Patents Examined by Yonas Bayou
  • Patent number: 10771462
    Abstract: A user terminal using cloud service, an integrated security management server for the user terminal, and an integrated security management method for the user terminal. The integrated security management method includes receiving, by an integrated security management server, authentication information from at least one user terminal that use a cloud service, authenticating, by the integrated security management server, the user terminal using the authentication information, transmitting, by the integrated security management server, task information to the user terminal so as to control the user terminal, receiving, by the integrated security management server, at least one of a result of processing the task information and state information from the user terminal that verifies the task information, and managing, by the integrated security management server, a state of the user terminal based on at least one of the result of processing and the state information.
    Type: Grant
    Filed: May 16, 2018
    Date of Patent: September 8, 2020
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Seunghun Han, Hyun Ku Kim, Wook Shin, Byung-Joon Kim, Hyoung-Chun Kim
  • Patent number: 10771248
    Abstract: Content individualization, including: encrypting a first part of a source data set using a first key creating a first encrypted data set; encrypting a second part of the source data set using a second key creating a second encrypted data set; encrypting the second part of the source data set using a third key creating a third encrypted data set; and combining the first encrypted data set, the second encrypted data set, and the third encrypted data set to form a final encrypted data set. Key words include watermarking and content individualization.
    Type: Grant
    Filed: December 13, 2018
    Date of Patent: September 8, 2020
    Assignees: Sony Corporation, Sony Pictures Entertainment Inc.
    Inventors: Yoshikazu Takashima, Christopher Taylor
  • Patent number: 10766439
    Abstract: A module for providing security to a vehicle's in-vehicle communication network that is responsive to an operational state of the vehicle.
    Type: Grant
    Filed: August 8, 2017
    Date of Patent: September 8, 2020
    Assignee: Argus Cyber Security Ltd.
    Inventors: Ofer Ben Noon, Yaron Galula, Oron Lavi
  • Patent number: 10769268
    Abstract: There is provided an information processing device in which an application of an electronic device provides a service to a user, the information processing device including a processor; and a memory that includes instructions, which when executed, cause the processor to execute the following steps: associating the application with a processing flow; associating the processing flow with a scope of authorization of an external service; retrieving the scope of the authorization of the external service required by the processing flow associated with the application; retrieving authorized information representing a scope of authorization of the external service authorized by the user; and providing, for each external service, information indicating whether the external service is authorized, based on a result of comparing the scope of the authorization of the external service required by the processing flow with the scope of the authorization of the external service authorized by the user.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: September 8, 2020
    Assignee: Ricoh Company, Ltd.
    Inventors: Ryutaro Sakanashi, Yuuichiroh Hayashi, Yasuharu Fukuda, Seiichi Kondo, Taichi Watanabe
  • Patent number: 10764254
    Abstract: A method is disclosed comprising providing a federated search facility adapted to search for content on a plurality of disparate computer content storage facilities comprising receiving a computer content search request from a client computing device, wherein the user of the client computing device has access rights to secure computer content on at least one of a first content storage and a second content storage; executing a first computer content search on the first content storage and a second computer content search on the second content storage; receiving a first computer content search result from the first content storage and a second computer content search result from the second content storage; consolidating the first computer content search result and the second computer content search result into a consolidated computer content search result; and providing the consolidated computer content search result to the user as a single computer content search result.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: September 1, 2020
    Assignee: Intralinks, Inc.
    Inventors: Christopher Todd Ford, Mayank Choudhary, Kevin L. McCarthy, Anupam Miharia, John William Giudice, Kiran Kumar Tadakamalla, Cole Parker Mercer, Peter Wenzel, Paul Tearnen, Clement Cazalot, Salil J. Darji, Jonathan Gorin
  • Patent number: 10754946
    Abstract: Systems and methods are provided for implementing a machine learning approach to modeling entity behavior. Fixed information and periodically updated information may be utilized to predict the behavior of an entity. By incorporating periodically updated information, the system is able to maintain an up-to-date prediction of each entity's behavior, while also accounting for entity action with respect to ongoing obligations. The system may generate behavior scores for the set of entities. In some embodiments, the behavior scores that are generated may indicate the transactional risk associated with each entity. Using the behavior scores generated, a user may be able to assess the credit riskiness of individual entities and instruct one or more individuals assigned to the entities to take one or more actions based on the credit riskiness of the individual entities.
    Type: Grant
    Filed: July 5, 2018
    Date of Patent: August 25, 2020
    Assignee: Palantir Technologies Inc.
