Patents Examined by Tri Tran
  • Patent number: 9984232
    Abstract: A method and an electronic device are provided for operating a security function. The method includes receiving a request for activation of a security function, confirming whether a security indicator is set, and when the security indicator is set, applying the security indicator to a security function screen image, based on activation of the security function, and outputting the security function screen image to a display of the electronic device.
    Type: Grant
    Filed: May 15, 2014
    Date of Patent: May 29, 2018
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Jungkyuen Lee, Kyungsoo Kwag, Jaemin Ryu, Kyungim Jung, Hyunjin Choi
  • Patent number: 9985974
    Abstract: A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a particular registered service, and may specify conditions for access that are subject to approval by the corresponding service provider. Based on the registrations of the service provider and the service consumer, the security service can define access policies that may be enforced to control the conditions under which a service consumer accesses or utilizes the particular service. Additionally, changes to the access policies may be propagated to running services in near real time. Some implementations enable masking of information provided to particular service consumers based on determined needs of each service consumer for access to particular information. In some instances, the service providers may provide log information to the security service, which may be monitored to identify anomalies, security breaches or the like.
    Type: Grant
    Filed: March 9, 2017
    Date of Patent: May 29, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Jonathan Kozolchyk, Darin Keith McAdams, Jeffrey J. Fielding, Vaibhav Mallya, Darren E. Canavor
  • Patent number: 9977922
    Abstract: Examples disclosed herein relate to a multi-tier storage based on data anonymization. A processor may store data in a first data tier. The processor may anonymize the data according to a first anonymization level and store the anonymized data in a second data tier. The processor may associate a first user with the first data tier and associate a second user with the second data tier.
    Type: Grant
    Filed: April 25, 2013
    Date of Patent: May 22, 2018
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Steven J Simske
  • Patent number: 9977900
    Abstract: Technologies pertaining to analyzing content extracted from web pages by a static crawler to determine whether respective web pages are members of a malware distribution network (MDN) are described. A set of features is learned based upon output of a dynamic crawler over known landing pages of a particular MDN, wherein the set of features are indicative of membership in the MDN. Using such set of features, additional members of the MDN (not subjected to crawling by a dynamic crawler) are identified.
    Type: Grant
    Filed: December 27, 2012
    Date of Patent: May 22, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Gang Wang, Jack W. Stokes, Cormac Herley, David Felstead
  • Patent number: 9977904
    Abstract: Disclosed are systems and methods for performing automatic, large-scale analysis mobile applications to determine and analyze application vulnerability. The disclosed systems and methods include identifying potentially vulnerable applications, identifying the application entry points that lead to vulnerable behavior, and generating smart input for text fields. Thus, a fully automated framework is implemented to run in parallel on multiple emulators, while collecting vital information.
    Type: Grant
    Filed: February 24, 2015
    Date of Patent: May 22, 2018
    Assignee: Board of Regents, The University of Texas System
    Inventors: Latifur Khan, Zhiqiang Lin, Bhavani Thuraisingham, Justin Sahs, David Sounthiraraj, Garrett Greenwood
  • Patent number: 9960975
    Abstract: Techniques for analyzing a dataset may be provided. For example, a configuration file may be accessed. The dataset may be analyzed based on a condition identified in the configuration file. A report may be generated and transmitted based on the analysis. Another report generated based on an analysis of another dataset according to another configuration file may be accessed. The dataset may be further analyzed based on this report to determine if a reported observation may also be associated with the dataset. If so, a confirmation may be generated and transmitted.
    Type: Grant
    Filed: November 5, 2014
    Date of Patent: May 1, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Maarten Van Horenbeeck, Matthew Ryan Jezorek
  • Patent number: 9948680
    Abstract: Systems and methods for converting a configuration file from a first language into a second language with policy optimization and auditing are provided. According to one embodiment, a network appliance configuration converter parses network security policies of an input configuration file of a first network appliance to intermediate representations. The network security policies of the input configuration file are in a first language and the intermediate representations are general data structures for describing network security policies. The network appliance configuration converter optimizes network security policies in the intermediate representations and converts the intermediate representations to security policies of an output configuration file in a second language.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: April 17, 2018
    Assignee: Fortinet, Inc.
