Patents Issued in November 9, 2017
  • Publication number: 20170324677
    Abstract: A system and method for optimized stream management are provided. The method includes retrieving priority data; determining, in real-time, a current priority tree based on the retrieved priority data, wherein the priority tree includes at least one node representing a stream; identifying, based on the retrieved priority data, at least one relative weight of the at least one node; determining an effective weight based on each identified relative weight; and filling a buffer based on the current priority tree and the at least one effective weight.
    Type: Application
    Filed: May 4, 2016
    Publication date: November 9, 2017
    Applicant: RADWARE, LTD.
    Inventors: Roy BERLAND, Elad GRUPI
  • Publication number: 20170324678
    Abstract: A bandwidth sharing system is provided that has worker nodes with executor threads for copying data from source nodes to destination nodes based on assigned copy jobs. To execute its assigned copy job, a worker thread of a worker node registers its copy job with the source node. The source node allocates a portion of its bandwidth to the copy job. The source node sends the data of the copy job to the worker thread, and the worker thread forwards the data to the destination node. Upon completion of the copy job, the worker thread deregisters the copy job. The deregistration allows the source node to reallocate the portion of its bandwidth that was allocated to the copy job to another copy job.
    Type: Application
    Filed: May 4, 2016
    Publication date: November 9, 2017
    Inventor: Jian Li
  • Publication number: 20170324679
    Abstract: A system may comprise a first group of switches, each switch including a first group of inputs and outputs, and a first group of controllers, each controller being independent from one another and corresponding to a switch of the first group of switches, to selectively control the switch to connect the switch's inputs with outputs. The first group of switches and controllers may be installed in a chassis. The system may comprise a second group of switches, each switch including a second group of inputs and outputs, and a second group of controllers, each controller corresponding to a switch of the second group of switches, to selectively control the switch to connect the switch's inputs with outputs. The second group of controllers may control and connect, via a group of control links, to the first group of controllers.
    Type: Application
    Filed: July 21, 2017
    Publication date: November 9, 2017
    Inventors: Sunil MEKAD, Satish D. DEO
  • Publication number: 20170324680
    Abstract: Embodiments of the present invention disclose a data transmission method and apparatus for a terminal. The terminal exchanges data of an application with a server through a first port by using a first access node; when one port in a second port set is in an enabled state, the terminal accesses one access node in a candidate access node set through the enabled port in the second port set, and exchanges, based on the Multipath TCP, the data of the application with the server by using an access node corresponding to the enabled port.
    Type: Application
    Filed: June 2, 2017
    Publication date: November 9, 2017
    Inventors: Yi Tu, Jia Wan, Xihua Huang
  • Publication number: 20170324681
    Abstract: System and method for supporting a partitioned switch forwarding table in a high performance computing environment. Described methods and systems can support partitioned switch forwarding tables (e.g., partitioned LFTs) by setting up hardware registers that divide the LFT into at least two partitions, a first partition that supports legacy forwarding (e.g., standard LID based forwarding without the need to use portions of the GRH), and a second partition to support the GRH based forwarding that is described above. In such a manner, switches and other hardware within a core fabric can behave as legacy nodes/switches having standard LFTs, while also being able to support the extended addressing supplied through the use of portions of the GRH.
    Type: Application
    Filed: July 21, 2017
    Publication date: November 9, 2017
    Inventors: Bjørn Dag Johnsen, Arvind Srinivasan, Shimon Muller
  • Publication number: 20170324682
    Abstract: One embodiment of the present invention provides a switch. The switch includes a port to couple to a second switch. The switch also includes a control mechanism configured to maintain a set of configuration information for a virtual cluster switch which includes a number of member switches. The set of configuration information includes global configuration information for the virtual cluster switch and switch-specific configuration information for one or more member switches. In addition, the set of configuration information is replicated and stored at each member switch.
    Type: Application
    Filed: July 17, 2017
    Publication date: November 9, 2017
    Applicant: BROCADE COMMUNICATIONS SYSTEMS, INC.
