Patents Examined by Zhimei Zhu
  • Patent number: 9740838
    Abstract: The present invention relates to a method and computer program for providing authentication to control access to a computer. system including online services accessed via a portal, cloud based systems and browser accessed systems using for example HTML5, and relates particularly, but not exclusively, to authentication systems for mobile computer and telecommunications devices.
    Type: Grant
    Filed: June 1, 2012
    Date of Patent: August 22, 2017
    Assignee: Sensipass Ltd.
    Inventors: Michael J. Hill, Thomas R. Ruddy
  • Patent number: 9736128
    Abstract: Disclosed are systems and methods for delegating computations of resource-constrained mobile clients, in which multiple servers interact to construct an encrypted program representing a garbled circuit. Implementing the garbled circuit, garbled outputs are returned. Such implementations ensure privacy of each mobile client's data, even if an executing server has been colluded. The garbled circuit provides secure cloud computing for mobile systems by incorporating cryptographically secure pseudo random number generation that enables a mobile client to efficiently retrieve a result of a computation, as well as verify that an evaluator actually performed the computation. Cloud computation and communication complexity are analyzed to demonstrate the feasibility of the proposed system for mobile systems.
    Type: Grant
    Filed: May 20, 2015
    Date of Patent: August 15, 2017
    Assignees: The Board of Regents, The University of Texas System, Center for Technology Licensing at Cornell University
    Inventors: Sriram Nandha Premnath, Zygmunt J. Haas
  • Patent number: 9721094
    Abstract: Techniques for determining privacy leaks are described herein. The techniques may include (i) providing private data as input for an application, wherein the private data includes a signature identifying the private data; (ii) monitoring an output of the application for a presence of the signature; and (iii) determining that a private data leak has occurred in the application, wherein the determining is based, at least in part, on the presence of the signature in the output.
    Type: Grant
    Filed: May 20, 2015
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ronen Bachar, Roee Hay, Yoav Shany, Omer Tripp
  • Patent number: 9710640
    Abstract: Disclosed are various embodiments that facilitate bootstrap authentication of a second application by way of a user confirmation via a first application, where the first application is authenticated using trusted credentials. A security credential for a user account is received from a user. A first application is authenticated with an authentication service using the security credential. One or more user actions are received by the first application. The user actions constitute a confirmation of a bootstrap authentication request submitted by a second application. Data encoding the user actions is sent to the authentication service.
    Type: Grant
    Filed: March 28, 2014
    Date of Patent: July 18, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Harsha Ramalingam, Jesper Mikael Johansson, Bharath Kumar Bhimanaik
  • Patent number: 9697244
    Abstract: Record addressing information retrieval is achieved using a plurality of user data descriptors. When a threshold number of user data descriptors from a set of user data descriptors are received, the threshold number of user data descriptors can be converted into a computed record index that is compared to a list of record indexes associated with a plurality of records. When the computed record index compares favorably to a record index in the list of record indexes, the record addressing information for a particular record is retrieved based on the record index.
    Type: Grant
    Filed: June 18, 2014
    Date of Patent: July 4, 2017
    Assignee: International Business Machines Corporation
    Inventor: Jason K. Resch
  • Patent number: 9699184
    Abstract: A method for processing data is suggested, and includes (i) conveying input data from a safety component to a security component, and (ii) calculating, at the security component, a second identifier based on the input data. The method further includes (iii) conveying the second identifier to the safety component, and (iv) verifying, at the safety component, a first identifier based on the second identifier.
    Type: Grant
    Filed: September 11, 2014
    Date of Patent: July 4, 2017
    Assignee: Infineon Technologies AG
    Inventors: Laurent Heidt, Albrecht Mayer
  • Patent number: 9699202
    Abstract: In an embodiment, a central computer performs a data processing method. The central computer receives telemetry data from intrusion sensors. The central computer stores authentication records in a hosts database. Each authentication record is based on the telemetry data and comprises a thumbprint of a public key certificate and a host identifier of a sender computer. The central computer receives a suspect record that was sent by a first intrusion sensor. The suspect record has a first particular thumbprint of a first particular public key certificate and a first particular host identifier of a suspect sender. From the hosts database, the central computer searches for a matching record having a same host identifier as the first particular host identifier of the suspect record and a same thumbprint as the first particular thumbprint of the suspect record. The central computer generates an intrusion alert when no matching record is found.
