Patents Issued in September 25, 2018
  • Patent number: 10083285
    Abstract: Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a “two-factor” authentication technique and authenticating customer's identity utilizing a trusted authenticator.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: September 25, 2018
    Inventors: Nader Asghari-Kamrani, Kamran Asghari-Kamrani
  • Patent number: 10083286
    Abstract: A method and a system for transmitting data from a first electronic device to a second electronic device using a human body as a signal transmission path, are provided. The method includes detecting a first touch event on the first electronic device, the first touch event corresponding to the data. The method further includes receiving indication of a second touch event that is detected on the second electronic device, the second touch event corresponding to a memory location in the second electronic device. The method further includes capacitively transmitting the data from the first electronic device to the memory location through the human body in response to the detecting the first touch event and the receiving the indication of the second touch event.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: September 25, 2018
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Prakash Babu Vemula, Periyasamy Paramasivam, Krishna Kanth Reddy, Vikram Nelvoy Rajendiran
  • Patent number: 10083287
    Abstract: A fingerprint sensing device includes a sensing circuit configured to extract sensing data from nodes included in each of sampling regions of a sensor array. The fingerprint sensing device also includes a control circuit configured to calculate a number of the nodes based on the extracted sensing data to produce sensing data distributions for each of the sampling regions and compare the sensing data distributions with reference distributions, configured to determine that the sampling regions from which the sensing data distributions corresponding to the reference distributions are extracted are effective contact regions, and configured to generate fingerprint information from the sensor array when the number of effective contact regions is greater than or equal to a threshold.
    Type: Grant
    Filed: April 19, 2016
    Date of Patent: September 25, 2018
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Tae Hyeon Kwon, Kang Joo Kim, Yong Il Kwon
  • Patent number: 10083288
    Abstract: Unlocking an electronic device includes displaying a lock screen containing a simulated parallaxing three-dimensional scene on a touch screen of the electronic device; receiving user input gestures on the touch screen; parallaxing the displayed scene in accordance with the input gestures; and determining if the input gestures satisfy input requirements to unlock the electronic device and, if so, unlock the electronic device.
    Type: Grant
    Filed: March 25, 2014
    Date of Patent: September 25, 2018
    Assignee: Sony Corporation and Sony Mobile Communications, Inc.
    Inventor: David de Leon
  • Patent number: 10083289
    Abstract: This document describes authentication using an interactive cord. An interactive cord includes a cable, and a fabric cover that covers the cable. The fabric cover includes one or more conductive threads woven into the fabric cover to form one or more capacitive touchpoints which are configured to enable reception of touch input that causes a change in capacitance to the one or more conductive threads. The interactive cord can be used to authenticate a user. For example, rather than using a password entered into a computing device, a touch input pattern can be provided to interactive cord that is coupled to the computing device to authenticate the user.
    Type: Grant
    Filed: July 5, 2016
    Date of Patent: September 25, 2018
    Assignee: Google LLC
    Inventors: Thad Eugene Starner, Karissa A. Sawyer
  • Patent number: 10083290
    Abstract: A domain identifier of a first domain of a plurality of domains is identified, the domain identifier included in a domain certificate received from the first domain. A first permanent hardware identifier set as a fuse key value embedded in hardware of the device during fabrication is identified. A plurality of unique second private hardware identifiers stored in the secured memory are identified. A plurality of hardware-based root identifiers are derived from the plurality of unique second private hardware identifiers respectively. A plurality of secure identifiers for the respective plurality of unique second private hardware identifiers are derived for a pairing of the device and the first domain based on the plurality of root identifiers respectively and the domain identifier. A secure identifier of the plurality of secure identifiers is caused to be sent over a secured channel to a domain computing device associated with the first domain.
    Type: Grant
    Filed: February 14, 2018
    Date of Patent: September 25, 2018
    Assignee: McAfee, LLC
    Inventors: Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker, Ned McArthur Smith
  • Patent number: 10083291
    Abstract: In one embodiment, a security provisioning service automatically establishes trust in a device. Upon receiving a provisioning request, a security provisioning service identifies a verification item that is associated with the provisioning request. The security provisioning service performs one or more verification operations based on the provisioning request to determine whether the provisioning request is authorized. If the provisioning request is authorized, then the provisioning service establishes a verifiable identification for the device that is assured by the secure provisioning service and then executes the provisioning request. By automatically performing the verification operations to establish trust in the device, the provisioning service eliminates manual identification assurance operations that are performed as part of a conventional security provisioning process.