    Inventors: Suresh Vobbilisetty, Shiv Haris, Phanidhar Koganti, Vidyasagara R. Guntaka
  • Publication number: 20170324683
    Abstract: In one aspect, at least one processor may receive a first user input and identify one or more first keywords from the first user input to determine one or more previously recorded outputs corresponding to the first keywords. The previously recorded outputs may correspond to a virtual character, such as a celebrity. Further, the at least one processor may select one of the determined previously recorded outputs and output the selected previously recorded output corresponding to the virtual character. The at least one processor may also identify one or more second keywords from at least the first user input, temporarily store the second keywords in memory in association with at least one portion of the user input, receive a second user input, and determine another previously recorded output based at least in part on the temporarily stored keywords associated with the first user input.
    Type: Application
    Filed: July 21, 2017
    Publication date: November 9, 2017
    Inventors: Marco Ciofalo, Fabio Viviani
  • Publication number: 20170324684
    Abstract: A centralized message system includes a controller in communication with one or more vendor user interfaces for each vendor and one or more consumer user interfaces for each consumer and a database including a plurality of consumers and a plurality of vendors, wherein each consumer has an associated vendor list, wherein each vendor has an associated consumer list. The centralized message system also includes a memory coupled to the controller configured to store program instructions executable by the controller, that, when executed, cause the controller to receive a request from a first vendor to add a first consumer to a consumer list of the first vendor and to receive a request from a second consumer to add a second vendor to a vendor list of the second consumer.
    Type: Application
    Filed: May 9, 2017
    Publication date: November 9, 2017
    Inventors: Bidhu Kishan Dharmapalan, Ajith V. Prabhakar
  • Publication number: 20170324685
    Abstract: A method and system are provided for enabling voice communications via a messaging application. The method comprises enabling an instant messaging (IM) presence status option to be selected; and blocking an incoming voice communication when the presence status option has been selected. A method and system are also provided comprising displaying a first instant message in an instant messaging conversation user interface comprising call status information; and displaying updated call status information in the instant messaging conversation user interface after determining whether an call attempt has been successful.
    Type: Application
    Filed: July 21, 2017
    Publication date: November 9, 2017
    Inventors: Henry Yao-Tsu CHEN, Jennifer Anne PRETTI
  • Publication number: 20170324686
    Abstract: The present disclosure relates to system(s) and method(s) for enabling secure and efficient communication between user devices within an organization. Cloud-based messaging services are popular, but organizations hesitate to use them due to the risk of private data residing on public cloud servers. Organizations prefer to host the servers within the organization (on-premise). However, this approach is neither efficient nor cost-effective. The disclosure describes a system and method for secure and efficient communication within an organization that uses an on-premise server to tokenize user messages, i.e. replacing user data in messages with token to generate a tokenized message and sending the tokenized message to the cloud server. In response, the cloud server returns a processed tokenized message, which is then de-tokenized by the on-premise server before forwarding the message to the user. The proposed system is both secure and efficient.
    Type: Application
    Filed: May 3, 2016
    Publication date: November 9, 2017
    Inventors: Beerud Dilip Sheth, Nirmesh Satish Mehta
  • Publication number: 20170324687
    Abstract: An example user terminal device includes a display unit, including a display, configured to display a lock screen. The lock screen includes content representative information representing content included in a message that is provided by an acquaintance of a user of the user terminal device, and a first user interface element. A control unit, including a processor, is configured to, when a user input signal is received via the first user interface element, execute an application capable of reproducing the content and to reproduce the content.
    Type: Application
    Filed: July 24, 2017
    Publication date: November 9, 2017
    Inventors: Ji-su JUNG, Sunah KIM, Jin-young LEE, Ga-hyun JOO
  • Publication number: 20170324688
    Abstract: Among other things, embodiments of the present disclosure relate to communicating via an avatar embedded in an email message. In some embodiments, the avatar can provide information associated with the email message.
    Type: Application
    Filed: July 27, 2017
    Publication date: November 9, 2017
    Inventors: Jean-Luc Collet, Francois-Xavier Drouet, Carole Truntschka
  • Publication number: 20170324689
    Abstract: Provided is a task tracking method including identifying a mail that includes at least one piece of mail information among sender information, receiver information, a mail title, and mail content through a message communication tool; recognizing the mail that includes the at least one piece of mail information as a task and tracking the task; and automatically classifying the task based on a preset condition, and displaying the classified task through the message communication tool.
