Patents Examined by Wasika Nipa
  • Patent number: 10567408
    Abstract: Systems, methods, and computer-readable media for managing credentials of multiple users on an electronic device are provided.
    Type: Grant
    Filed: September 14, 2017
    Date of Patent: February 18, 2020
    Assignee: APPLE INC.
    Inventors: Karthik Narayanan, Navin Bindiganavile Suparna, Scott Lopatin
  • Patent number: 10554629
    Abstract: A method for introducing a replacement code segment over-the-air through a wireless mobile communication network to an existing code resident on a mobile terminal: identifying the mobile terminal from among terminals served through the wireless mobile communication network; sending a push notification through the network to the mobile terminal, the push notification indicative of the replacement code segment ready for downloading; activating a dynamic update module resident in the mobile terminal, in response to the push notification; sending a request for the replacement code segment; downloading the replacement code segment to the mobile terminal; and transferring the downloaded replacement code segment to the dynamic update module for dynamic replacement of a corresponding old code segment within the mobile terminal with the replacement code segment, obviating a need to recompile the existing code.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: February 4, 2020
    Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.
    Inventors: Yuval Raban, Nadia Goshmir, Shami Reshtik
  • Patent number: 10540522
    Abstract: Disclosed are methods, systems and one or more computer readable mediums for storing data securely in a database. In one aspect, transaction data received from a user completing a form is encrypted using a transaction key provided by a record key management server which is administered by a customer of a form hosting entity. An encrypted transaction key is also generated by the record key management server, wherein a record indicative of the encrypted transaction data and the encrypted transaction key is stored in a database administered by the form hosting entity. Data at rest stored in the database, including the record, is encrypted by a database key management server using a database key.
    Type: Grant
    Filed: July 14, 2017
    Date of Patent: January 21, 2020
    Assignee: AVOKA TECHNOLOGIES PTY LTD.
    Inventor: Malcolm Angus Edgar
  • Patent number: 10534920
    Abstract: The invention relates to a method for storing data, wherein the method, in order to store a file (101), comprises: —automatic generation (602) of a distribution schedule (416); —performance (604) of an error correction method, which is specified in the distribution schedule, for generating file fragments from the file by a user computer system; —sending (606) of an authorisation enquiry (420) for storing the file fragments in the memory services (SD2, SD4-SD6) identified in the distribution schedule from the user computer system to a file management server via a network; —in response to reception of the authorisation enquiry by the file management server, requesting (608, 424) of an authorisation token by the file management server from each of the memory services identified in the distribution schedule and forwarding (610) of the authorisation token (428) obtained in response to the request to the user computer system by the file management server; and —storage (612) of the generated file fragments in the st
    Type: Grant
    Filed: September 15, 2015
    Date of Patent: January 14, 2020
    Assignee: BUNDESDRUCKEREI GMBH
    Inventors: Maxim Schnjakin, Philipp Berger, Hendrik Graupner
  • Patent number: 10528736
    Abstract: The disclosed computer-implemented method for detecting preparatory-stages of rowhammer attacks may include (i) receiving, at a computing device, signatures of preparatory behaviors that are known to be exhibited by malicious virtual machines during preparatory stages of rowhammer attacks, (ii) monitoring, at the computing device, behaviors of a virtual machine that is hosted by the computing device, (iii) detecting, at the computing device while monitoring behaviors of the virtual machine, a behavior that matches one of the signatures of preparatory behaviors, and (iv) performing, in response to detecting the behavior that matches one of the signatures of preparatory behaviors, a security action to prevent the virtual machine from perpetrating a successful rowhammer attack. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: January 7, 2020
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale
  • Patent number: 10530589
    Abstract: At least one method, apparatus and system disclosed involves providing a restricted access protocol for accessing a memory device. A first memory portion of a memory device is selected for providing an access confirmation. At least one of setting or resetting of memory cells of the first memory portion is performed. A first voltage is provided for switching the memory cells. The first voltage is associated with a predetermined switching probability. A first input signal comprising at least one address associated with the memory cells is provided. A first responsive signal is received in response to the input signal. The first responsive signal comprises data relating to the state of the memory cells. An access key is provided for the access confirmation based upon a relationship between the first input signal and the first responsive signals for providing an access key.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: January 7, 2020
    Assignee: GLOBALFOUNDRIES INC.