    Type: Grant
    Filed: May 20, 2015
    Date of Patent: July 4, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: David McGrew, Titouan Rigoudy
  • Patent number: 9652634
    Abstract: Exemplary methods, apparatuses, and systems generate an encryption key based upon data content of a portion of data to be encrypted by the encryption key. The encryption key is stored as one of a plurality of encryption keys within a subset of storage. Each of the plurality of encryption keys is generated based upon corresponding data content. A checksum representing the plurality of encryption keys is calculated. In response to receiving an input/output (I/O) request for data encrypted by the encryption key, a verification checksum representing the plurality of encryption keys is calculated. The requested data is decrypted using the encryption key in response to verifying the checksum and verification checksum match.
    Type: Grant
    Filed: May 19, 2015
    Date of Patent: May 16, 2017
    Assignee: VMware, Inc.
    Inventors: Wenguang Wang, Xiaoxuan Meng
  • Patent number: 9602500
    Abstract: An embodiment includes a method executed by at least one processor of a first computing node comprising: generating a key pair including a first public key and a corresponding first private key; receiving an instance of a certificate, including a second public key, from a second computing node located remotely from the first computing node; associating the instance of the certificate with the key pair; receiving an additional instance of the certificate; verifying the additional instance of the certificate is associated with the key pair; and encrypting and exporting the first private key in response to verifying the additional instance of the certificate is associated with the key pair. Other embodiments are described herein.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: March 21, 2017
    Assignee: Intel Corporation
    Inventors: Alex Nayshtut, Hormuzd M. Khosravi, Omer Ben-Shalom, Barry R. Pivitt, Ned M. Smith
  • Patent number: 9565214
    Abstract: Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module associated with the attempt, determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt, accessing a security rule to determine whether to allow the attempted access based on the determination of the module and the determination of the subsection, and handling the attempt based on the security rule. The module includes a plurality of distinct subsections.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: February 7, 2017
    Assignee: McAfee, Inc.
    Inventors: Aditya Kapoor, Jonathan L. Edwards, Craig Schmugar, Vladimir Konobeev, Michael Hughes
  • Patent number: 9565181
    Abstract: A method and apparatus are provided for protecting security credentials (e.g., username/password combinations) and/or other sensitive data in a “password vault.” A password vault device may be or may be incorporated into a portable (or even wearable) electronic device, such as a smart phone, smart watch, smart glasses, etc. When a security credential is requested during a user's operation of the password vault device or some other computing/communication device, such as when the user is accessing an online site or service via a browser program, the request is passed to the password vault, and the appropriate security credential is retrieved, delivered, and entered into the requesting interface.
    Type: Grant
    Filed: March 26, 2014
    Date of Patent: February 7, 2017
    Inventor: Wendell D. Brown
  • Patent number: 9536077
    Abstract: A method is provided for attack detection and protection of a set of virtual machines in a system, which includes at least one first host server hosting said set of virtual machines. The method includes: receiving an attack detection message regarding a virtual machine, triggering a first migration of the virtual machine from the first host server toward a security system, and receiving an attack treatment message regarding the migrated virtual machine.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: January 3, 2017
    Assignee: ORANGE
    Inventors: Fabien Bignon, Sylvie Laniepce, Karel Mittig
  • Patent number: 9491257
    Abstract: Embodiments relate to facilitating social interactions. An aspect includes determining that a first communications device is in communicative contact with a second communications device, identifying at least one artifact relating to a user of the first communications device, and searching at least one database for information about a user of the second communications device that is in common with the user of the first communications device with respect to the artifact. Also, results of the searching are provided as a topic of conversation to the first communications device.
    Type: Grant
    Filed: August 13, 2013
    Date of Patent: November 8, 2016
    Assignee: Globalfoundries, Inc.
    Inventors: Christian B. Kau, Anuj Kumar, Barton A. Smith
  • Patent number: 9473382
    Abstract: A method for providing Link Aggregation Control between a plurality of systems adapted for Link Aggregation is provided. The plurality of systems includes a primary system, a first secondary system, and a second secondary system. The primary system comprises first primary ports being linked to first ports of the first secondary system by first links. Further, the primary system comprises second primary ports being linked to second ports of the second secondary system by second links. The method comprises forming a link aggregation group, wherein the link aggregation group includes at least one first link and at least one second link. A preferred system among the secondary systems having links within the link aggregation group is selected and further, the method comprises setting the status of the primary ports according to the selection of the preferred system.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: October 18, 2016
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Laith Said, Daniel Derksen, Purvi Shah, John Volkering
  • Patent number: 9450759
    Abstract: Apparatus and methods for controlling the distribution of electronic access clients to a device. In one embodiment, a virtualized Universal Integrated Circuit Card (UICC) can only load an access client such as an electronic Subscriber Identity Module (eSIM) according to an activation ticket. The activation ticket ensures that the virtualized UICC can only receive eSIMs from specific carriers (“carrier locking”). Unlike prior art methods which enforce carrier locking on a software application launched from a software chain of trust (which can be compromised), the present invention advantageously enforces carrier locking with the secure UICC hardware which has, for example, a secure code base.