    Type: Application
    Filed: May 2, 2017
    Publication date: November 9, 2017
    Inventors: Changyol BAEK, KyoungHwan LEE
  • Publication number: 20170324690
    Abstract: A social network conversation dynamic inclusion threshold causes a first subset of social network group members of a social network group to be included in a social network conversation earlier than at least one other social network group member. In accordance with the social network conversation dynamic inclusion threshold, social network posts of the social network conversation are distributed to the first subset of social network group members while delaying distribution of the social network posts of the social network conversation to the at least one other social network group member. Upon satisfaction of the social network conversation dynamic inclusion threshold, the social network posts of the social network conversation are distributed to the at least one other social network group member.
    Type: Application
    Filed: July 21, 2017
    Publication date: November 9, 2017
    Inventors: Paul R. Bastide, Matthew E. Broomhall, Robert E. Loredo, Dale M. Schultz
  • Publication number: 20170324691
    Abstract: A method of updating electronic mails (emails) data dataset that comprises providing a dataset which comprises a plurality of previously identified original message content blocks as a plurality of discrete units, each the original message content block having a header content and a sender content and being extracted from emails exchanged in a multi-email correspondence, receiving at least one additional email, analyzing the at least one additional email to identify a plurality of original message content blocks, tagging each of the plurality of original message content blocks as a discrete unit, and updating the dataset with the plurality of original message content blocks.
    Type: Application
    Filed: July 24, 2017
    Publication date: November 9, 2017
    Inventor: Haim Zlatokrilov
  • Publication number: 20170324692
    Abstract: A method for saving chat records of instant messaging (IM) includes when an instant message transmitted or received by an IM chat window comprises non-text information, acquiring a content summary of the non-text information, and saving the instant message, and saving the non-text information as a data object comprising the non-text information and the content summary of the non-text information.
    Type: Application
    Filed: July 27, 2017
    Publication date: November 9, 2017
    Inventor: JINGWEN ZHOU
  • Publication number: 20170324693
    Abstract: A first selectable command is displayed on a User Interface (UI) of the UE, and a first request is sent to a server via the UI, such that the server returns a first message of a non-text type; the first message returned by the server is received, and it is determined that the first message supports display of specified information; first operation applied on a result displayed by the first message is received, and a second request is sent, via the first operation, to the server to draw random information; in response to the first operation, display of the specified information is triggered, and the random information drawn from the server is received.
    Type: Application
    Filed: July 21, 2017
    Publication date: November 9, 2017
    Inventors: Siyu Xiao, Xiaoyu Yu, Libin Ren, Yongjie Li, Wei Mao, Yi Gao, Mengsha Zhou, Zhenzhen Xu
  • Publication number: 20170324694
    Abstract: A method for method for streamlining communications between groups of users uses multiple user accounts and a remote server. Each user account is associated to a user PC device. Additionally, the method associates each user with a representative group. The user account is identified as a primary account or a secondary account. As a result, primary accounts are granted greater messaging permissions than secondary accounts. To that end, the secondary accounts are able to broadcast messages to all of the primary accounts that are associated to a representative group. The primary accounts on the other hand are able to selectively send messages to one or more individual secondary accounts. Moreover, the primary accounts are able to broadcast messages to the primary accounts that are associated to any of the representative groups.
    Type: Application
    Filed: May 9, 2017
    Publication date: November 9, 2017
    Inventor: Quazi Shamim Islam
  • Publication number: 20170324695
    Abstract: There are provided systems and methods for automated monitoring of electronic messaging for timed alerts of previously transmitted messages. A sender may transmit an electronic communication to a recipient, where the sender activates an automated timer application to track the viewing and/or response of the communication by the recipient. The application may establish a timer having a set time period of the recipient to respond to the communication. If the recipient fails to respond, view, or otherwise acknowledge the communication by the end of the timer, the application may send an alert to the recipient to remind the recipient of the communication. The recipient and sender may establish preferences for the timer and the alert with the application. Moreover, the application may determine the timer based on the urgency of the communication, as well as determine where and when to send the alert based on recipient information.
