Patents Examined by Zoha Piyadehghibi Tafaghodi
  • Patent number: 10547637
    Abstract: A computer-implemented method for automatically blocking Web Proxy Auto-Discovery Protocol (WPAD) attacks may include (i) automatically detecting, by a computing device, a WPAD request for a configuration file, (ii) identifying, by the computing device, a server attempting to fulfill the WPAD request for the configuration file, (iii) determining, by the computing device, that the server is not included in a whitelist of WPAD servers for the configuration file, and (iv) automatically performing, by the computing device and based on the determination that the server is not included in the whitelist, a security action to secure the WPAD request for the configuration file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: January 28, 2020
    Assignee: CA, Inc.
    Inventors: Adam Glick, Akshata Krishnamoorthy Rao, Feng Li, Douglas Schlatter
  • Patent number: 10541813
    Abstract: Embodiments of the disclosure provide a method of incorporating multiple authentication systems and protocols. The types of authentication systems and protocols can vary based on desired assurance levels. A Centralized Authentication System together with an authentication policy dictates acceptable authentication systems. Authorization data for each authorization system are captured and packaged into a single Object Data Structure. The authorization data can be compared to data stored in an identity store for authentication. The authorization data can also be used for user and device registration and for transferring an authentication or registration token from a previously authenticated and registered device to a new device.
    Type: Grant
    Filed: May 8, 2017
    Date of Patent: January 21, 2020
    Assignee: Aetna Inc.
    Inventors: Salil Kumar Jain, Abbie Barbir, Sylvan Tran, Jay Marehalli, Derek Swift
  • Patent number: 10523678
    Abstract: A system and method are provided for authenticating a user using a client side server within a computer network, the computer network operating in conformance with an open source initiative (OSI) model of structuring protocol data unit messages, the method comprising: generating a connection request at a client side server, the connection request including (i) a client side network layer protocol address information for use in a network layer (L3) protocol data unit (PDU), and (ii) a client side transport layer protocol address information for use in a transport layer (L4) PDU; transmitting the connection request from the client side server using both the network layer and the transport layer; receiving at the client side server an authentication call message on both the network and transport layers using the client side network layer protocol address information and client side transport layer protocol address information; transmitting user authentication information in response to the received authenticatio
    Type: Grant
    Filed: October 25, 2016
    Date of Patent: December 31, 2019
    Inventors: Sean Dyon, Melissa Dyon
  • Patent number: 10489597
    Abstract: According to some embodiments, a system may include a communication port to exchange information with a client device associated with an industrial control system. A network security server coupled to the communication port may include a computer processor adapted to provide a network security service for the client device. The computer processor may further be adapted to record security information about the client device via a blockchain verification process (e.g., by registering a validation result within a distributed ledger). The network security service might comprise, for example, an integrity attestation service providing software verification for the client device.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: November 26, 2019
    Assignee: General Electric Company
    Inventors: David Safford, Atul Kshirsagar, William David Smith, II, Richard Paul Messmer
  • Patent number: 10491569
    Abstract: This disclosure provides systems, methods, and computer program products for secure transfer of security domains across shared media. A secure domain interface is associated with a security domain. The secure domain interface receives a secure network data packet and appends a first data frame. A security interface receives the internal data packet and appends a second data frame to the internal data packet. The second data frame generates an open network data frame securely including payload and routing information from the secure network data packet. The security interface receives open network data frames, authenticates and extracts internal data packets, and routes internal data packets to the secure domain interface. The secure domain interface receives internal data packets, authenticates and extracts secure network data packets, and routes secure network data packets to secure network devices in the security domain.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: November 26, 2019
    Assignee: Alterednets Cyber Solutions LLC
    Inventor: Nelson H. Powell, III
  • Patent number: 10484428
    Abstract: The present application is directed a computer-implemented method for enhancing security. The method includes a step of sending, from a VPN service provider, a request to a cloud provider to create a dynamic server on a cloud. Then, the VPN service provider receives a notification from the cloud provider that the requested server is available on the cloud. Subsequently, the VPN service provider embeds the dynamic server with a VPN service. Further, the VPN service provider sends a credential of the dynamic server to an entity on the network. The application is also directed to system for enhancing security on a cloud server.
    Type: Grant
    Filed: September 26, 2016
    Date of Patent: November 19, 2019
    Assignee: LGS Innovations LLC
    Inventor: Michael J. Chen
  • Patent number: 10476876
    Abstract: Systems and methods are provided for use in implementing access controls to content blocks of a user profile associated with a user. One exemplary system includes an access engine configured to receive an access command from a user, via a communication device, to access the user profile. The access command includes a designation of at least one the content blocks for access by a provider, an identity of the provider, and a duration of the access. The access engine is configured to also modify a permission associated with the designated content block(s) in relation to the provider to permit the access by the provider, and to expose the content block(s) to the provider, thereby granting the access for the provider to the content block(s). The access engine is configured to further terminate the access of the provider to the content block(s) when the duration of the access expires.
