Patents Examined by William S. Powers
  • Patent number: 10530774
    Abstract: Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted application relies on a trusted application executing in the same environment for authentication purposes. The delegated authentication process avoids requiring the user of the untrusted application to provide authentication credentials. The disclosed system for delegating authentication enables any trusted application executing in the same computing environment to authenticate the untrusted application.
    Type: Grant
    Filed: February 5, 2018
    Date of Patent: January 7, 2020
    Assignee: Twitter, Inc.
    Inventors: Jeffrey Seibert, Jr., Michael Ducker
  • Patent number: 10496803
    Abstract: Data processing systems and methods, according to various embodiments are adapted for efficiently processing data to allow for the streamlined assessment of the risk level associated with particular privacy campaigns. The systems may provide a centralized repository of templates of privacy-related question/answer pairings for various vendors, products (e.g., software products), and services. Different entities may electronically access the templates (which may be periodically updated and centrally audited) and customize the templates for evaluating the risk associated with the entities' respective business endeavors that involve the relevant vendors, products, or services.
    Type: Grant
    Filed: January 7, 2019
    Date of Patent: December 3, 2019
    Assignee: OneTrust, LLC
    Inventors: Kabir A. Barday, Jonathan Blake Brannon
  • Patent number: 10491603
    Abstract: A method includes: determining an encryption level associated with an application installed on a computing device; determining a context in which the computing device is operating, wherein determining the context comprises identifying a geographic location of the computing device; determining at least one rule associated with the context, wherein determining the at least one rule comprises identifying a security policy corresponding to allowed encryption levels associated with the identified geographic location of the computing device; determining whether the encryption level associated with the application installed on the computing device meets the allowed encryption level associated with the one rule; and in response to determining that the encryption level associated with the application installed on the computing device does not meet the allowed encryption level associated with the one rule, causing at least one action on the computing device to meet the allowed encryption level associated with the one r
    Type: Grant
    Filed: March 7, 2019
    Date of Patent: November 26, 2019
    Assignee: LOOKOUT, INC.
    Inventors: William Neil Robinson, Brian James Buck
  • Patent number: 10484334
    Abstract: An application profile is provided to manage security of an application deployed across two or more cloud computing networks. A user can define in the application profile first and second server groups, a cloud chamber as including the first and second server groups, and a computing flow to the cloud chamber. A firewall rule is generated based on the computing flow. The firewall rule is distributed to the first server group of the cloud chamber. A copy of the firewall rule is distributed to the second server group of the cloud chamber. The first server group is in a first cloud computing network that is provided by a first cloud provider. The second server group is in a second cloud computing network that is provided by a second cloud provider, different from the first cloud provider.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: November 19, 2019
    Assignee: Zentera Systems, Inc.
    Inventors: Jaushin Lee, Hung Chuen Jason Lee
  • Patent number: 10474838
    Abstract: Embodiments of the present disclosure include systems and methods for securely entering, receiving, and storing sensitive data. A server system may determine if a request received from a user computing device communicatively coupled to the server triggers a requirement to receive sensitive data from the user computing device, generate a data structure for the sensitive data, designate a plurality of contact methods, determine a communication protocol for each of the designated plurality of contact methods, transmit a request for data unit information to the corresponding designated contact methods via the determined communication protocol for each data unit of the data structure, receive from each of the designated contact methods, the data unit information corresponding to the respective single data unit, and generate sensitive data by aggregating the received data unit information received from each of the designated contact methods.
    Type: Grant
    Filed: November 20, 2018
    Date of Patent: November 12, 2019
    Assignee: Capital One Services, LLC.
    Inventors: Joshua Edwards, Salik Shah, Michael Mossoba
  • Patent number: 10474811
    Abstract: A system, method, and computer-readable medium for detecting malicious computer code are provided. Instructions, such as HTML or JavaScript instructions may be received from a server, parsed, and executed. During execution of the instructions, one or more functions of a software application, such as a web browser, may be hooked, and an event object may be created for each called function that is hooked, resulting in a collection of event objects. Rules may be matched with event objects of the collection of event objects to detect malicious code. Attributes from the matched event objects may then be used to locate original malicious script or code injected into a web page.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: November 12, 2019
    Assignee: VERISIGN, INC.
