Patents Examined by Wasika Nipa
-
Patent number: 10567408Abstract: Systems, methods, and computer-readable media for managing credentials of multiple users on an electronic device are provided.Type: GrantFiled: September 14, 2017Date of Patent: February 18, 2020Assignee: APPLE INC.Inventors: Karthik Narayanan, Navin Bindiganavile Suparna, Scott Lopatin
-
Patent number: 10554629Abstract: A method for introducing a replacement code segment over-the-air through a wireless mobile communication network to an existing code resident on a mobile terminal: identifying the mobile terminal from among terminals served through the wireless mobile communication network; sending a push notification through the network to the mobile terminal, the push notification indicative of the replacement code segment ready for downloading; activating a dynamic update module resident in the mobile terminal, in response to the push notification; sending a request for the replacement code segment; downloading the replacement code segment to the mobile terminal; and transferring the downloaded replacement code segment to the dynamic update module for dynamic replacement of a corresponding old code segment within the mobile terminal with the replacement code segment, obviating a need to recompile the existing code.Type: GrantFiled: June 30, 2016Date of Patent: February 4, 2020Assignee: CHECK POINT SOFTWARE TECHNOLOGIES LTD.Inventors: Yuval Raban, Nadia Goshmir, Shami Reshtik
-
Patent number: 10540522Abstract: Disclosed are methods, systems and one or more computer readable mediums for storing data securely in a database. In one aspect, transaction data received from a user completing a form is encrypted using a transaction key provided by a record key management server which is administered by a customer of a form hosting entity. An encrypted transaction key is also generated by the record key management server, wherein a record indicative of the encrypted transaction data and the encrypted transaction key is stored in a database administered by the form hosting entity. Data at rest stored in the database, including the record, is encrypted by a database key management server using a database key.Type: GrantFiled: July 14, 2017Date of Patent: January 21, 2020Assignee: AVOKA TECHNOLOGIES PTY LTD.Inventor: Malcolm Angus Edgar
-
Patent number: 10534920Abstract: The invention relates to a method for storing data, wherein the method, in order to store a file (101), comprises: —automatic generation (602) of a distribution schedule (416); —performance (604) of an error correction method, which is specified in the distribution schedule, for generating file fragments from the file by a user computer system; —sending (606) of an authorisation enquiry (420) for storing the file fragments in the memory services (SD2, SD4-SD6) identified in the distribution schedule from the user computer system to a file management server via a network; —in response to reception of the authorisation enquiry by the file management server, requesting (608, 424) of an authorisation token by the file management server from each of the memory services identified in the distribution schedule and forwarding (610) of the authorisation token (428) obtained in response to the request to the user computer system by the file management server; and —storage (612) of the generated file fragments in the stType: GrantFiled: September 15, 2015Date of Patent: January 14, 2020Assignee: BUNDESDRUCKEREI GMBHInventors: Maxim Schnjakin, Philipp Berger, Hendrik Graupner
-
Patent number: 10528736Abstract: The disclosed computer-implemented method for detecting preparatory-stages of rowhammer attacks may include (i) receiving, at a computing device, signatures of preparatory behaviors that are known to be exhibited by malicious virtual machines during preparatory stages of rowhammer attacks, (ii) monitoring, at the computing device, behaviors of a virtual machine that is hosted by the computing device, (iii) detecting, at the computing device while monitoring behaviors of the virtual machine, a behavior that matches one of the signatures of preparatory behaviors, and (iv) performing, in response to detecting the behavior that matches one of the signatures of preparatory behaviors, a security action to prevent the virtual machine from perpetrating a successful rowhammer attack. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 28, 2017Date of Patent: January 7, 2020Assignee: Symantec CorporationInventors: William E. Sobel, Bruce McCorkendale
-
Patent number: 10530589Abstract: At least one method, apparatus and system disclosed involves providing a restricted access protocol for accessing a memory device. A first memory portion of a memory device is selected for providing an access confirmation. At least one of setting or resetting of memory cells of the first memory portion is performed. A first voltage is provided for switching the memory cells. The first voltage is associated with a predetermined switching probability. A first input signal comprising at least one address associated with the memory cells is provided. A first responsive signal is received in response to the input signal. The first responsive signal comprises data relating to the state of the memory cells. An access key is provided for the access confirmation based upon a relationship between the first input signal and the first responsive signals for providing an access key.Type: GrantFiled: July 18, 2017Date of Patent: January 7, 2020Assignee: GLOBALFOUNDRIES INC.Inventor: An Chen
-
Patent number: 10521587Abstract: A method includes generating an index representation of characters of code of a given file and mapping the index representation to a vector space providing contextual representation of the characters utilizing an embedding layer of a recurrent neural network (RNN). The method also includes identifying one or more code features in the mapped index representation utilizing at least one hidden layer of the RNN, detecting sequences of the identified code features in the mapped index representation utilizing a plurality of memory units of a recurrent layer of the RNN, and generating a classification result for the given file based on the detected sequences of code features utilizing one or more classification layers of the RNN. The method further comprises utilizing the classification result to determine if the given file contains code of a designated code type, and modifying access by a given client device to the given file responsive to the determination.Type: GrantFiled: July 31, 2017Date of Patent: December 31, 2019Assignee: EMC IP Holding Company LLCInventors: Arie Agranonik, Zohar Duchin
