Patents Examined by Wasika Nipa
-
Patent number: 10931997Abstract: A method to transfer a video stream from a host device comprising a controller configured for bulk transfers to a descrambling device, comprises: forming a chain out transfer comprising a chain out header linked with multiple chain out descriptors, the first chain out descriptor pointing to an out description packet containing at least one producer ID, the second and subsequent chain out descriptor pointing to chunks from the video stream, the last chain out descriptor being configured to generate an interrupt; forming a chain in transfer comprising a chain in header linked with a plurality of chain in descriptors, each chain in descriptor pointing to a descrambled chunk; requesting the controller to process the chain; receiving the description packet by the descrambling device and using key data associated with the chunks to descramble them; receiving by the controller the descrambled chunks and triggering an interrupt on the last chunk.Type: GrantFiled: August 29, 2016Date of Patent: February 23, 2021Assignee: NAGRAVISION S.A.Inventor: Fabien Gremaud
-
Patent number: 10917417Abstract: A method for network security joint defense includes: obtaining security log information of security devices, wherein the security log information includes intrusion event information violating an own defense policy of the security device obtained by the security device in a network/system environment; converting log formats of the multiple obtained security log information into a preset log format, wherein the preset log format is a log format that is identifiable by the plurality of the security devices; classifying and summarizing the intrusion event information included in the converted security log information according to preset intrusion event types; obtaining a security device identification corresponding to each of preset intrusion event types; and pushing the intrusion event information corresponding to each preset intrusion event type to the security device corresponding to the security device identification, so that the security device adjusts the own defense policy thereof according to the pushedType: GrantFiled: August 30, 2017Date of Patent: February 9, 2021Assignee: PING AN TECHNOLOGY (SHENZHEN) CO., LTD.Inventor: Yuanming Wang
-
Patent number: 10904228Abstract: An encoder for providing encrypted data for transmission via a transmission medium includes an encryption unit that is configured to encrypt data received at the encoder block by block and a processing unit. The processing unit is configured to randomly distribute an encrypted data block to a plurality of channels that are allocated to the transmission medium and to provide a sub-block, which includes part of the encrypted data block, to be transmitted via one of the channels, together with a channel identification allocated to the channel and a code value that is based on the encrypted data in the sub-block to be transmitted and the channel identification, for transmission via the allocated channel of the transmission medium.Type: GrantFiled: October 7, 2016Date of Patent: January 26, 2021Assignees: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V., timeproof gmbhInventors: Olaf Feller, Ute Troppenz, Norbert Grote, Torsten Mehlhorn
-
Patent number: 10904276Abstract: The present disclosure describes systems and methods that provide a hybrid framework for augmenting statistical anomaly detection with contextual features, machine learning and human Subject Matter Expert (SME) input to learn significant characteristics of true anomalies for which alerts should be generated. The framework presented herein is domain agnostic and independent of the underlying statistical anomaly detection technique or the machine learning algorithm. The framework described herein is therefore applicable and adaptable to a number of real world service provider systems and applications, such as, for example, detecting network performance degradation in a service provider network or detecting anomalous conditions from data received from a sensor while filtering out false positives.Type: GrantFiled: September 14, 2017Date of Patent: January 26, 2021Assignee: Nokia Technologies OYInventors: Chitra Phadke, Huseyin Uzunalioglu, Jin Cao
-
Patent number: 10897352Abstract: A secret key value that is inaccessible to software is scrambled according to registers consisting of one-time programmable (OTP) bits. A first OTP register is used to change the scrambling of the secret key value whenever a lifecycle event occurs. A second OTP register is used to undo the change in the scrambling of the secret key. A third OTP register is used to affect a permanent change to the scrambling of the secret key. The scrambled values of the secret key (whether changed or unchanged) are used as seeds to produce keys for cryptographic operations by a device.Type: GrantFiled: December 15, 2016Date of Patent: January 19, 2021Assignee: Rambus Inc.Inventors: Ambuj Kumar, Ronald Perez
-
Patent number: 10887306Abstract: Provided are techniques for authenticating an unknown device. For a first device in an internet of things network that includes a second device and forms a list of trusted devices, a distance between the first device and the second device is determined. A level of trust for the second device is identified based on the distance, wherein the level of trust specifies a level of data sharing. Reputation ranking is performed for the second device based on the level of trust. The reputation ranking is used to assign a trust score to the second device. Based on determining that the trust score exceeds a trust threshold, access is provided to the second device.Type: GrantFiled: May 11, 2017Date of Patent: January 5, 2021Assignee: International Business Machines CorporationInventors: Rahul Gupta, David B. Kumhyr, Hari H. Madduri, Maharaj Mukherjee
-
Patent number: 10878104Abstract: Examples relate to automated multi-credential assessment in a system. One example enables auditing an application by sending a first request for an action to be performed in the application, the first request based on a first privilege level, where the first privilege level corresponds with a first level of access to the application, and sending a second request for the action to be performed in the application, where the second request based on a second privilege level different from the first privilege level. The second privilege level may corresponds with a second level of access to the application different from the first level of access. The first request and second request may be performed, and the results of the performed first request and second request may be combined. The combined results may be made available.Type: GrantFiled: November 13, 2015Date of Patent: December 29, 2020Assignee: MICRO FOCUS LLCInventors: Gerald Sullivan, Sasi Siddharth Muthurajan, Nidhi Kejriwal, Jeremy Brooks