    Type: Application
    Filed: May 9, 2016
    Publication date: November 9, 2017
    Inventors: Ralf Horst Fischer, Matthias Patrick Rosch
  • Publication number: 20170324696
    Abstract: A first input is received. The first input is from a first user to one or more second users. The first input includes a text to be sent from the first user to the one or more second users. Whether the text includes a third user is determined. Responsive to determining the text includes the third user, whether a relationship change within a time interval between the one or more second users and the third user is determined. Responsive to determining that there was the relationship change between the one or more second users and the third user, the first user is notified of the relationship change.
    Type: Application
    Filed: May 5, 2016
    Publication date: November 9, 2017
    Inventors: Ben Z. Akselrod, Anthony Di Loreto, Steve McDuff, Kyle D. Robeson
  • Publication number: 20170324697
    Abstract: A method, system and computer program product for maintaining relationships between users in a social network. Online interactions between users in the social network are monitored. A period of inactivity of communication from a first user to a second user in the social network is determined based on the time of the last communication from the first user to the second user. If the period of inactivity exceeds a threshold, then a communication posted by the second user in the social network is selected, such as based on popularity. The selected communication posted by the second user is then emphasized in an activity stream (e.g., news feed) of the first user. In this manner, by emphasizing a communication posted by the second user in an activity stream of the first user, the relationship between the first and second users may continue to be active.
    Type: Application
    Filed: May 5, 2016
    Publication date: November 9, 2017
    Inventors: Paul R. Bastide, Matthew E. Broomhall, Robert E. Loredo
  • Publication number: 20170324698
    Abstract: A method, system, and/or computer program product alter a state of a transmitted message. One or more processors detect an initial broadcast of a message. The message includes a time-sensitive posting, which is related to an event that occurs at an event time. Processor(s) then compare a current time to the event time. In response to determining that the current time is within a predefined time period in proximity to the event time, processor(s) issue an instruction to alter a state of the message.
    Type: Application
    Filed: May 9, 2016
    Publication date: November 9, 2017
    Inventors: LISA SEACAT DELUCA, JENNY S. LI, DANA L. PRICE, AARON J. QUIRK
  • Publication number: 20170324699
    Abstract: In one aspect, a method of a managing an online social network includes the step of providing an online social network. The online social network includes a set of nodes, wherein each node represents a user and a set of relationships between each node. The method includes the step of identifying a set of users that are members of the same family. The method includes the step of identifying each node of the set of users that are members of the same family. When a member of the set of users interacts with another member of the set of users determine an interaction; determine a family-relationship status between the member and the other member; and score the interaction. The method includes the step of generating a family bonding index based on the family relationship status of the member and the other member and the score the interaction. The method includes the step of updating the set of relationships of the online social network based on the family bonding index.
    Type: Application
    Filed: February 22, 2017
    Publication date: November 9, 2017
    Inventors: ADRIS CHAKRABORTY, SAPTARSHI DAS, PIYAS DE
  • Publication number: 20170324700
    Abstract: A computer-implemented method of automatically adding an identifier related to a content item to a communication in a multi-user communication network such as a social network. The method comprising obtaining a robust fingerprint of the content item, retrieving the identifier from a database using the robust fingerprint, and adding the identifier formatted in a format suitable for the multi-user communication network to the communication. Preferably the robust fingerprint relates to a particular timepoint in the content item and the identifier relates to an aspect of the content item at the particular timepoint. Also a system and computer program product.
    Type: Application
    Filed: May 15, 2017
    Publication date: November 9, 2017
    Inventor: Alex Dick Terpstra
  • Publication number: 20170324701
    Abstract: A method and system for populating identities in a message service involves registering a user of a first messaging service with a second messaging service. User identities for users other than the registered user may be identified. These user identities may be associated with the first messaging service and may be stored in a list associated with the registered user. It is determined if each identified user identity has a matching user identity associated with the second messaging service. If so, a database associated with the second messaging service is populated with the matching user identities. Determining whether a matching user identity exists may be performed, for example, by making character strings comparisons between user identities or using a database that stores a mapping of first messaging service user identities to second messaging service user identities. The mapping database may be generated as corresponding user identities are discovered.