    Type: Grant
    Filed: February 24, 2016
    Date of Patent: September 25, 2018
    Assignee: VERISIGN, INC.
    Inventors: Stephen D. James, Andrew Fregly, Andrew Cathrow
  • Patent number: 10083292
    Abstract: A method and computer for assessing whether a password can be generated by using characteristics of a physical arrangement of keys of an input device. A received password includes characters corresponding to respective select keys in a sequence of select keys of the input device. For each select key, a final detection frequency is calculated as a sum of an initial detection frequency and an additive correction. A password determination value is calculated as a ratio of a total number of select keys having a final detection frequency equal to a minimum detection frequency and the total number of select keys in the sequence of select keys. A determination of whether the calculated password determination value is, or is not, less than a predetermined threshold value indicates that the password cannot, or can, respectively, be generated by using the characteristics of the physical arrangement of keys of the input device.
    Type: Grant
    Filed: August 1, 2017
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Takeshi Miura, Hiroyuki Takenoshita, Yuji Yanagihara
  • Patent number: 10083293
    Abstract: A method, computer system, and a computer program product for timing secured content is provided. The present invention may include receiving a connection request and generating a pass-phrase and a key. The present invention may include encrypting a data packet, wherein the encrypted data packet consists of non-persistent data, and wherein the encryption method is symmetric encryption. The present invention may include sending the encrypted data packet to the user device. The present invention may include receiving a pass-phrase request. The present invention may include sending the generated pass-phrase, wherein the user device decrypts the encrypted data packet based on the received generated pass-phrase and key. The present invention may include receiving a message to start a timer and then invalidate access to the data packet when the timer runs out.
    Type: Grant
    Filed: September 11, 2017
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jayanth V. Gazula, Noah M. Ginsburg, Aaron J. Mondelblatt, Bryce Nichols
  • Patent number: 10083294
    Abstract: Described systems and methods allow protecting a computer system from malware, such as return-oriented programming (ROP) exploits. In some embodiments, a set of references are identified within a call stack used by a thread of a target process, each reference pointing into the memory space of an executable module loaded by the target process. Each such reference is analyzed to determine whether it points to a ROP gadget, and whether the respective reference was pushed on the stack by a legitimate function call. In some embodiments, a ROP score is indicative of whether the target process is subject to a ROP attack, the score determined according to a count of references to a loaded module, according to a stack footprint of the respective module, and further according to a count of ROP gadgets identified within the respective module.
    Type: Grant
    Filed: October 10, 2016
    Date of Patent: September 25, 2018
    Assignee: Bitdefender IPR Management Ltd.
    Inventor: Raul V. Tosa
  • Patent number: 10083295
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to acquire a plurality of reputations related to an object and combine the plurality of reputations to create a total reputation for the object. The object can include a plurality of sub-objects and each of the plurality of reputations can correspond to one of the sub-objects.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: September 25, 2018
    Assignee: McAfee, LLC
    Inventors: Joel R. Spurlock, John D. Teddy
  • Patent number: 10083296
    Abstract: In an example, there is disclosed a computing apparatus having one or more logic elements providing a security agent operable for: detecting that a first process has launch a second process and placed the second process in a suspended state; detecting that the first process has modified or attempted to modify the second process; classifying the modification as potentially malicious; and taking a remedial action. There is also disclosed one or more computer-readable storage mediums having stored thereon executable instructions for providing the security agent, and a computer-executable method of providing the security agent.
    Type: Grant
    Filed: June 27, 2015
    Date of Patent: September 25, 2018
    Assignee: McAfee, LLC
    Inventors: Aditya Kapoor, Joel R. Spurlock, Jonathan L. Edwards
  • Patent number: 10083297
    Abstract: Method of secure comparative processing of the type in which a processor of an electronic component compares proof data (EPR, AUTH) that it receives as input with main secret data (CTRL, PIN) stored in said electronic component, characterized in that the processor implements, in addition to the comparison with the secret data (CTRL, PIN), complementary operations on the proof data (EPR, AUTH) which generate on the electronic component a variation of behavior which is dependent on the proof data (EPR, AUTH) which it receives as input and which is compounded with the behavioral variation related to the comparison with the main secret data (CTRL, PIN).