    Inventors: Jianwen Zhang, Haixiang Gong
  • Patent number: 9942275
    Abstract: Communications and security policy data for two or more zones is obtained that includes data indicating allowed protocols for the respective communications jurisdiction zones. Request data indicating a desired exchange of data between a secrets data source in a first zone and a requesting resource in a second zone is received/obtained. The first zone policy data and the second zone policy data is automatically obtained and analyzed to determine an allowed type of communications security level for the desired exchange of data that complies with both the first zone communications and data security policy data and the second zone policy data. A communications channel, including the allowed type of secure communications security level, is automatically establishing between the first resource and the second resource, and at least a portion of the requests secrets and/or other data is exchanged.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: April 10, 2018
    Assignee: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera
  • Patent number: 9942049
    Abstract: A disabled debug capability may be securely re-enabled in an integrated circuit such as a system-on-a-chip (SoC) device. In a method, the integrated circuit receives a debug re-enable message. The debug re-enable message includes a debug re-enable token signed by a private key. The debug re-enable token is based on a serial number of the integrated circuit and a first copy of a symmetric key. The debug re-enable token is validated using a public key corresponding to the private key. A comparison token is generated using the serial number of the integrated circuit and using a second copy of the symmetric key stored in a one-time-programmable (OTP) memory of the integrated circuit. The integrated circuit compares the debug re-enable token and the comparison token. The disabled debug capability is re-enabled in the integrated circuit if the debug re-enable token matches the comparison token.
    Type: Grant
    Filed: April 4, 2014
    Date of Patent: April 10, 2018
    Assignee: QUALCOMM Incorporated
    Inventor: Ivan Hugh McLean
  • Patent number: 9942443
    Abstract: An information processing apparatus includes plural communication interfaces, a specifying unit, a network determining unit, and a transmission controller. The plural communication interfaces are individually connected to plural communication networks having different security levels. The specifying unit specifies a destination terminal to which a file stored in a data memory is to be transmitted. The network determining unit determines a communication network, among the plural communication networks, via which the file is to be transmitted to the destination terminal. The transmission controller prohibits transmission of the file to the destination terminal in a case where a security level set to the file is higher than a security level set to the communication network determined by the network determining unit.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: April 10, 2018
    Assignee: FUJI XEROX CO., LTD.
    Inventor: Akiko Mochizuki
  • Patent number: 9935940
    Abstract: Techniques are disclosed for increasing the security of a database. A database is coupled with an access manager to limit certain applications that use the database to store user password information to queries that return at most one row. Additionally, returning a record may be limited to a case where the query includes the hash of the user name and password that is stored in the database. Other techniques may be implemented for other user account operations, such as password resets.
    Type: Grant
    Filed: September 9, 2014
    Date of Patent: April 3, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Matthew Daniel DeMoss, Gregory Branchek Roth, Andrew Paul Mikulski
  • Patent number: 9929859
    Abstract: Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive a request for a physical certificate authenticating a user to transfer a domain name, as well as a domain name and domain name transfer instructions; print the physical certificate, including a QR code encoding a user id, the domain name, an EPP key and the transfer instructions; lock the domain name account against modification; receive a request to execute a domain name transfer; scan the user id, the domain name, the EPP key and the transfer instructions encoded within the QR code; unlock an administrative function of the account; authenticate, via the EPP key, the domain name transfer; and execute the domain name transfer.
    Type: Grant
    Filed: October 7, 2015
    Date of Patent: March 27, 2018
    Assignee: Go Daddy Operating Company, LLC
    Inventors: Richard Merdinger, Christopher Ambler, James M. Bladel
  • Patent number: 9930017
    Abstract: Methods and systems of authenticating electronic identification (ID) documents may provide for receiving a decryption key and an encrypted ID document from a certificate authority server at a mobile device, wherein the encrypted ID document includes a read only document having a photograph of an individual. Additionally, the decryption key may be applied to the encrypted ID document to obtain a decryption result in response to a display request. The decryption result can be output via a display of the mobile device, wherein the encrypted ID document can be sent to a challenge terminal if a challenge request is received.