    Type: Application
    Filed: July 26, 2017
    Publication date: November 9, 2017
    Inventor: George Fletcher
  • Publication number: 20170324702
    Abstract: An Egress Tunnel Router (ETR) may establish a neighbor connection with a Map Server (MS). After the ETR establishes the neighbor connection with the MS, or after the ETR detects a status update of the MS from inaccessible to accessible, the ETR may register all Endpoint Identifiers EIDs configured on the ETR with the MS. After the ETR receives a register acknowledgement message with regard to a registered EID from the MS, the ETR may stop registering the registered EID with the MS.
    Type: Application
    Filed: October 21, 2015
    Publication date: November 9, 2017
    Inventor: Changwang LIN
  • Publication number: 20170324703
    Abstract: System and method for supporting multiple concurrent SL to VL mappings in a high performance computing environment. In accordance with an embodiment, systems and methods can provide for two or more SL to VL mappings per ingress switch port in a network switched fabric. By allowing for multiple such mappings, greater virtual lane independence can be achieved while continuing to achieve quality of service guarantees.
    Type: Application
    Filed: July 21, 2017
    Publication date: November 9, 2017
    Inventors: Bjørn Dag Johnsen, Arvind Srinivasan, Shimon Muller
  • Publication number: 20170324704
    Abstract: One embodiment provides a system that facilitates schematized access control in a content centric network. During operation, the system generates, by a content producing device, a secret key for a user based on a schema, wherein the schema is a regular expression which corresponds to one or more names and allows a user access to content associated with the names, wherein a name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level. The system receives an interest with a name that corresponds to the schema. The system encrypts a payload of a responsive content object based on the interest name. The system transmits the responsive content object with the encrypted payload to the user, which allows the user to decrypt the encrypted payload with the secret key.
    Type: Application
    Filed: May 9, 2016
    Publication date: November 9, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Christopher A. Wood, Glenn C. Scott
  • Publication number: 20170324705
    Abstract: A domain name registrar, preferably with website hosting capabilities, may assist a customer in creating and planning for a new Internet business. The registrar may analyze various data from one or more successful competitor businesses selected by the customer to create and display a product usage timeline of the successful competitor businesses. In addition, the registrar may offer for purchase similar products and/or services used by the selected successful competitor businesses to assist the customer in planning and growing the customer's own Internet business.
    Type: Application
    Filed: May 9, 2016
    Publication date: November 9, 2017
    Inventor: Tapan Kamdar
  • Publication number: 20170324706
    Abstract: System and method for supporting flexible forwarding domain boundaries in a high performance computing environment. In accordance with an embodiment, flexible forwarding domain boundaries can be supported by dividing/partitioning a physical switch into two or more logical switches, where each switch is logically in a different domain, and allowing a fabric to be decomposed into independent subnets with one two or more physical end ports at the physical switch. By doing so, the same hierarchical forwarding structure and management structure between subnets can be provided as when complete physical switches are used as building blocks.
    Type: Application
    Filed: July 21, 2017
    Publication date: November 9, 2017
    Inventors: Bjørn Dag Johnsen, Arvind Srinivasan, Shimon Muller
  • Publication number: 20170324707
    Abstract: In a network service provider environment, the service provider infrastructure is protected by separating internet routing from the default context and placing it within a virtual private network context. Packets received from the public internet are encapsulated for transit through the service provider infrastructure based on the packet source being the public internet. MPLS VPN technology may be used in the encapsulation technique. The architecture removes the public part of the underlay network and tunnels it through a new overlay. The result is that internet traffic is contained in a separate routing domain, hiding the network infrastructure from that untrusted service traffic that transits the network.