-
Patent number: 10511449Abstract: A method for use in a source device includes: acquiring a random number; transmitting the random number to a sink device through a High Definition Multimedia Interface-Consumer Electronics Control (HDMI-CEC) bus; receiving first signature information and capability information from the sink device through the HDMI-CEC bus, the first signature information being information in which the random number is encrypted with a first secret key of the sink device, the capability information being information about a display capability of the sink device; acquiring a result of a first determination whether first decrypted information is compatible with the transmitted random number, the first decrypted information being obtained by decrypting the first signature information with a first public key paired with the first secret key; determining that the received capability information is correct information when the result of the first determination is that the first decrypted information is compatible with the transmitteType: GrantFiled: July 10, 2017Date of Patent: December 17, 2019Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICAInventors: Toshiroh Nishio, Masaya Yamamoto, Masayuki Kozuka, Yoshihiro Mori, Tadamasa Toma
-
Patent number: 10503918Abstract: A process for accessing a data storage device of a cloud computer system CCS through a gateway computer system GCS which is connected with the CCS over a network, the process includes setting up a protected connection between a first piece of terminal equipment of the user and the GCS; transferring a file over the protected connection from the terminal equipment to the GCS; setting up a session over the network between the GCS and the CCS; authenticating the user with respect to the CCS by the GCS accessing, through the session, the authentication data of the user stored in the GCS, for authentication of the user; encrypting the file by the GCS using the cryptographic key; transferring the encrypted file through the session from the GCS to the CCS; and storing the encrypted file in the data storage device of the CCS.Type: GrantFiled: October 24, 2014Date of Patent: December 10, 2019Assignee: BUNDESDRUCKEREI GMBHInventor: Frank Byszio
-
Patent number: 10498530Abstract: Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.Type: GrantFiled: November 26, 2018Date of Patent: December 3, 2019Assignee: Network-1 Technologies, Inc.Inventor: John A. Nix
-
Patent number: 10484432Abstract: A security information update system includes a service providing server and information processing devices, the service providing server including: an authentication information memory that stores a pair of security information and identification information; and a service providing unit that provides a service to the information processing device, and the information processing devices including: a policy acquisition unit that acquires a security policy; a security information memory that stores security information; a process executing unit that transmits a pair of the same identification information and security information to the service providing server and receives a service; an authentication information acquisition unit that acquires security information after update; an update unit that updates security information with the acquired security information after the update date and time; and a prohibition unit that prohibits execution of a process of receiving a service after the update date and time uType: GrantFiled: October 4, 2016Date of Patent: November 19, 2019Assignee: KONICA MINOLTA, INC.Inventors: Jun Shiraishi, Toshiya Shozaki, Ryosuke Nishimura, Tomoko Maruyama, Shoko Haba
-
Patent number: 10462117Abstract: A method and a system for authenticating a surrounding Web application by a Web application that is to be embedded, wherein it becomes possible for the Web application that is to be embedded to identify the surrounding Web application and for the surrounding Web application to authenticate itself, where a high security standard is provided through storage and evaluation of the necessary key material in the respective. Web server because the key material itself is not transmitted, but only authentication messages for the local use of the key material are instead transmitted.Type: GrantFiled: September 28, 2016Date of Patent: October 29, 2019Assignee: Siemens AktiengesellschaftInventors: Roland Eckl, Harald Herberth
-
Patent number: 10452838Abstract: Providing joint access to an isolated computer object by both an isolated computer application and a non-isolated computer application. In one embodiment, a method may include executing a first computer application as a virtualized first computer application in an isolation layer, executing a second computer application as an actual second computer application in an operating system outside the isolation layer, creating a virtualized second computer object in the isolation layer in a location accessible to the virtualized first computer application, creating a gateway third computer object associated with the virtualized second computer object, storing the gateway third computer object outside the isolation layer in a location accessible to the operating system, and enabling joint access to the gateway third computer object by both the virtualized first computer application and the actual second computer application.Type: GrantFiled: July 27, 2017Date of Patent: October 22, 2019Assignee: SYMANTEC CORPORATIONInventor: Mark Kennedy
-
