Patents Examined by William B Jones
  • Patent number: 10673853
    Abstract: A method and system for executing a transaction request using a communication channel such as SMS or email has been described. The disclosure provides a proactive/reactive smart response processing system/framework for providing capability to a user to take action from any channel other than desktop. This system takes care of authentication as well by generating a unique key Reply Capture ID Code (RCID) and incorporating it as part of response thus ensuring that the action is being taken from authentic source. The RCID based logic lets each user to be authenticated and at the same time acts a portable token for the transactional request. The invention creates a generic methodology by which responses to communications can be captured and processed via a centralized ERP system.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: June 2, 2020
    Assignee: Tata Consultancy Services Limited
    Inventors: Viral Prakash Shah, Shobhit Shukla, Ikshita Jain, Meenal Keshore, Ramprasad Dhakad
  • Patent number: 10645065
    Abstract: Concepts and technologies disclosed herein are directed to proxy-based database encryption. According to one aspect, a database encryption proxy system can receive, from a database client, input of a Structured Query Language (“SQL”) statement and data to create an encrypted database table. At least a portion of the data is marked with an encrypted identifier to identify which data is to be encrypted by the proxy-based database. The database encryption proxy system can generate a random string for the portion of the data that is marked with the encrypted identifier. The database encryption proxy system can convert the SQL statement into a converted SQL statement that includes the random string in place of the portion of the data marked with the encrypted identifier and can send the converted SQL statement to a cloud database service that is configured to create the encrypted database table based upon the converted SQL statement.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: May 5, 2020
    Assignees: AT&T Intellectual Property I, L.P., AT&T Mobility II LLC
    Inventors: Xidong Wu, Zhengye Liu, Mario Kosseifi
  • Patent number: 10635824
    Abstract: Methods and apparatus are provided for private set membership using aggregation for reduced communications. A determination is made as to whether at least one data element of a client is in a data set of a server by: obtaining a transformation of the at least one data element; receiving a response from the server based on the transformation of the at least one data element, wherein the transformation comprises one or more of a Bloom filter-based transformation that employs a Bloom filter comprising a plurality of hash functions and an encryption-based transformation; and determining whether the at least one data element is in the data set based on the response, wherein one or more of the response and the determining is based on a result of at least one aggregation of a plurality of values that depend on the at least one data element and one or more items in the data set.
    Type: Grant
    Filed: March 20, 2015
    Date of Patent: April 28, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Nikolaos Triandopoulos, Kevin D. Bowers, James A. Kelley, Alina Oprea, Ronald Rivest
  • Patent number: 10630686
    Abstract: In various embodiments, there is provide a method for organizing devices in a policy hierarchy. The method includes creating a first node. The method further includes assigning a first policy to the first node. The method further includes creating a second node, the second node referencing the first node as a parent node such that the second node inherits the first policy of the first node.
    Type: Grant
    Filed: March 10, 2016
    Date of Patent: April 21, 2020
    Assignee: Fornetix LLC
    Inventors: Charles White, Stephen Edwards
  • Patent number: 10623409
    Abstract: There is described a method of controlling access to IP streaming content by a plurality of receivers. The method comprises the steps of (a) for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; (b) identifying a receiver from the plurality of receivers as an identified receiver; (c) updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and (d) configuring each receiver to fetch the updated control information for that receiver. For the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. A server configured to carry out the method is also described.
    Type: Grant
    Filed: March 23, 2012
    Date of Patent: April 14, 2020
    Assignee: IRDETO B.V.
    Inventors: Wim Mooij, Andrew Augustine Wajs
  • Patent number: 10621585
    Abstract: Devices, systems, and methods of contextual mapping of web-page elements and other User Interface elements, for the purpose of differentiating between fraudulent transactions and legitimate transactions, or for the purpose of distinguishing between a fraudulent user and a legitimate user. User Interface elements of a website or webpage or application or other computerized service, are contextually analyzed. A first User Interface element is assigned a low fraud-relatedness score-value, since user engagement with the first User Interface element does not create a security risk or a monetary exposure. A second, different, User Interface element is assigned a high fraud-relatedness score-value, since user engagement with the second User Interface element creates a security risk or a monetary exposure.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: April 14, 2020
    Assignee: BIOCATCH LTD.
    Inventors: Avi Turgeman, Oren Kedem
  • Patent number: 10614197
    Abstract: Monitored shareable links to content items in an online content management service. In one aspect, based on determining that a first view metric associated with a shareable link to a content item is above a first activity threshold associated with the shareable link, a first action is taken on the shareable link. The first action can be allowing or denying requested access to the content item via the shareable link or sending a notification to a user that requested creation of the shareable link regarding user activity on the shareable link. Further, based on determining that a second view metric associated with the shareable link is above a second activity threshold associated with the shareable link, a second action is taken on the shareable link. The second action can be like the first action.