    Type: Application
    Filed: May 3, 2016
    Publication date: November 9, 2017
    Inventors: Dimitri Krinos, Gary R. Flack, Adrian Cepleanu
  • Publication number: 20170324708
    Abstract: Systems and methods provide concurrent security processing for multiple network security tools. An input packet is received at a network packet forwarding system from a network packet source, and the network packet forwarding system concurrently sends an output packet based upon the input packet to multiple security tools. Return packets are received based upon the output packet from the security tools after their respective security processing. Once return packets are received from each of the security tools, the network packet forwarding system forwards a secure packet to a packet destination. If a timeout occurs before all return packets are received, the network packet forwarding system can assume that the original packet was unsafe and discard information stored for the input packet. If security tools are configured to modify packets, these modifications can also be tracked.
    Type: Application
    Filed: May 5, 2016
    Publication date: November 9, 2017
    Inventors: Scott Register, Shardendu Pandey, Glenn Chagnot
  • Publication number: 20170324709
    Abstract: Methods, systems, and computer-readable media for efficiently detecting threat incidents for cyber threat analysis are described herein. In various embodiments, a computing device, which may be located at a boundary between a protected network associated with the enterprise and an unprotected network, may combine one or more threat indicators received from one or more threat intelligence providers; may generate one or more packet capture and packet filtering rules based on the combined threat indicators; and, may capture or filter, on a packet-by-packet basis, at least one packet based on the generated rules. In other embodiments, a computing device may generate a packet capture file comprising raw packet content and corresponding threat context information, wherein the threat context information may comprise a filtering rule and an associated threat indicator that caused the packet to be captured.
    Type: Application
    Filed: December 19, 2016
    Publication date: November 9, 2017
    Inventors: David K. Ahn, Sean Moore
  • Publication number: 20170324710
    Abstract: Systems and methods herein can provide device-specific access to an e-mail server, including an EWS-based e-mail server. In an example, a management server controlled by a system administrator provides device identification information to a user device and to a tunnel server. The management server also provides a custom request identifier to the tunnel server, and provides instructions to the e-mail server to allow access for requests including that custom request identifier. The tunnel server receives a request from the user device, rewrites the request to include the custom request identifier, and passes the request to the e-mail server.
    Type: Application
    Filed: May 5, 2016
    Publication date: November 9, 2017
    Inventor: Robert Terakedis
  • Publication number: 20170324711
    Abstract: System and method for confirming and transferring information from one party to another via block chain escort, using central and decentralized databases acting as online storage providers. Files are linked to cryptographic currency structures comprised of a public and private key identification processes. Locking, unlocking, retrieving, storing, confirming and transferring files requires linked association to block chain protocol measures of crypto-currency processes. Establishing file space requires that the owner links it to a centralized or decentralized peer-to-peer cryptographic block chain protocol. This secures and locks files for subsequent confirmation and transfer. Confirmation and transfer of the file is processed with a cryptographic hash function of crypto currency block chain process. The system and method requires that the transferee obtain the file using crypto currency transfer protocol.
    Type: Application
    Filed: May 3, 2016
    Publication date: November 9, 2017
    Applicant: THE REAL MCCOY, LLC INC.
    Inventors: Patrick Feeney, Douglas Scott Eads
  • Publication number: 20170324712
    Abstract: Aspects of the present disclosure relate to cryptography. In particular, example embodiments relate to computing a relationship between private data of a first entity and private data of a second entity, while preserving privacy of the entities and preventing inter-entity data sharing. A server includes a first component to compute an intersection of two datasets, without directly accessing either dataset. The server includes a second component to compute a relationship, such as a regression, between data in the first dataset and data in the second dataset, without directly accessing either dataset.
    Type: Application
    Filed: May 5, 2016
    Publication date: November 9, 2017
    Inventors: Krishnaram Kenthapadi, Ryan Wade Sandler
  • Publication number: 20170324713
    Abstract: Various embodiments are generally directed to techniques to distribute encrypted packets among multiple cores in a load-balanced manner for further processing. An apparatus may include a processor component; a decryption component to decrypt an encrypted packet to generate a decrypted packet from the encrypted packet, the encrypted packet comprising a header that comprises at least one field of information; a hash component to generate a header hash from the at least one field of information during decryption of at least a portion of the encrypted packet by the decryption component, the header hash comprising a smaller quantity of bits than the at least one field of information; and a distribution component to select a first core of multiple cores coupled to the processor component based on the header hash and to transmit the decrypted packet to the first core from the processor component. Other embodiments are described and claimed.