    Type: Grant
    Filed: April 5, 2011
    Date of Patent: September 20, 2016
    Assignee: Apple Inc.
    Inventors: Jerrold Von Hauck, David T. Haggerty
  • Patent number: 9397991
    Abstract: Digital content distribution systems and methods are provided for distributing for digital data files, such as digital audio and video data files. In accordance with one implementation, a token-based authentication system is provided that does not require knowledge of the individual user requesting the download of digital content data or real-time access to user account information. Instead, the token-based authentication system embeds the authentication information, or token, in the download request information itself. In this way, the download or content server authenticates the download request using the token contained in the download request information and therefore does not require any additional information to carry out this authentication, such as access to user account information.
    Type: Grant
    Filed: December 9, 2013
    Date of Patent: July 19, 2016
    Assignee: AOL Inc.
    Inventors: Depeng Bi, Stephen Christopher Gladwin, Troy Steven Denkinger, Timothy Scott Franklin, Bart Richard Cilfone, Anne Marie Pewterbaugh, Jeffrey Jonathan Spurgat
  • Patent number: 9380067
    Abstract: An IPS detection processing method, a network security device and a system are disclosed. The method includes: determining, by a network security device, whether an internal network device is a client or a server; if the internal network device is the client, simplifying an IPS signature rule base to obtain an IPS signature rule base corresponding to the client, or if the internal network device is the server, simplifying the IPS signature rule base to obtain an IPS signature rule base corresponding to the server; generating a state machine according to a signature rule in the IPS signature rule base obtained through simplifying processing; and performing IPS detection on flowing-through traffic by applying the state machine. In embodiments of the present invention, the network security device performs IPS detection by adopting the state machine with a redundant state removed, thereby improving IPS detection efficiency.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: June 28, 2016
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Zhihui Xue, Wu Jiang, Shiguang Li, Shiguang Wan
  • Patent number: 9374359
    Abstract: A method and system for collecting, aggregating, and displaying type specific content in an inbox like view are described. An inbox manager collects information about data objects that are stored locally and stored remotely. This information may be stored as inbox information on a local computing system. Using the inbox information, the inbox manager creates an inbox view of merged inbox items from the local data objects and the remote data objects. The inbox view is configured to display the inbox items as being merged into a single view regardless of where the respective data objects are stored.
    Type: Grant
    Filed: May 23, 2012
    Date of Patent: June 21, 2016
    Assignee: Red Hat, Inc.
    Inventors: William Jon McCann, Cosimo Cecchi
  • Patent number: 9361446
    Abstract: Service providers may operate one or more services configured to detect requests generated by automated agents. A CAPTCHA may be transmitted in response to requests generated by automated agents. The CAPTCHAs may be included in a modal pop-up box configured to be displayed by a client application displaying a webpage to a customer of the service provider. Furthermore, the CAPTCHAs included in the modal pop-up box may be rendered inactive and caused not to be displayed by client application executing the webpage. Submitted solutions to CAPTCHAs may be presented with a cookie that enables access to resources of the service provider without restriction. Cookies may be tracked and their use may be used to detect automated agent activity.
    Type: Grant
    Filed: March 28, 2014
    Date of Patent: June 7, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Sevag Demirjian, John Lindsay Bates, Mark Evans Brighton, Samuel Charles Goodwin, Colin James Hawkett, Blair Livingstone Hotchkies, Forrest MacKenzie Vines
  • Patent number: 9350726
    Abstract: An aspect of recovery from rolling security token loss includes storing, in a memory device accessible by a server computer, a token pair (B) transmitted to a client device. The token pair (B) includes an access token (a2) and a refresh token (r2) and is generated as part of a refresh operation. An aspect also includes storing, in the memory device, a refresh token (r1) that was generated by the server computer before generation of the token pair B. The refresh token (r1) and the refresh token (r2) are each tagged as a valid refresh token. An aspect further includes receiving, at the server computer, a request to access a network resource that includes the access token (a2), invalidating the refresh token (r1), and providing the client device with access to the network resource.
    Type: Grant
    Filed: September 11, 2014
    Date of Patent: May 24, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Hockings, Trevor S. Norvill, Philip A. Nye, Asha Shivalingaiah, Patrick R. Wardrop, Shane B. Weeden