    Inventor: An Chen
  • Patent number: 10521587
    Abstract: A method includes generating an index representation of characters of code of a given file and mapping the index representation to a vector space providing contextual representation of the characters utilizing an embedding layer of a recurrent neural network (RNN). The method also includes identifying one or more code features in the mapped index representation utilizing at least one hidden layer of the RNN, detecting sequences of the identified code features in the mapped index representation utilizing a plurality of memory units of a recurrent layer of the RNN, and generating a classification result for the given file based on the detected sequences of code features utilizing one or more classification layers of the RNN. The method further comprises utilizing the classification result to determine if the given file contains code of a designated code type, and modifying access by a given client device to the given file responsive to the determination.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: December 31, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Arie Agranonik, Zohar Duchin
  • Patent number: 10511449
    Abstract: A method for use in a source device includes: acquiring a random number; transmitting the random number to a sink device through a High Definition Multimedia Interface-Consumer Electronics Control (HDMI-CEC) bus; receiving first signature information and capability information from the sink device through the HDMI-CEC bus, the first signature information being information in which the random number is encrypted with a first secret key of the sink device, the capability information being information about a display capability of the sink device; acquiring a result of a first determination whether first decrypted information is compatible with the transmitted random number, the first decrypted information being obtained by decrypting the first signature information with a first public key paired with the first secret key; determining that the received capability information is correct information when the result of the first determination is that the first decrypted information is compatible with the transmitte
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: December 17, 2019
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Toshiroh Nishio, Masaya Yamamoto, Masayuki Kozuka, Yoshihiro Mori, Tadamasa Toma
  • Patent number: 10503918
    Abstract: A process for accessing a data storage device of a cloud computer system CCS through a gateway computer system GCS which is connected with the CCS over a network, the process includes setting up a protected connection between a first piece of terminal equipment of the user and the GCS; transferring a file over the protected connection from the terminal equipment to the GCS; setting up a session over the network between the GCS and the CCS; authenticating the user with respect to the CCS by the GCS accessing, through the session, the authentication data of the user stored in the GCS, for authentication of the user; encrypting the file by the GCS using the cryptographic key; transferring the encrypted file through the session from the GCS to the CCS; and storing the encrypted file in the data storage device of the CCS.
    Type: Grant
    Filed: October 24, 2014
    Date of Patent: December 10, 2019
    Assignee: BUNDESDRUCKEREI GMBH
    Inventor: Frank Byszio
  • Patent number: 10498530
    Abstract: Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.
    Type: Grant
    Filed: November 26, 2018
    Date of Patent: December 3, 2019
    Assignee: Network-1 Technologies, Inc.
    Inventor: John A. Nix
  • Patent number: 10484432
    Abstract: A security information update system includes a service providing server and information processing devices, the service providing server including: an authentication information memory that stores a pair of security information and identification information; and a service providing unit that provides a service to the information processing device, and the information processing devices including: a policy acquisition unit that acquires a security policy; a security information memory that stores security information; a process executing unit that transmits a pair of the same identification information and security information to the service providing server and receives a service; an authentication information acquisition unit that acquires security information after update; an update unit that updates security information with the acquired security information after the update date and time; and a prohibition unit that prohibits execution of a process of receiving a service after the update date and time u
    Type: Grant
    Filed: October 4, 2016
    Date of Patent: November 19, 2019
    Assignee: KONICA MINOLTA, INC.
    Inventors: Jun Shiraishi, Toshiya Shozaki, Ryosuke Nishimura, Tomoko Maruyama, Shoko Haba
  • Patent number: 10462117
    Abstract: A method and a system for authenticating a surrounding Web application by a Web application that is to be embedded, wherein it becomes possible for the Web application that is to be embedded to identify the surrounding Web application and for the surrounding Web application to authenticate itself, where a high security standard is provided through storage and evaluation of the necessary key material in the respective. Web server because the key material itself is not transmitted, but only authentication messages for the local use of the key material are instead transmitted.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: October 29, 2019
    Assignee: Siemens Aktiengesellschaft
    Inventors: Roland Eckl, Harald Herberth
  • Patent number: 10452838
    Abstract: Providing joint access to an isolated computer object by both an isolated computer application and a non-isolated computer application. In one embodiment, a method may include executing a first computer application as a virtualized first computer application in an isolation layer, executing a second computer application as an actual second computer application in an operating system outside the isolation layer, creating a virtualized second computer object in the isolation layer in a location accessible to the virtualized first computer application, creating a gateway third computer object associated with the virtualized second computer object, storing the gateway third computer object outside the isolation layer in a location accessible to the operating system, and enabling joint access to the gateway third computer object by both the virtualized first computer application and the actual second computer application.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: October 22, 2019
    Assignee: SYMANTEC CORPORATION
    Inventor: Mark Kennedy
  • Patent number: 10440005
    Abstract: A certification management system helps an organization develop and maintain a repository of current certification status of employees. The system may integrate multiple learning management systems and other enterprise level systems across the organization. The system facilitates identifying and enrolling targeted employees for any number and type of certification programs. The system may also implement and support reconfiguring certification programs, for example, during training, and enforcing recertification requirements according to maturing business needs. The system provides automated workflows that facilitate a formal, structured approach to the development and recognition of specific specialized skills at scale by infusing more consistency, rigor, and objectivity.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: October 8, 2019
    Assignee: Accenture Global Services Limited
    Inventors: John Kessler, Monica A Larosa, Ashok P Vira, Abdulquader A Kinariwala, Siddhartha S. Dhamankar, Gordon Trujillo
  • Patent number: 10432991
    Abstract: A method includes generating a first media file that includes a plurality of first media file segments, generating a second media file as a copy of the first media file, the second media file includes a plurality of second media file segments, embedding a first watermark with the plurality of first media file segments, embedding at least one second watermark with the plurality of second media file segments, generating a manifest file based on a portion of the plurality of first media file segments and a portion of the plurality of second media file segments, the manifest file including a plurality of addresses each referencing a media file segment, and encrypting each of plurality of addresses.
