A request for information may be received through a first communication channel. The request may be provided using an account of a user. First encrypted data, which includes the requested information and has been encrypted with a first asymmetric encryption key, may be decrypted. The decrypted information may be re-encrypted with a second asymmetric encryption key different from the first asymmetric encryption key to obtain second encrypted data comprising the information. The second encrypted data may be sent to the user through a second communication channel different from the first communication channel.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: June 20, 2017
    Assignee: IGT UK INTERACTIVE LTD.
    Inventors: Slobodan Marinkovic, Goran Vuckovic, Amir Zolic, Maja Maljkovic
  • Patent number: 9686293
    Abstract: Systems and methods for monitoring malware events in a computer networking environment are described. The systems and methods including the steps of identifying suspect objects; transmitting the suspect objects to an inspection service, wherein the inspection service inspects the suspect objects using a plurality of inspection methods to create digital information about the nature of the potential threat posed by the suspect objects; transmitting said digital information to an analytical service operating, wherein the analytical service performs a plurality of analytical algorithms to categorize the suspect objects with one or more scores for each suspect object based on their security threat; transmitting said one or more scores to a correlation facility which aggregates a plurality of scores; and generating an infection verification pack comprising routines which, when run on an end-point machine within the computer networking environment, will mitigate a suspected security threat.
    Type: Grant
    Filed: February 23, 2015
    Date of Patent: June 20, 2017
    Assignee: Cyphort Inc.
    Inventors: Ali Golshan, Fengmin Gong, Frank Jas, Nick Bilogorskiy, Neal Vu, Chenghuai Lu, Alexander Burt, Manikandan Kenyan, Yucheng Ting
  • Patent number: 9684801
    Abstract: Some embodiments provide a program that provides data protection for a device when synchronizing a set of keychains stored on the device with a set of other devices. The program receives keychain data for synchronizing the set of keychains stored on the device with the set of other devices. The keychain data is specified as belonging to a protection domain. The program determines whether a set of conditions defined for the protection domain is satisfied. When the set of conditions is determined as satisfied, the program allows access to the keychain data in order to process the keychain data and synchronize the set of keychains stored on the device with the set of other devices.
    Type: Grant
    Filed: August 17, 2015
    Date of Patent: June 20, 2017
    Assignee: APPLE INC.
    Inventors: Michael Brouwer, Dallas B. De Atley, Mitchell D. Adler
  • Patent number: 9686266
    Abstract: An authentication scheme may be utilized for a single sign-on operation between servers. One or more servers (e.g., a SHAREPOINT server) receives a data request directed to a disparate server (e.g., an SAP server). A root certificate (e.g., an X.509 root certificate) is loaded for accessing the disparate server. A user certificate is dynamically generated for identifying a logged-in user. The user certificate is signed with the root certificate and sent to the disparate server for binding with the data request. The data request is sent to the disparate server for authentication using the user certificate. The disparate server accesses a mapping table to map a subject name in the user certificate. When an entry for the logged-in user is found in the mapping table, data operations are enabled between the servers. An open web protocol response containing the requested data is then received from the disparate server.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: June 20, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ajay Gupta, Sudeep Rastogi, Shyam Sundar Jayasankar, Diwakar Mantha
  • Patent number: 9684630
    Abstract: Disclosed are various embodiments of a first computing device for obtaining an authentication credential for a cryptographic module of a second computing device. The authentication credential is obtained via a communication session with a module interface of the second computing device. Configuration data is determined for the cryptographic module based at least in part upon the authentication credential. The configuration data is transmitted to the second computing device via the communication session.
    Type: Grant
    Filed: December 5, 2012
    Date of Patent: June 20, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Michael David Marr, Nachiketh Rao Potlapally, Matthew David Klein
  • Patent number: 9686309
    Abstract: Methods and systems for improved attack context data logging are provided. According to one embodiment, configuration information is received from an administrator of a network security device. The configuration information includes information indicative of a quantity of packets to be captured for post attack analysis. Responsive to receipt of the configuration information, a size of a circular buffer is configured based thereon. Multiple packets directed to a network protected by the network security device are received from an external network. The received packets are temporarily buffered within the circular buffer. An analysis is performed to determine whether one of the received packets is potentially associated with a threat or undesired activity (“trigger packet”).
    Type: Grant
    Filed: March 3, 2015
    Date of Patent: June 20, 2017
    Assignee: Fortinet, Inc.
    Inventors: Wei David Wang, Dayong Zhou, Ihab Khalil
  • Patent number: 9686312
    Abstract: In one embodiment, a device receives a classifier tracking request from a coordinator device that specifies a classifier verification time period. During the classifier verification time period, the device classifies a set of network traffic that includes traffic observed by the device and attack traffic specified by the coordinator device. The device generates classification results based on the classified set of network traffic and provides the classification results to the coordinator device.
    Type: Grant
    Filed: July 23, 2014
    Date of Patent: June 20, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Andrea Di Pietro, Jean-Philippe Vasseur, Javier Cruz Mota
  • Patent number: 9686077
    Abstract: Various technologies described herein pertain to a computing device that includes secure hardware (e.g., a TPM, a secure processor of a processing platform, protected memory that includes a software-based TPM, etc.). The secure hardware includes a shared secret, which is shared by the secure hardware and a server computing system. The shared secret is provisioned by the server computing system or a provisioning computing system of a party affiliated with the server computing system. The secure hardware further includes a cryptographic engine that can execute a cryptographic algorithm using the shared secret or a key generated from the shared secret. The cryptographic engine can execute the cryptographic algorithm to perform encryption, decryption, authentication, and/or attestation.
    Type: Grant
    Filed: February 24, 2015
    Date of Patent: June 20, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Himanshu Raj, Stefan Saroiu, Alastair Wolman, Chen Chen
  • Patent number: 9684794
    Abstract: The present invention relates to a system and architecture for securing otherwise unsecured computer subsystems. According to one aspect, the invention provides an independent hardware platform for running software in a secure manner. According to another aspect, the invention provides the means to control and secure all disk, network and other I/O transactions. According to still further aspects, the invention provides a means to monitor and prevent unauthorized user and malicious software activity Additional aspects include providing a secure platform for device and user authentication as well as encryption key management, providing a means to perform background backup snapshots, and providing the means for enabling full management over computer operations.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: June 20, 2017
    Assignee: JANUS TECHNOLOGIES, INC.
    Inventors: Sofin Raskin, Michael Wang, Joshua Porten, Shaoan Chin