    Type: Application
    Filed: January 23, 2017
    Publication date: November 9, 2017
    Applicant: Intel Corporation
    Inventors: THOMASZ KANTECKI, NIALL MCDONNELL
  • Publication number: 20170324714
    Abstract: A method is provided in one example embodiment and includes receiving at a node of a transitive IP network a data packet including a Network Services Header (“NSH”); accessing by the transitive IP network node context contained in the NSH, wherein the context may be used by the transitive IP network node to perform an enhanced network service in connection with the received data packet; performing by the transitive IP network node the enhanced network service in connection with the received data packet using the accessed context; and, subsequent to the performing, forwarding the received packet to a next node.
    Type: Application
    Filed: May 4, 2016
    Publication date: November 9, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Warren Scott Wainner, Brian E. Weis, Paul Quinn, Scott Roy Fluhrer
  • Publication number: 20170324715
    Abstract: Various embodiments include a network manager for managing network keys in a network having a plurality of nodes, the device including: a memory; and a processor configured to: determine N nodes to blacklist, wherein N is an integer; select a polynomial function from a plurality of polynomial functions of degree K and wherein the polynomial functions define plurality of secret network keys; generate K-N random abscissa values, wherein none of the random abscissa values are not found in a list of node abscissa values; calculate K-N polynomial function values for the K-N random abscissa values; calculate N polynomial function values for N node abscissa values associated with the N blacklisted nodes; transmit a message to nodes in the network including an indication of the selected polynomial function, the K-N random abscissa values, the N node abscissa values associated with the N blacklisted nodes, the K-N calculated polynomial function values, and the N calculated polynomial function values.
    Type: Application
    Filed: October 19, 2016
    Publication date: November 9, 2017
    Inventors: Andrei Catalin Frincu, Georgel Bogdan Alexandru
  • Publication number: 20170324716
    Abstract: Various embodiments described herein relate to network key manager which is configured to manage keys in nodes in the network, wherein the network key manager including a memory configured to store an update data structure; a processor configured to: determine which nodes are blacklisted; generate the update data structure of volatile private keys for each node that is not blacklisted, wherein the volatile private key is based upon secret information associated with the node and an index, wherein the volatile private key is used for the indexth key update; determine a neighbor node of the network key manager; remove the volatile private key for the neighbor node from the update data structure; encrypt the resulting update data structure and a new network key with the private key for the neighbor node to produce an encrypted message; and send the encrypted message to the neighbor node.
    Type: Application
    Filed: October 19, 2016
    Publication date: November 9, 2017
    Inventors: Andrei Catalin Frincu, George Bogdan Alexandru
  • Publication number: 20170324717
    Abstract: A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files.
    Type: Application
    Filed: July 5, 2017
    Publication date: November 9, 2017
    Inventors: David W. Kravitz, Donald Houston Graham, III, Josselyn L. Boudett, Russell S. Dietz
  • Publication number: 20170324718
    Abstract: A key distributer node for a network includes a memory device with at least one first key, at least one data communication device that can exchange data with first and second access nodes for a terminal integrated wirelessly into the network, at least one processor connected to the memory device and the data communication device, wherein functions are provided for the processor(s) that allow authentication of the terminal at the second access node in response to a key request received by the second access node, a derivation of a second key from the first key, and triggered transmission of the second key through the data communication device to the second access node. Connections to the network's first and second access nodes with security relationships can be provided for the key distributor node when using the first key.
    Type: Application
    Filed: July 26, 2017
    Publication date: November 9, 2017
    Inventors: Thomas Gamer, Matthias Roth, Michael Bahr, Christian Schwingenschlogl
  • Publication number: 20170324719
    Abstract: Described herein is a framework to authenticate users. In accordance with one aspect of the framework, an authentication library is provided to implement an authentication process. The authentication library comprises computer-readable program code to create a request for an access token, send the request to the authorization server, deconstruct a response from the authorization server to extract the access token, and return the access token for use in accessing one or more resources.