    Type: Grant
    Filed: October 19, 2017
    Date of Patent: October 1, 2019
    Assignee: GOOGLE LLC
    Inventors: Haoming Chen, Thomas Inskip, Kongqun Yang
  • Patent number: 10417401
    Abstract: Method and apparatus for a system to harden digital consents. The system uses an evaluation of geographic locations, transaction times, and device identities to control the upload of consent data. Evaluations occur using numerous techniques including MAC address evaluation, IP address evaluation, meta-data evaluation, and physical location of restricted equipment such as ATMs and kiosks. Reliability of consent data entered into the system may be enhanced by strictly evaluating geographic locations, transaction times, and/or device identities.
    Type: Grant
    Filed: July 30, 2017
    Date of Patent: September 17, 2019
    Assignee: Bank of America Corporation
    Inventors: Elizabeth S. Votaw, David J. Smiddy, Fnu Sidharth, Stephen T. Shannon, James Alexander
  • Patent number: 10410000
    Abstract: Disclosed are systems to apply customized permission settings to protect particular portions of a document, and, in particular, documents that are of bitstream datatypes, encoded or not encoded, e.g., an audio filetype such as the MP3 audio format. The custom access permission settings may be implemented by obfuscating the protected portions of the original bitstream and then embedding “secret,” e.g., hidden and/or encrypted, versions of the obfuscated portions in parts of the data structure of the original file, e.g., in the form of “layers” that are held within audio stream containers such as channels. The content of the individual encrypted audio stream containers may then be decrypted according to each recipient's permissions and layered on top of the obfuscated portions of the encoded media file before being rendered to the recipient.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: September 10, 2019
    Assignee: Entefy Inc.
    Inventors: Alston Ghafourifar, Vincente Ciancio
  • Patent number: 10395047
    Abstract: Users desire a communications system that allows the users to apply customized privacy settings (and, optionally, encryption keys) differently to particular portions of a document—even if the document is of a ‘lossy’ file type, e.g., a JPEG image. The custom access permission settings may be implemented by obfuscating portions of the original file and then embedding “secret,” e.g., hidden and/or encrypted, versions of the obfuscated portions in parts of the data structure of the original lossy file in the form of “layers” (e.g., the bit-equivalent of PNG layers). The individual encrypted layers may then be decrypted according to each recipient's permissions and layered on top of the original lossy file ‘in memory’ before being displayed to the recipient. The use of multiple encrypted layers allows for the visual revelation of the content of the original lossy file without modifying the actual underlying image content of the original lossy file.
    Type: Grant
    Filed: December 31, 2016
    Date of Patent: August 27, 2019
    Assignee: Entefy Inc.
    Inventors: Alston Ghafourifar, Philip Nathan Greenberg
  • Patent number: 10397221
    Abstract: Methods, network controllers, and machine-readable and executable instructions are provided for network controller provisioned MACsec keys. A network controller can provision a first network device with a media access control security (MACsec) key for a MACsec flow. The network controller can provision a second network device with the MACsec key for the MACsec flow.
    Type: Grant
    Filed: January 31, 2013
    Date of Patent: August 27, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Parvez Syed Mohamed, Shaun K. Wakumoto, Craig J. Mills
  • Patent number: 10362479
    Abstract: The invention relates to a method for managing the use, in a terminal, of a plurality of security modules (SIM1, SIM2) managed by an entity (STK) capable of requiring the provision of security codes in order to unlock the modules. The method is characterized in that it comprises: a first phase of accessing the modules (PH1), including a step of receiving (ET13-1, ET13-2), by the entity, codes of the modules, a step of transmitting (ET14-1, ET14-2) the received codes to the security modules, followed by a step of storing (ET16), in a security module referred to as the main module, at least one code received by the entity relative to a module (SIM2) other than the main module; and a second subsequent access phase during which the unlocking of the main module is followed by a step of transmitting at least one code from the main module to at least one other security module (SIM2) corresponding to said at least one code.
    Type: Grant
    Filed: December 4, 2013
    Date of Patent: July 23, 2019
    Assignee: Orange
    Inventors: Vincent Auvray, Sebastien Hallay