    Inventors: Paul Gribelyuk, Han Xu, Kelvin Lau, Pierre Cholet
  • Patent number: 10754929
    Abstract: Systems, methods, and software can be used to share content. In some aspect, a first user input for copying a content is received at a first application on a mobile device. A token that is associated with the content is generated. A Uniform Resource Identifier (URI) is sent from the first application to a clipboard application. A second user input for pasting the content is received at a second application on the mobile device. The token is received at the second application from the clipboard application. A request for the content is received from the second application. The request includes the token. Whether the second application is authorized to receive the content is determined at the first application. In response to determining that the second application is authorized to receive the content, the content is provided to the second application.
    Type: Grant
    Filed: February 19, 2016
    Date of Patent: August 25, 2020
    Assignee: BlackBerry Limited
    Inventors: Neil Patrick Adams, Jeremy Lawson Kominar, Joseph Patrick Kirwin, Glenn Daniel Wurster
  • Patent number: 10735468
    Abstract: The disclosed computer-implemented method for evaluating security services may include (i) receiving, at a backend security server from an enterprise, multiple suspicious computing events detected within the enterprise, (ii) recording, within the backend security server, historical security information for each computing event that includes (a) a classification of the computing event as malicious or non-malicious based on a security analysis performed by the backend security server and (b) a point in time at which the classification was determined, (iii) evaluating an ability of the backend security server to detect security threats by (a) detecting an additional computing event within the enterprise and (b) determining, based on the historical security information, a point in time at which the backend security server became capable of classifying the additional computing event, and (iv) adjusting a security policy within the enterprise based on the evaluated ability of the backend security server.
    Type: Grant
    Filed: February 14, 2017
    Date of Patent: August 4, 2020
    Assignee: CA, Inc.
    Inventor: Pieter Viljoen
  • Patent number: 10726102
    Abstract: According to an example embodiment of the invention, there is provided a system for providing access to access restricted content to a user, the system including a communication arrangement operable to receive a content request message, the content request message including a content identifier, a processor configured to cause a first determination to be performed to yield a positive or a negative result, a validation module configured to, in response to the first determination yielding a positive result, obtain a first digital rights management key, the processor being further configured to cause a second determination to be performed to yield a positive or a negative result, and responsive to the first and second determinations yielding a positive result, the validation module is configured to cause access to the access restricted content to be provided to the user.
    Type: Grant
    Filed: January 8, 2015
    Date of Patent: July 28, 2020
    Assignee: IPRA Technologies Oy Ltd.
    Inventors: Lauri Valjakka, Jukka-Pekka Jussila, Jari Tapio
  • Patent number: 10728033
    Abstract: Embodiments of the present invention disclose an identity authentication method. The method includes: receiving a request for identity authentication on a target user; sending identity-authentication information on the target user to one or more users in social-network-association with the target user; receiving feedback information from the users in social-network-association with the target user based on the identity-authentication information; and obtaining a result of identity authentication on the target user according to the feedback information from the users in social-network-association with the target user.
    Type: Grant
    Filed: September 21, 2017
    Date of Patent: July 28, 2020
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Rui He, Liang Dong, Longhui Chen, Xuan Zong, Xueliang Zhan, Yanrong Chen, Yanling Zhang, Chenming Zhu
  • Patent number: 10728040
    Abstract: Various embodiments of the present disclosure provide a system and method for detecting network connections having a plurality of interconnected network nodes; a connection-based behavioral anomaly detection device (“CBAD”) connected to one of the plurality of network nodes such that the CBAD may observe data traffic flowing through at least one node of the plurality of network nodes; an application loaded onto a first node of the plurality of network nodes, the application initializing a connection from the first node to a second node of the plurality of network nodes; and a computer-readable storage device communicatively connected to the CBAD; wherein the application transmits a plurality of data packets from the first node to the second node of the plurality of network nodes; the CBAD observes at least one of the plurality of data packets exchanged between the first node and the second node; the CBAD extrapolates packet information from at least one of the plurality of data packets observed; and the extra
    Type: Grant
    Filed: September 14, 2018
    Date of Patent: July 28, 2020
    Inventors: Tai Seibert, Haw-minn Lu
  • Patent number: 10715497
    Abstract: Techniques are described for generating and executing a digital safety box to provide secure communication between two computing devices. The digital safety box comprises an encryption key, and an executable code that defines a content holder and performs encryption of content stored in the content holder with the encryption key for secure communication. A receiver computing device generates the digital safety box including the executable code and the encryption key for a requesting sender computing device. The digital safety box may be one-time use and include a unique encryption key and a unique executable code. Upon receiving the digital safety box, the sender computing device executes the executable code of the digital safety box as an application that enables the sender computing device to store content in the defined content holder, encrypt the data with the encryption key, and generate a sealed digital safety box including the encrypted content.