    Type: Grant
    Filed: May 23, 2017
    Date of Patent: April 7, 2020
    Assignee: DROPBOX, INC.
    Inventors: Ilya Fushman, Nils Peter Welinder
  • Patent number: 10601798
    Abstract: Aspects of the disclosure relates to managed access to content and/or services. In certain aspects, tokens or other artifacts can be utilized for authentication and authorization.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: March 24, 2020
    Assignee: Cox Communications, Inc.
    Inventors: Keith Alan Rothschild, Edgar V. Shrum, Muhammad Asif Raza, Jr., Richard M. Thomas
  • Patent number: 10587406
    Abstract: Data within a file system may be protected using a key rotation scheme. The key rotation scheme may include a data key and a metadata key. The data key may be used to encrypt data portions of the file system while the metadata key may be used to encrypt the metadata of the file system. The metadata key may be generated based at least in part on a user input and may be rotated at the end of a key rotation interval.
    Type: Grant
    Filed: December 15, 2016
    Date of Patent: March 10, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Alex Levin, Ron Diamant, Georgy Zorik Machulsky
  • Patent number: 10581812
    Abstract: A device, system and method for fast and secure Proxy Re-Encryption (PRE) using key switching. A first user is assigned first encryption and decryption keys and a second user is assigned second encryption and decryption keys. First encrypted data encrypted with the first encryption key may be re-encrypted using a proxy re-encryption key to simultaneously switch encryption keys by adding the second encryption key and cancelling the first encryption key by the first decryption key to transform the first encrypted data encrypted by the first encryption key to second encrypted data encrypted by the second encryption key, without decrypting the underlying data. The second user may be the sole system device that possesses the (e.g., private) second decryption key to decrypt the second encrypted data.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: March 3, 2020
    Assignee: Duality Technologies, Inc.
    Inventors: Kurt Rohloff, Vinod Vaikuntanathan
  • Patent number: 10581838
    Abstract: The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a first command to create a Module and executes a Module Template to generate the Module in response to the first command. The RA device receives a second command to create a deployment authorization message. The Module and the deployment authorization message are deployed to an Appliance device. A set of instructions of the Module, when permitted by the deployment authorization message and executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: March 3, 2020
    Assignee: Cryptography Research, Inc.
    Inventors: Michael Hamburg, Benjamin Che-Ming Jun, Paul C. Kocher, Daniel O'Loughlin, Denis Alexandrovich Pochuev
  • Patent number: 10572663
    Abstract: The disclosed computer-implemented method for identifying malicious file droppers may include (1) detecting a malicious file on the computing device, (2) constructing an ordered list of files that resulted in the malicious file being on the computing device where the malicious file is the last file in the ordered list of files and each file in the ordered list of files placed the next file in the ordered list of files on the computing device, (3) determining that at least one file prior to the malicious file in the ordered list of files comprises a malicious file dropper, and (4) performing a security action in response to determining that the file prior to the malicious file in the ordered list of files comprises the malicious file dropper. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 9, 2016
    Date of Patent: February 25, 2020
    Assignee: Symantec Corporation
    Inventors: Yun Shen, Azzedine Benameur, Nathan Evans
  • Patent number: 10567157
    Abstract: A virtual enigma cipher system is described herein that allows for symmetric encryption and decryption of data. During encryption, a plurality of wheels representing sequences of data are used to encrypt a message. The plurality of wheels includes at least one dynamic wheel, which is generated based on a password, and a plurality of static wheels. During encryption, the unencrypted message is iterated from beginning to end. During each step of iteration, the encrypted payload value for a particular position is determined by performing an exclusive or (XOR) operation between the value of the unencrypted message at the position, and the values of the wheels at their respective wheel pointer positions. The particular position is then incremented, as are the wheel pointer positions, and iteration continues until the entire unencrypted message has been encrypted as part of the encrypted payload. Padding data and the message length are appended to the encrypted payload. During decryption, the steps are reversed.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: February 18, 2020
    Assignee: Atlassian Pty Ltd
    Inventor: Glenn Austin
  • Patent number: 10541998
    Abstract: The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network environment. The data processing system can improve the efficiency and effectiveness of auditory data packet transmission over one or more computer networks by, for example, disabling malicious transmissions prior to their transmission across the network. The present solution can also improve computational efficiency by disabling remote computer processes possibly affected by or caused by the malicious audio signal transmissions. By disabling the transmission of malicious audio signals, the system can reduce bandwidth utilization by not transmitting the data packets carrying the malicious audio signal across the networks.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: January 21, 2020