-
Patent number: 10868819Abstract: In an embodiment, a computer system is configured to improve security of server computers interacting with client computers through an intermediary computer, and comprising: a memory comprising processor logic; one or more processors coupled to the memory, wherein the one or more processors execute the processor logic, which causes the one or more processors to: intercept, from a server computer, one or more original instructions to be sent to a browser being executed on a client computer; inject, into the one or more original instructions, one or more browser detection instructions, which when executed cause one or more operations to be performed by an execution environment on the client computer and send a result that represents an internal state of the execution environment after performing the one or more operations to the intermediary computer; send the one or more original instructions with the one or more browser detection instructions to the browser; receive the result and determine whether the browseType: GrantFiled: May 15, 2019Date of Patent: December 15, 2020Assignee: SHAPE SECURITY, INC.Inventors: Bei Zhang, Sergey Shekyan
-
Patent number: 10862681Abstract: An identity provider IP service provides an optimized sign out experience for a user accessing a single account service. The IP service designates a first account of a service as signed in based on first credentials provided by a user. The IP service provides a first security token for the first account to the service. Upon receiving a first sign out notification, the IP service determines whether the user wants to switch to a second account of the service. Upon determining that the user wants to switch to the second account, the IP service designates the second account as signed in based on second credentials provided by the user, provides a second security token for the second account to the service, and designates the first account as soft signed out so that the user can switch to the first account without re-providing the first credentials.Type: GrantFiled: April 4, 2017Date of Patent: December 8, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ariel Gordon, John H. Forrest, Jason Walter
-
Patent number: 10860699Abstract: The present invention provides an authentication which is performed by means of simultaneously inputting biometric data such as fingerprint, iris and the like when inputting an authentication number, wherein input area provided to a user varies such that biometric data can be input and recognized accurately and easily. Therefore, the present invention enhances convenience for a user and increases security and reliability of authentication.Type: GrantFiled: September 3, 2015Date of Patent: December 8, 2020Assignee: LG ELECTRONICS INC.Inventor: Sangwon Kim
-
Patent number: 10862876Abstract: A device transmits or receives a packet in a memory network including one or more processors and/or one or more memory devices. The device includes a key storage unit configured to store a one-time password (OTP) key that is shared with a target node, an encryption unit configured to encrypt a transmission packet with the OTP key stored in the key storage unit and to transmit the encrypted transmission packet to the target node, and a decryption unit configured to decrypt a receiving packet from the target node with the OTP key stored in the key storage unit. The device is a processor or a memory device in the memory network.Type: GrantFiled: September 14, 2017Date of Patent: December 8, 2020Assignees: SK hynix Inc., Korea Advanced Institute of Science and TechnologyInventors: Yeonju Ro, Seongwook Jin, Jaehyuk Huh, John Dongjun Kim
-
Patent number: 10846390Abstract: A cloud-based identity and access management system that implements single sign-on (“SSO”) receives a first request for an identity management service configured to allow for accessing an application. Embodiments send the first request to a first microservice which performs the identity management service by generating a token. The first microservice generates the token at least in part by sending a second request to a SSO microservice that is configured to provide SSO functionality across different microservices that are based on different protocols. Embodiments then receive the token from the first microservice and provide the token to the application, where the token allows for accessing the application.Type: GrantFiled: September 14, 2017Date of Patent: November 24, 2020Assignee: Oracle International CorporationInventors: Elangovan Subramanian, Mrudul Pradeep Uchil, Bhavik Sankesara, Siva Sundeep Kuppala
-
Patent number: 10848465Abstract: A security event that is associated with one or more communication devices is detected. For example, the security event may be an unexpected change in data being sent from a communication device outside an enterprise. In response to detecting the security event, a Virtual Service Network (VSN) is created that isolates one or more communication devices that may pose a security risk. A corrective action to mitigate the security event is then implemented. For example, the corrective action may be to dynamically instantiate a firewall on the VSN that blocks the transfer of data from the communication device outside the enterprise. This allows an administrator to review the security event and take further action if necessary. Because the VSN with the firewall is created dynamically, the network remains secure while the security event is investigated.Type: GrantFiled: October 3, 2016Date of Patent: November 24, 2020Assignee: Extreme Networks, Inc.Inventors: Shalini Yajnik, Anjur S. Krishnakumar, Venkatesh Krishnaswamy, Laurent Philonenko
-