    Type: Grant
    Filed: February 13, 2017
    Date of Patent: July 14, 2020
    Assignee: Wells Fargo Bank, N.A.
    Inventor: Joon Maeng
  • Patent number: 10713358
    Abstract: A system and method operable to identify malicious software by extracting one or more features disassembled from software suspected to be malicious software and employing one or more of those features in a machine-learning algorithm to classify such software.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: July 14, 2020
    Assignee: FireEye, Inc.
    Inventors: Michael Sikorski, William Ballenthin
  • Patent number: 10708307
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Grant
    Filed: August 10, 2017
    Date of Patent: July 7, 2020
    Assignee: SSH Communications Security OYJ
    Inventor: Tatu J. Ylonen
  • Patent number: 10708292
    Abstract: An embodiment of the disclosure provides a method for contextualizing vulnerabilities. The method is performed by a server including a processor and a non-transitory computer-readable medium with computer-executable instructions stored thereon, such that when the instructions are executed by the processor, the server performs the method including: (a) importing raw vulnerability data from a vulnerability scanner, the raw vulnerability data including one or more vulnerability data wherein each vulnerability data includes a vulnerability identification (ID) and an asset value; (b) importing an asset inventory from an asset database; (c) merging the asset inventory and the raw vulnerability data to obtain contextual vulnerability data, the contextual vulnerability data including one or more vulnerability data linked to a vulnerability ID, an asset value, and an asset owner; (d) categorizing the contextual vulnerability data; and (e) generating a report of the categorized contextual vulnerability data.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: July 7, 2020
    Assignee: Aetna Inc.
    Inventor: Ryan Gerrick
  • Patent number: 10693916
    Abstract: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: June 23, 2020
    Assignee: SSH Communications Security OYJ
    Inventor: Tatu J. Ylonen
  • Patent number: 10686818
    Abstract: Methods and systems for malicious non-human user detection on computing devices are described. The method includes collecting, by a processing device, raw data corresponding to a user action, converting, by the processing device, the raw data to features, wherein the features represent characteristics of a human user or a malicious code acting as if it were the human user, and comparing, by the processing device, at least one of the features against a corresponding portion of a characteristic model to differentiate the human user from the malicious code acting as if it were the human user.
    Type: Grant
    Filed: February 26, 2018
    Date of Patent: June 16, 2020
    Assignee: Akamai Technologies, Inc.
    Inventor: Sreenath Kurupati
  • Patent number: 10666430
    Abstract: Embodiments detailed herein relate to techniques which enable the creation of secure point-to-point interconnect communication channels between hardware components which may be independently manufactured and arbitrarily paired with one another in a computer system. Also detailed herein is instruction support for dynamically enabling and disabling the security of a point-to-point interconnect link.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: May 26, 2020
    Assignee: Intel Corporation
    Inventors: Siddhartha Chhabra, Prashant Dewan
  • Patent number: 10652251
    Abstract: One or more embodiments of the disclosure include systems and methods that generate and utilize digital visual codes. In particular, in one or more embodiments, the disclosed systems and methods generate digital visual codes comprising a plurality of digital visual code points arranged in concentric circles, a plurality of anchor points, and an orientation anchor surrounding a digital media item. In addition, the disclosed systems and methods embed information in the digital visual code points regarding an account of a first user of a networking system. In one or more embodiments, the disclosed systems and methods display the digital visual codes via a computing device of the first user, scan the digital visual codes via a second computing device, and provide privileges to the second computing device in relation to the account of the first user in the networking system based on the scanned digital visual code.
    Type: Grant
    Filed: February 1, 2019
    Date of Patent: May 12, 2020
    Assignee: FACEBOOK, INC.
    Inventors: Christopher Anthony Leach, Eugenio Padilla Garza, Anthony Tran, Russell William Andrews
  • Patent number: 10642967
    Abstract: A single sign-on system using blockchain is disclosed. The single sign-on system may interconnect various organization systems over a peer-to-peer network, with each organization system having a blockchain node and an application programming interface (API). The blockchain node invokes and uses a smart contract to write registration credentials to the blockchain during a registration process. During a login process, the blockchain node invokes the smart contract to determine whether login credentials match stored login credentials in the blockchain. In response to matching login credentials, the API may generate a single sign-on token that can be used by a user device to access one or more organization systems connected over the network.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: May 5, 2020
    Assignee: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.
    Inventors: Balaji Balaraman, Andras L. Ferenczi, Dallas L. Gale, Nilesh Yashavant Jadhav, Harish R. Naik