    Type: Application
    Filed: May 8, 2016
    Publication date: November 9, 2017
    Inventor: Leigh Robert MASON
  • Publication number: 20170324720
    Abstract: An information recording apparatus has a drive unit to record digital information including digital contents; and a host unit to control reading and writing of the digital information for the drive unit. The host unit has a network processing unit to communicate with a server, a shadow determination unit to determine whether a shadow boot program to be executed prior to a boot program is executable, a shadow reading unit to read the shadow program from the drive unit when the shadow determination unit determines to be executable, a shadow execution unit to execute the shadow program, a server authentication unit to perform authentication with the server in accordance with a processing of the shadow program, and a password transmitter to transmit to the drive unit a password used for unlock of the drive unit when the authentication with the server is successful.
    Type: Application
    Filed: July 12, 2017
    Publication date: November 9, 2017
    Applicant: Toshiba Memory Corporation
    Inventor: Hiroshi ISOZAKI
  • Publication number: 20170324721
    Abstract: Methods, systems, and products authenticate a user to a device. A user selects or submits a media file for authentication. Features in the media file are compared to a set of criteria for authentication. The number of matching criteria, that is within a range of values for each criterion in the set of criteria, is determined. The number of matching criteria is compared to a threshold value. When the number of matching criteria equals or exceeds the threshold value, then the user that selected or submitted the media file is authenticated.
    Type: Application
    Filed: July 21, 2017
    Publication date: November 9, 2017
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: David Kormann, William Roberts Cheswick
  • Publication number: 20170324722
    Abstract: In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.
    Type: Application
    Filed: July 24, 2017
    Publication date: November 9, 2017
    Inventors: Justin Call, Subramanian Varadarajan, Bryan Hanks
  • Publication number: 20170324723
    Abstract: A system and method validates user supplied photographs and/or characteristics using a video, audio or series of images of the user responding to instructions, and uses such validation in searching and/or matching.
    Type: Application
    Filed: July 24, 2017
    Publication date: November 9, 2017
    Inventors: Alexander F. MEHR, Shayan G. ZADEH, Jared R. CRANE, Joshua D. ROYSE
  • Publication number: 20170324724
    Abstract: Systems and methods for performing DNSSEC signing are described in which digital signature operations may be performed by a network accessible signing server that is configured to interact with a separate client application. Exemplary methods may include receiving a signing request at the signing server from the client application to sign first data. The signing server may determine an active KSK and/or an active ZSK for the first data. The first data may then be transmitted by the signing server to a digital signature modules, which may include, for example, a hardware support module, or software signing applications. The signing server may receive a digitally signed version of the first data from the digital signature module, and provide the signed first data to the client application.
    Type: Application
    Filed: July 26, 2017
    Publication date: November 9, 2017
    Inventors: David Smith, James Gould, Ramana Lavu, Deepak Deshpande
  • Publication number: 20170324725
    Abstract: A system may include a first computer system and a second computer system. The first computer system may be configured to generate a Constrained Application Protocol (CoAP) message including authentication data and message data. The first computer system may be further configured to communicate the CoAP message for delivery to the second computer system. The second computer system may be configured to perform message validation based on the authentication data.
    Type: Application
    Filed: July 26, 2017
    Publication date: November 9, 2017
    Applicant: EXILANT Technologies Private Limited
    Inventor: Vishnu Sharma
  • Publication number: 20170324726
    Abstract: An augmented reality (AR) interactive system and method is provided. In one embodiment the systems comprises a user interface configured to receive user input, a processor configured to manage user input data, and a display in processing communication with one another and said user interface via said processor. The processor is operative to perform the following functions: initiate communication with at least one third party computer to start a user session; and display graphical images and textual information in overlying registration using the display so that the images and textual information appear as part of a plurality of computer keys of a computer keyboard, wherein the processor is configured to display computer keys in random order each time the keys are displayed.
    Type: Application
    Filed: August 25, 2016
    Publication date: November 9, 2017
    Inventors: Vincent ALLEAUME, Maximilien BELLOT, Anthony LAURENT