Patent number: 10839063Abstract: Provided is a method of providing, by a server, account information, the method including: receiving an account generation request message from a first device; generating first account information, based on user identification information included in the account generation request message; transmitting the generated first account information to the first device; receiving an account use request message from a second device; identifying the first account information and service identification information included in the received account use request message; and transmitting second account information corresponding to the identified first account information and the service identification information, to the second device.Type: GrantFiled: October 7, 2016Date of Patent: November 17, 2020Assignee: Samsung Electronics Co., Ltd.Inventors: Igor Shnurenko, Yevhenii Yakishyn, Jae-hong Kim
-
Patent number: 10839070Abstract: Disclosed herein are methods, systems, and apparatus for securely executing smart contract operations in a trusted execution environment (TEE). One of the methods includes receiving, by a blockchain node participating in a blockchain network, a request to execute one or more software instructions in a service TEE hosted by the blockchain node, wherein the request is encrypted by a public key associated with the service TEE; decrypting the request with a first private key associated with the service TEE, wherein the first private key is paired with the public key; in response to decrypting the request, executing the one or more software instructions to produce an execution result; encrypting the execution result with a client encryption key associated with the service TEE to produce an encrypted result; and signing the encrypted result using a second private key associated with the TEE to produce a signed encrypted result.Type: GrantFiled: October 31, 2019Date of Patent: November 17, 2020Assignee: Advanced New Technologies Co., Ltd.Inventors: Changzheng Wei, Ying Yan, Boran Zhao, Xuyang Song, Huabing Du
-
Patent number: 10833922Abstract: Methods, systems, and media for adding IP addresses to firewalls are provided. In some embodiments, the method comprises: receiving a network packet that includes an external IP address associated with an external device, wherein the external device is a device not protected by a firewall; determining whether the external IP address is included in a group of IP addresses maintained by the firewall; determining whether to add the external IP address to the group of IP addresses; identifying an Internet Service Provider (ISP) associated with the external IP address; determining whether the ISP is included in a group of ISPs maintained by the firewall; and in response to determining that the ISP is not included in the group of ISPs maintained by the firewall, adding the external IP address to the group of IP addresses and adding the ISP to the group of ISPs.Type: GrantFiled: September 12, 2017Date of Patent: November 10, 2020Assignees: Synergex Group, Pham Holdings, Inc., Wayne TaylorInventor: Thien Van Pham
-
Patent number: 10834141Abstract: Systems and methods are described to identify and correct inaccurate or non-compliant access policies for an authorization service that uses such policies to control access to instances of one or more network-accessible services. Each service can implement one or more instances on behalf of individual service users, which users can author an access policy to control whether requests to access the instances are allowed or disallowed at the authorization service. The access policies can be authored according to policy guidelines established by the service. If the policy guidelines of a service change (e.g., are updated to a new version), the authorization service can detect policies non-compliant with the changed guidelines, and notify service users of the non-compliant policies. The authorization service may further notify users of modifications or transformations to bring access policies into compliances with changed policy guidelines.Type: GrantFiled: September 14, 2017Date of Patent: November 10, 2020Assignee: Amazon Technologies, Inc.Inventor: Andrew Christopher Chud
-
Patent number: 10817596Abstract: A method for image based authentication of a human computer user as opposed to a robot is applied in a server. The server generates a CAPTCHA image and preprocesses the CAPTCHA image. The CAPTCHA image is preprocessed by halftoning and mapping pixel sparsity onto pre-computed levels by block based operation. The server then encrypts the preprocessed CAPTCHA image into two shared images and transmits same to the client device. The client device renders the two shared images on a display through a user interface to facilitate superimposition of the two shared images and the user can visually decrypt the preprocessed CAPTCHA image and input an authentication code according to the CAPTCHA characters.Type: GrantFiled: June 13, 2018Date of Patent: October 27, 2020Assignee: NANNING FUGUI PRECISION INDUSTRIAL CO., LTD.Inventors: Chia-Ming Yeh, Rui-Tang Huang
-
Patent number: 10805308Abstract: Jointly discovering user roles and data clusters using both access and side information by performing the following operation: (i) representing a set of users as respective vectors in a user feature space; representing data as respective vectors in a data feature space; (ii) providing a user-data access matrix, in which each row represents a user's access over the data; and (iii) co-clustering the users and data using the user-data matrix to produce a set of co-clusters.Type: GrantFiled: December 22, 2017Date of Patent: October 13, 2020Assignee: International Business Machines CorporationInventors: Youngja Park, Taesung Lee, Ian M. Molloy, Suresh Chari, Benjamin J. Edwards
-
Patent number: 10803190Abstract: Systems, computer program products and methods implementing access control on a distributed file system are described. A file system enforcement point protects an HDFS from unauthorized access by authenticating a declared identity of a task submitting a request from a client. Upon receiving the request, the file system enforcement point submits a challenge to the client, requesting the task to provide credentials of the declared identity. The task submits credentials. On the client, each task has access to credentials of a true identity of the task. Accordingly, in case a task submits a claimed identity that is different from the true identity of the task, the task cannot submit correct credentials in response to the challenge. The file system enforcement point authenticates the declared identity using the submitted credentials. The file system enforcement point allows the client to access the HDFS only upon successful authentication.Type: GrantFiled: July 21, 2017Date of Patent: October 13, 2020Assignee: BlueTalon, Inc.Inventors: Dilli Dorai Minnal Arumugam, Prasad Mujumdar, Pratik Verma