    Assignee: GOOGLE LLC
    Inventors: Gaurav Bhaya, Robert Stets
  • Patent number: 10541997
    Abstract: The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network environment. The data processing system can improve the efficiency and effectiveness of auditory data packet transmission over one or more computer networks by, for example, disabling malicious transmissions prior to their transmission across the network. The present solution can also improve computational efficiency by disabling remote computer processes possibly affected by or caused by the malicious audio signal transmissions. By disabling the transmission of malicious audio signals, the system can reduce bandwidth utilization by not transmitting the data packets carrying the malicious audio signal across the networks.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: January 21, 2020
    Assignee: Google LLC
    Inventors: Gaurav Bhaya, Robert Stets
  • Patent number: 10534909
    Abstract: Systems and methods for multi-tiered sandbox based network threat detection are provided. According to one embodiment, a file is received by a computer system. The file is caused to exhibit a first set of behaviors by processing the file within a virtualization application based environment of the computer system. The virtualization application based environment is created based on an application to which the file pertains. The file is further caused to exhibit a second set of behaviors by processing the file within a container based environment of the computer system. Differences, if any, between the first set of behaviors and the second set of behaviors. Finally, the file is classified as malicious when the differences are greater than a predefined or configurable threshold.
    Type: Grant
    Filed: March 2, 2017
    Date of Patent: January 14, 2020
    Assignee: Fortinet, Inc.
    Inventor: Michael F. Chalmandrier-Perna
  • Patent number: 10521591
    Abstract: A computer-implemented method is provided for detecting compiler-injected security flaws. The computer-implemented method includes receiving source code, compiling the source code, reverse engineering the compiled source code, comparing operations performed by the source code and the reverse engineered source code, identifying differences between the source code and the reverse engineered source code, and creating a list of differences. The list of differences includes operations that are present in the source code and missing from binary code. Alternatively, the list of differences includes operations that are present in binary code and missing from the source code.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: December 31, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Steve McDuff
  • Patent number: 10511972
    Abstract: [Object] To provide a communication apparatus, a communication method, and a program, each of which is capable of achieving both security and convenience of communication in transmission of information. [Solution] A communication apparatus, including: an acquisition unit configured to acquire information on a position or external environment of the communication apparatus; and a control unit configured to control transmission of information containing first identification information of the communication apparatus in the case where the information acquired by the acquisition unit satisfies a predetermined condition. A communication method, including: acquiring information on a position or external environment of a communication apparatus; and controlling transmission of information containing first identification information of the communication apparatus in the case where the acquired information satisfies a predetermined condition.
    Type: Grant
    Filed: March 20, 2015
    Date of Patent: December 17, 2019
    Assignee: SONY CORPORATION
    Inventor: Tatsuo Nagamatsu
  • Patent number: 10503895
    Abstract: Runtime non-intrusive container security introspection and remediation is disclosed. For example, a persistent storage associated with a container has a write protected lower system layer and an upper system layer, and a first snapshot of the upper system layer is created. A first request to modify data in the persistent storage is detected. A first requested modification is forwarded to a security inspection service. A threat state of the container based is determined on the first requested modification, where the threat state is one of a threatening state and a non-threatening state. In response to determining that the container is in the non-threatening state, the container is notified that the first requested modification is non-threatening and a second snapshot of the upper system layer is created. In response to determining that the container is in the threatening state, a container engine is instructed to respond to the threatening state.
    Type: Grant
    Filed: April 11, 2017
    Date of Patent: December 10, 2019
    Assignee: Red Hat, Inc.
    Inventor: Huamin Chen
  • Patent number: 10503920
    Abstract: The embodiments herein relate to discrete data containers and, more particularly, to management of data stored in discrete data containers. Embodiments herein disclose methods and systems to update data present within a data container, when a user accessing the data, present within the data container, has updated the data. Embodiments herein disclose a method and system for enabling modifications of data present in data containers, wherein de-containerized data associated with a data container can be modified by at least one user and the modifications by the user can be reflected in real-time to the data in the data container.
    Type: Grant
    Filed: March 15, 2018
    Date of Patent: December 10, 2019
    Assignee: VAULTIZE TECHNOLOGIES PRIVATE LIMITED
    Inventors: Ankur Panchbudhe, Praneeth Siva, Amol Vaikar, Yusuf Batterywala