    Inventors: Matthew Cote, Trevor Tonn
  • Patent number: 10476905
    Abstract: Systems, methods, and software described herein provide enhancements for implementing security actions in a computing environment. In one example, a method of operating an advisement system to provide actions in a computing environment includes identifying a security incident in the computing environment, identifying a criticality rating for the asset, and obtaining enrichment information for the security incident from one or more internal or external sources. The method also provides identifying a severity rating for the security incident based on the enrichment information, and determining one or more security actions based on the enrichment information. The method further includes identifying effects of the one or more security actions on operations of the computing environment based on the criticality rating and the severity rating, and identifying a subset of the one or more security actions to respond to the security incident based on the effects.
    Type: Grant
    Filed: March 19, 2018
    Date of Patent: November 12, 2019
    Assignee: Splunk Inc.
    Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
  • Patent number: 10462186
    Abstract: Various embodiments and related methods are provided that can include or operate a variety of modular systems such as a group of user interfaces and software modules which receive inputs from the user interfaces to perform Secure Configuration Evaluation, Remediation, and Reporting Tool tasks. Exemplary modules can include a scan or current state module to populate and/or identify a current state configuration as well as collecting available information on available vulnerability patches or system updates, a software, update, and/or patch configuration selection module that generates a “picklist” user interface for all available software, patches or updates or optionally patches or updates that meet one or more search criteria associated with a baseline data, a data store with install files for all selected or available software, patches or updates selected with the picklist user interface, an installer export package system to generate install packages, and an access/use verification system.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: October 29, 2019
    Assignee: The United States of America, as represented by the Secretary of the Navy
    Inventors: Bryan Daugherty, Christopher A. Parker, Michael A. Meinhart, William J. Terrell
  • Patent number: 10462189
    Abstract: A method for providing an administration policy to a user device comprising a plurality of applications, the method comprising centrally generating the administration policy to be implemented in the user device, the administration policy comprising at least one of an application administration policy to be used by at least one of the plurality of applications and a client administration policy for the user device; and providing the generated policy to the user device.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: October 29, 2019
    Assignee: BlackBerry Limited
    Inventors: Kenneth John Wallis, Bryan Richard Goring, Viera Bibr, Kamen Vitanov, Laura Brindusa Fritsch, Michael Shenfield, Jeffrey Christopher Rogers
  • Patent number: 10417428
    Abstract: Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the computing system being untrusted within the secure enterprise network and based on verification of received authentication credentials, booting an operating system from the secure boot device and establishing a secure communication tunnel with a service appliance.
    Type: Grant
    Filed: January 18, 2016
    Date of Patent: September 17, 2019
    Assignee: Unisys Corporation
    Inventors: Steven L. Rajcan, Matthew Mohr, Jim Trocki, Mark K. Vallevand
  • Patent number: 10412093
    Abstract: Aspects of the disclosure relate to providing information security and preventing unauthorized access to resources of an information system by injecting device data collectors into pages and/or other interfaces provided by and/or otherwise associated with an information system. A computing platform may intercept a request for a uniform resource locator from a client computing device based on configuration information identifying the uniform resource locator as being protected. The computing platform may request and receive, from an application server, a page associated with the uniform resource locator. Then, the computing platform may generate a modified version of the page associated with the uniform resource locator by injecting collector code into source code defining the page associated with the uniform resource locator. Subsequently, the computing platform may send, to the client computing device, the modified version of the page associated with the uniform resource locator.
    Type: Grant
    Filed: August 31, 2016
    Date of Patent: September 10, 2019
    Assignee: Bank of America Corporation
    Inventor: Xianhong Zhang
  • Patent number: 10411880
    Abstract: Disclosed are an apparatus and a method for encryption. The apparatus includes, a key table generation unit configured to generate random values derived from a seed value and generate a key table including the generated random values, and an encryption unit configured to encrypt a plain text data block by generating an encryption algorithm by repeatedly combining the generated key table with a permutation function in a crossing manner, and using the generated encryption algorithm.
    Type: Grant
    Filed: February 23, 2016
    Date of Patent: September 10, 2019
    Assignees: SAMSUNG SDS CO., LTD., CARMEL HAIFA UNIVERSITY ECONOMIC CORP. LTD., BAR-ILAN UNIVERSITY
    Inventors: Duk-Jae Moon, Ji-Hoon Cho, Kyu-Young Choi, Nathan Keller, Orr Dunkelman, Itai Dinur
  • Patent number: 10397231
    Abstract: Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.