    Type: Grant
    Filed: January 5, 2017
    Date of Patent: November 12, 2019
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventors: Andrew Christopher Barnes, Eric Orlaska, Mary Thuet
  • Patent number: 10469486
    Abstract: Methods and apparatuses for authenticating communication devices and securely transmitting and/or receiving encrypted voice and data information. A biometric scanner, for example a fingerprint scanner, is utilized for authenticating the communication device and for generating the encryption key. The fingerprint scanner can be an area or swipe type of scanner is registered to a particular user and has unique intrinsic characteristics (the scanner pattern) that are permanent over time and can identify the scanner even among scanners of the same manufacturer and model. The unique scanner pattern of the scanner generates a unique encryption key that cannot be reproduced using another fingerprint scanner.
    Type: Grant
    Filed: April 8, 2017
    Date of Patent: November 5, 2019
    Assignee: UNIVERSITY OF MARYLAND
    Inventors: John S. Baras, Vladimir Iankov Ivanov
  • Patent number: 10452825
    Abstract: A method for user identity authentication using virtual reality includes presenting one or more virtual elements on a virtual reality (VR) scenario of a VR application for initiating a service, identifying, using one or more sensors communicably coupled to the VR device, one or more interactive operations of a user of the VR device with the one or more virtual elements, determining whether the one or more interactive operations match one or more predetermined operations for selecting the one or more virtual elements to initiate the service and trigger biometric authentication for user identity authentication, invoking biometric authentication if the one or more interactive operations match one or more predetermined operations, presenting a virtual guidance in the VR scenario for guiding the user to perform the biometric authentication, and presenting a service interface to the user if the biometric authentication is successful.
    Type: Grant
    Filed: October 12, 2017
    Date of Patent: October 22, 2019
    Assignee: Alibaba Group Holding Limited
    Inventors: Jun Wu, Xiaodong Zeng, Huanmi Yin, Feng Lin
  • Patent number: 10452852
    Abstract: A method for measurement of an information-security-controlling status in accordance with the present disclosure includes receiving actual inspection data obtained by actually inspecting whether each domain complies with each security-controlling item, computing security-controlling status measurement scores for each domain on the basis of a significance grade of each control item, the degree of compliance with a corresponding control item, and a weighting set by a measurement manager, computing a final security-controlling status measurement score for a parent organization to which each domain belongs on the basis of an average of the security-controlling status measurement scores for each domain, and outputting the computed security-controlling status measurement scores and final security-controlling status measurement score.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: October 22, 2019
    Assignee: Korea University Research and Business Foundation
    Inventors: Kyung Ho Lee, Young In You, Seon Ju Kim, In Hyun Cho, Hyun Sik Yoon
  • Patent number: 10423195
    Abstract: A verification method, device and computer-readable storage medium based on a flexible display screen are provided. The method includes: generating a verification code, and dividing the verification code into a plurality of parts; displaying the plurality of parts on the flexible display screen separately; detecting deformation of the flexible display screen, and determining a splicing result of the plurality of parts based on the deformation of the flexible display screen; and determining a verification result based on the splicing result.
    Type: Grant
    Filed: May 11, 2017
    Date of Patent: September 24, 2019
    Assignee: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.
    Inventors: Kuifei Yu, Ran Xu
  • Patent number: 10410009
    Abstract: Techniques for making preliminary authorization determinations based on partial contextual information are disclosed. In one or more embodiments, an API receives an authorization request and partial contextual information associated with the authorization request. The API submits the partial contextual information to an authorization service, without submitting complete contextual information associated with the authorization request. The API receives, from the authorization service, a preliminary authorization response based on the partial contextual information. The preliminary authorization includes one of (a) denial of the authorization request and (b) non-denial of the authorization request.
    Type: Grant
    Filed: March 8, 2017
    Date of Patent: September 10, 2019
    Assignee: Oracle International Corporation
    Inventors: Helali Bhuiyan, Daniel M. Vogel
  • Patent number: 10397250
    Abstract: Methods, non-transitory computer readable media, and security management apparatus that retrieves a web page in response to a request for the web page received from a client device. Remote access trojan (RAT) malware detection source code is injected into the web page and the web page is sent to the client device in response to the request. The RAT malware detection client-side source code is configured to, when executed by a web browser of the client device, output an alert when a possible attack is detected based on monitored movement of a mouse pointer, key events, or executing animations. A determination is made when the alert has been received from the client device. A security action is initiated according to an established policy, when the determining indicates that the alert has been received from the client device.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: August 27, 2019
    Assignee: F5 Networks, Inc.