Patent number: 10440005Abstract: A certification management system helps an organization develop and maintain a repository of current certification status of employees. The system may integrate multiple learning management systems and other enterprise level systems across the organization. The system facilitates identifying and enrolling targeted employees for any number and type of certification programs. The system may also implement and support reconfiguring certification programs, for example, during training, and enforcing recertification requirements according to maturing business needs. The system provides automated workflows that facilitate a formal, structured approach to the development and recognition of specific specialized skills at scale by infusing more consistency, rigor, and objectivity.Type: GrantFiled: June 26, 2015Date of Patent: October 8, 2019Assignee: Accenture Global Services LimitedInventors: John Kessler, Monica A Larosa, Ashok P Vira, Abdulquader A Kinariwala, Siddhartha S. Dhamankar, Gordon Trujillo
-
Patent number: 10432991Abstract: A method includes generating a first media file that includes a plurality of first media file segments, generating a second media file as a copy of the first media file, the second media file includes a plurality of second media file segments, embedding a first watermark with the plurality of first media file segments, embedding at least one second watermark with the plurality of second media file segments, generating a manifest file based on a portion of the plurality of first media file segments and a portion of the plurality of second media file segments, the manifest file including a plurality of addresses each referencing a media file segment, and encrypting each of plurality of addresses.Type: GrantFiled: October 19, 2017Date of Patent: October 1, 2019Assignee: GOOGLE LLCInventors: Haoming Chen, Thomas Inskip, Kongqun Yang
-
Patent number: 10417401Abstract: Method and apparatus for a system to harden digital consents. The system uses an evaluation of geographic locations, transaction times, and device identities to control the upload of consent data. Evaluations occur using numerous techniques including MAC address evaluation, IP address evaluation, meta-data evaluation, and physical location of restricted equipment such as ATMs and kiosks. Reliability of consent data entered into the system may be enhanced by strictly evaluating geographic locations, transaction times, and/or device identities.Type: GrantFiled: July 30, 2017Date of Patent: September 17, 2019Assignee: Bank of America CorporationInventors: Elizabeth S. Votaw, David J. Smiddy, Fnu Sidharth, Stephen T. Shannon, James Alexander
-
Patent number: 10410000Abstract: Disclosed are systems to apply customized permission settings to protect particular portions of a document, and, in particular, documents that are of bitstream datatypes, encoded or not encoded, e.g., an audio filetype such as the MP3 audio format. The custom access permission settings may be implemented by obfuscating the protected portions of the original bitstream and then embedding “secret,” e.g., hidden and/or encrypted, versions of the obfuscated portions in parts of the data structure of the original file, e.g., in the form of “layers” that are held within audio stream containers such as channels. The content of the individual encrypted audio stream containers may then be decrypted according to each recipient's permissions and layered on top of the obfuscated portions of the encoded media file before being rendered to the recipient.Type: GrantFiled: December 29, 2017Date of Patent: September 10, 2019Assignee: Entefy Inc.Inventors: Alston Ghafourifar, Vincente Ciancio
-
Patent number: 10395047Abstract: Users desire a communications system that allows the users to apply customized privacy settings (and, optionally, encryption keys) differently to particular portions of a document—even if the document is of a ‘lossy’ file type, e.g., a JPEG image. The custom access permission settings may be implemented by obfuscating portions of the original file and then embedding “secret,” e.g., hidden and/or encrypted, versions of the obfuscated portions in parts of the data structure of the original lossy file in the form of “layers” (e.g., the bit-equivalent of PNG layers). The individual encrypted layers may then be decrypted according to each recipient's permissions and layered on top of the original lossy file ‘in memory’ before being displayed to the recipient. The use of multiple encrypted layers allows for the visual revelation of the content of the original lossy file without modifying the actual underlying image content of the original lossy file.Type: GrantFiled: December 31, 2016Date of Patent: August 27, 2019Assignee: Entefy Inc.Inventors: Alston Ghafourifar, Philip Nathan Greenberg
-
Patent number: 10397221Abstract: Methods, network controllers, and machine-readable and executable instructions are provided for network controller provisioned MACsec keys. A network controller can provision a first network device with a media access control security (MACsec) key for a MACsec flow. The network controller can provision a second network device with the MACsec key for the MACsec flow.Type: GrantFiled: January 31, 2013Date of Patent: August 27, 2019Assignee: Hewlett Packard Enterprise Development LPInventors: Parvez Syed Mohamed, Shaun K. Wakumoto, Craig J. Mills
-
Patent number: 10362479Abstract: The invention relates to a method for managing the use, in a terminal, of a plurality of security modules (SIM1, SIM2) managed by an entity (STK) capable of requiring the provision of security codes in order to unlock the modules. The method is characterized in that it comprises: a first phase of accessing the modules (PH1), including a step of receiving (ET13-1, ET13-2), by the entity, codes of the modules, a step of transmitting (ET14-1, ET14-2) the received codes to the security modules, followed by a step of storing (ET16), in a security module referred to as the main module, at least one code received by the entity relative to a module (SIM2) other than the main module; and a second subsequent access phase during which the unlocking of the main module is followed by a step of transmitting at least one code from the main module to at least one other security module (SIM2) corresponding to said at least one code.Type: GrantFiled: December 4, 2013Date of Patent: July 23, 2019Assignee: OrangeInventors: Vincent Auvray, Sebastien Hallay