    Type: Grant
    Filed: May 14, 2018
    Date of Patent: August 27, 2019
    Assignee: Intel Corporation
    Inventors: Hong C. Li, John B. Vicente, Prashant Dewan
  • Patent number: 10387684
    Abstract: Systems and methods for preventing vulnerabilities in a blockchain due to quiescence are disclosed including submitting a first crosslink transaction for addition to a first blockchain that includes cross-referencing information for a second crosslink transaction that corresponds to the first crosslink transaction and submitting the second crosslink transaction for addition to a second blockchain that includes cross-referencing information corresponding to the first crosslink transaction. The first and second crosslink transactions are configured to be usable together by a user of at least one of the first and second blockchains to validate at least a portion of one of the first and second blockchains after a period of quiescence in the one of the first and second blockchains.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: August 20, 2019
    Assignee: International Business Machines Corporation
    Inventors: James E. Carey, Scott N. Gerard
  • Patent number: 10382205
    Abstract: A security method for using a blockchain service creates a secure blockchain to protect data through a privacy-aware blockchain arbitration server that has zero or restricted capability to view or modify the contents of each block being submitted to the blockchain, creating a barrier between arbitration server and blockchain. A block creator constraint and a block approval authority regulate which block submitter, or creator, and what type of block can be submitted and accepted by blockchain. Arbitration server sums the number of approvals for new blocks added to blockchain. In summing, if the accumulated approvals and disapprovals of blocks satisfy the block's approval policy, the arbitration server adds the block to blockchain and sends to blockchain participants upon queries. If the accumulated approvals and disapprovals of blocks don't satisfy block's approval policy, the arbitration server drops the block. Blockchain participants verify if the new blocks added by the arbitration server.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: August 13, 2019
    Inventor: Hajoon Ko
  • Patent number: 10375201
    Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
    Type: Grant
    Filed: August 11, 2016
    Date of Patent: August 6, 2019
    Assignee: Micro Focus Software Inc.
    Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R Carter, Vernon Roger Holm
  • Patent number: 10372885
    Abstract: The disclosure is directed to an access permission system that manages provisioning of access to an electronic resource through various types of access permissions. The access permission system provisions access by provisioning a license entitlement of a specified type. A provisioning optimization technique determines a combination of different types of license entitlements to be provisioned according to an optimization criterion associated with an attribute of a license entitlement. For example, the optimization criterion can based on a “unit cost” associated with a license entitlement, and the provisioning optimization technique can determine various types of license entitlements to be obtained (and therefore to be provisioned) in order to minimize a total cost of the license incurred in satisfying the consumption demand requests.
    Type: Grant
    Filed: March 22, 2018
    Date of Patent: August 6, 2019
    Assignee: Flexera Software LLC
    Inventor: Timothy M. Adam
  • Patent number: 10354070
    Abstract: In one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic causes the processing circuit to monitor a plurality of application instances operating on a first host. The logic also causes the processing circuit to detect that a first application thread has been called by a first application instance operating on the first host and determine whether the first application thread is registered to be called by the first application instance on the first host by consulting a registration index. Moreover, the logic causes the processing circuit to quarantine the first application thread in response to a determination that the first application thread is not registered to be called by the first application instance on the first host.
    Type: Grant
    Filed: August 22, 2016
    Date of Patent: July 16, 2019
    Assignee: AVOCADO SYSTEMS INC.
    Inventors: Keshav Govind Kamble, Amitabh Sinha, Shailesh R. Naik
  • Patent number: 10341351
    Abstract: Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.
    Type: Grant
    Filed: March 30, 2018
    Date of Patent: July 2, 2019
    Assignee: Intel Corporation
    Inventors: Hong C. Li, John B. Vicente, Prashant Dewan
  • Patent number: 10326767
    Abstract: Disclosed is a system for a facility supporting an access controller, at least one ingress card reader and an auto-enrollment type controller including a front panel having a single button, a controller board, a terminal block for connecting at least the one ingress card reader to the auto-enrollment type controller board and to connect the auto-enrollment type controller to door locks, and a mounting plate, with the auto-enrollment type controller being configured by a user according to operational requirements of the facility by the user asserting the button for a defined period of time.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: June 18, 2019
    Assignee: SENSORMATIC ELECTRONICS, LLC
    Inventors: Stephan Frenette, Gabriel Labrecque, Jean-Francois Roy