    Inventors: Yaniv Shemesh, Itai Tenenbaum, Hadasa Dorfman
  • Patent number: 10380381
    Abstract: System and method to predict risk of re-identification of a cohort if the cohort is anonymized using a de-identification strategy. An input anonymity histogram and de-identification strategy is used to predict the anonymity histogram that would result from applying the de-identification strategy to the dataset. System embodiments compute a risk of re-identification from the predicted anonymity histogram.
    Type: Grant
    Filed: January 9, 2017
    Date of Patent: August 13, 2019
    Assignee: PRIVACY ANALYTICS INC.
    Inventors: Martin Scaiano, Andrew Baker, Stephen Korte
  • Patent number: 10374792
    Abstract: A system, computer program product, and computer-executable method of providing a layout-independent cryptographic stamp of a distributed data set from a data storage system, the system, computer program product, and computer-executable method comprising receiving a request for a cryptographic stamp of the distributed data set, creating a hash of each slice of the distributed data set, and using each hash from each slice of the distribute data set to create the cryptographic stamp of the distributed data set.
    Type: Grant
    Filed: September 29, 2016
    Date of Patent: August 6, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: David Meiri, Xiangping Chen, William R. Stronge, Felix Shvaiger
  • Patent number: 10366250
    Abstract: The disclosed computer-implemented method for protecting personally identifiable information during electronic data exchanges may include (i) receiving, from a computing device, an authentication token for a proposed electronic data exchange, (ii) preventing the user's personally identifiable information from entering the proposed electronic data exchange by identifying the user using the anonymized identifier rather than using the user's personally identifiable information, (iii) authenticating the user identified in the data exchange information, and (iv) in response to authenticating the user, authorizing completion of the proposed electronic data exchange. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: July 30, 2019
    Assignee: Symantec Corporation
    Inventors: Joseph Chen, Arvind Rao, Quentin Liu
  • Patent number: 10348743
    Abstract: A method includes executing a determination process that determines that a setting value is a search key, the setting value being for an item from among a plurality of items in a record identified in a plurality of records, the plurality of records relating to a plurality of pieces of log information that are collected from a plurality of computers; executing a first identification process that identifies, as the record, another record including the search key from among the plurality of records; executing a second identification process that identifies, as the item, a new item from among the plurality of items, the new item being different from an item used to identify the another record in the executing of the first identification process; repeating executing of the processes; and outputting information on at least one computer that is suspected of a cyber-attack, based on the identified records.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: July 9, 2019
    Assignee: FUJITSU LIMITED
    Inventors: Mebae Yamaoka, Takanori Oikawa, Kazuyoshi Furukawa, Masahiko Takenaka, Yuki Fujishima, Masanobu Morinaga
  • Patent number: 10346631
    Abstract: In one implementation, a system can include a tenant engine to maintain a plurality of tenant profiles with access to a first set of metrics of a plurality of metrics based on authorization via a certificate, a metrics engine to maintain a plurality of metrics derived from instrumentation of a plurality of applications, and a report engine to provide the first set of metrics in response to a report request when the report request is from a user associated with a first tenant profile of the plurality of tenant profiles and the first tenant profile is authorized to access the first set of metrics based on the certificate associated with a private key used to sign a first application of the plurality of applications.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: July 9, 2019
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Michael Gopshtein, Eyal Kenigsberg
  • Patent number: 10341314
    Abstract: A method of security and verifiability of an electronic vote, comprising reception of a temporary voting ballot, during which a temporary voting ballot is received by a voting entity, the temporary voting ballot being encrypted by a public voting encryption key; reception of a validation voting ballot, during which a validation voting ballot is received from the voting entity, the validation voting ballot being encrypted by a public validation encryption key; decrypting the validation voting ballot by a private validation key associated with the public validation encryption key; validating a validation request generated from the decrypted validation voting ballot sent to the voting entity; the preceding steps being repeated until the acceptance of the validation request by the voting entity, after which the encrypted temporary voting ballot is registered as a definitive voting ballot awaiting its counting.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: July 2, 2019
    Assignee: ELECTION-EUROPE
    Inventors: RĂ©gis Jamin, Christopher Dahl
  • Patent number: 10305932
    Abstract: Unique systems, methods, techniques and apparatuses of a substation phasor data concentrator (ssPDC) is disclosed herein. One exemplary embodiment is a method for operating an electrical substation including a merging unit (MU), a phasor measurement unit (PMU), and a substation phasor data concentrator (ssPDC).
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: May 28, 2019
    Assignee: ABB Inc.
    Inventors: Junho Hong, Reynaldo Nuqui