    Type: Grant
    Filed: May 22, 2017
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventor: Richard Redpath
  • Patent number: 9923891
    Abstract: Systems, apparatuses, and methods may include a human body communication data storage device having at least first and second electrodes and a human body communication modem. A storage component communicating with the human body communication modem includes a first secure storage location provided with a user-specific authentication record and a second data storage location.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: March 20, 2018
    Assignee: Intel Corporation
    Inventors: Jaroslaw J. Sydir, Anand S. Konanur, Ulun Karacaoglu, Anthony G. LaMarca, Stephen R. Wood, Jeremy Burr
  • Patent number: 9917823
    Abstract: In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a PIM credential, based on, at least, a determination that a PIM server cannot be accessed. A processor receives a request to access the PIM credential by a user. A processor receives validation of the request to access the PIM credential and an identity of the user. A processor retrieves the PIM credential from a database, wherein the database stores a plurality of PIM credentials owned by a system owner.
    Type: Grant
    Filed: October 1, 2015
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Kelvin K. V. Chin, Chee Meng Low, Vivek Shankar, Edwin B. Soenaryo
  • Patent number: 9912687
    Abstract: A system manages computer security risks associated with message file attachments. When a user of an electronic device with a messaging client attempts to open an attachment to a message that is in the client's inbox, the system will analyze the message to determine whether the message is a legitimate message or a potentially malicious message without the need to actually process or analyze the attachment itself. If the system determines that the received message is a legitimate message, the system will permit the attachment to actuate on the client computing device. If the system determines that the received message is not or may not be a legitimate message, the system will continue preventing the attachment from actuating on the client computing device.
    Type: Grant
    Filed: August 17, 2016
    Date of Patent: March 6, 2018
    Assignee: WOMBAT SECURITY TECHNOLOGIES, INC.
    Inventors: Kurt Wescoe, John T. Campbell, Joseph A. Ferrara, Trevor T. Hawthorn, Alan Himler, Norman Sadeh-Koniecpol
  • Patent number: 9912680
    Abstract: A method for detecting malicious HTTP redirections. The method includes obtaining, based on a single client IP address, HTTP flows triggered by visiting a website, extracting a sequence of URLs where a downstream URL is extracted from a child HTTP request that is triggered by a parent HTTP request containing an immediate upstream URL, analyzing the URL sequence to generate a statistical feature, and classifying, based on the statistical feature, the HTTP flows as containing at least one malicious HTTP redirection triggered by visiting the website.
    Type: Grant
    Filed: December 2, 2016
    Date of Patent: March 6, 2018
    Assignee: Narus, Inc.
    Inventors: Ruben Torres, Hesham Mekky, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci
  • Patent number: 9898595
    Abstract: One aspect of the invention provides a computer system having processing and memory means operable to provide a monetized online content system. The computer system is coupled to one or more resource modules each having data in the memory means and includes: an interceptor module configured to receive a request from a client for one or more resources available from one or more resource modules, refer the request to one or more of the resource modules configured to fulfill the request, receive one or more responses from one or more of the resource modules, at least one of said one or more responses having one or more events associated therewith, and transform the one or more responses by removing the one or more events associated with the one or more responses prior to presentation of the one or more responses to the client.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: February 20, 2018
    Assignee: Thomson Reuters Global Resources Unlimited Company
    Inventors: Robert Sturm, Richard N. Dauk
  • Patent number: 9900329
    Abstract: A computer-implemented system and method for discovering heterogeneous communities with shared anomalous components is provided. A graph is obtained that includes vertices representing entities that are connected by edges representing associated with the entities represented by the connected vertices. The vertices are associated with collections of words of different categories, each of the words describing an item associated with at least one of the events. Each of the vertices is further associated with topics describing a type of activity of the entity represented by that vertex. Communities within the graph are identified, each including at least two of the connected vertices. Identified as anomalous are categories of words whose removal from the collections associated with the vertices in a community increases a likelihood of that community being associated and the collections of the words associated with the community vertices.
    Type: Grant
    Filed: September 8, 2015
    Date of Patent: February 20, 2018
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Aaron Creighton Wilson, Juan Liu
  • Patent number: 9888036
    Abstract: A message sending device includes a processor that executes a process. The process includes: obtaining an operation characteristic during creating a message; adding, to the message, the operation characteristic obtained at the obtaining; and sending the message, to which the operation characteristic has been added at the adding, to a destination of the message.
    Type: Grant
    Filed: February 5, 2015
    Date of Patent: February 6, 2018
    Assignee: FUJITSU LIMITED
    Inventors: Yoshinori Katayama, Hiroshi Tsuda