    Type: Grant
    Filed: July 9, 2013
    Date of Patent: September 25, 2018
    Assignee: MORPHO
    Inventor: Mael Berthier
  • Patent number: 10083298
    Abstract: A method for identifying malware is provided. The method includes performing a static analysis of a plurality of files and for each file of the plurality of files, determining in the static analysis whether the file includes an application programming interface (API). For each file, of the plurality of files, found to have an application programming interface, the method includes determining in the static analysis whether the application programming interface is proper in the file and alerting regarding an improper application programming interface when found in one of the plurality of files. A scanner for detecting malware is also provided.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: September 25, 2018
    Assignee: SYMANTEC CORPORATION
    Inventor: Bhaskar Krishnappa
  • Patent number: 10083299
    Abstract: The present disclosure describes systems and methods for detection and mitigation of malicious activity regarding user data by a network backup system. In a first aspect, a backup system receiving and deduplicating backup data from a plurality of computing devices may detect, based on changes in uniqueness or shared rates for files, atypical modifications to common files, and may take steps to mitigate any potential attack by maintaining versions of the common files prior to the modifications or locking backup snapshots. In a second aspect, the backup system may monitor file modification behaviors on a single device, relative to practices of an aggregated plurality of devices. Upon detection of potentially malicious modification activity, a previously backed up or synchronized store of data may be locked and/or duplicated, preventing any of the malicious modifications from being transferred to the backup system.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: September 25, 2018
    Assignee: Carbonite, Inc.
    Inventors: Teo Winton Crofton, Clark Marshall Baker
  • Patent number: 10083300
    Abstract: An executable file is loaded into memory. The executable file is analyzed to determine whether one or more dynamically linked libraries are referenced in an import table of the file. It can then be determined whether one or more dynamically linked libraries is adapted to contact a network.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: September 25, 2018
    Assignee: McAfee, LLC
    Inventors: Neeraj Thakar, Amit Malik
  • Patent number: 10083301
    Abstract: A method of detecting malware present on a computer system. A set of applications is predefined as benign, and profiles are provided for respective benign applications. Each profile identifies one or more procedures known to be performed by the associated benign application, each procedure being identified by a characteristic action and one or more expected actions. Behavior of the computer system is monitored to detect performance, by a running application, of a characteristic action of a procedure of a benign application. Upon detection of performance of a characteristic action, the profile provided for the associated benign application is used to detect a deviation from the expected actions of the procedure; and the detection of a deviation is used to identify the running application as malicious or suspicious.
    Type: Grant
    Filed: November 28, 2016
    Date of Patent: September 25, 2018
    Assignee: F-Secure Corporation
    Inventor: Daavid Hentunen
  • Patent number: 10083302
    Abstract: According to one embodiment, a system comprises one or more counters; comparison logic; and one or more hardware processors communicatively coupled to the one or more counters and the comparison logic. The one or more hardware processors are configured to instantiate one or more virtual machines that are adapted to analyze received content, where the one or more virtual machines are configured to monitor a delay caused by one or more events conducted during processing of the content and identify the content as including malware if the delay exceed a first time period.
    Type: Grant
    Filed: December 29, 2016
    Date of Patent: September 25, 2018
    Assignee: FireEye, Inc.
    Inventors: Sushant Paithane, Michael Vincent, Sai Vashisht, Darien Kindlund
  • Patent number: 10083303
    Abstract: An exemplary system, method and computer-accessible medium for detecting the presence of a Trojan(s) in a circuit(s), can include, for example, receiving information related to a property(s) configured to determine the presence of the Trojan(s), and determining the presence of the Trojan(s) based on the property(s) and a design(s) of the circuit(s) using a bounded model checking tool.
    Type: Grant
    Filed: December 3, 2015
    Date of Patent: September 25, 2018
    Assignee: New York University
    Inventors: Vivekananda Vedula, Jeyavijayan Rajendran, Arunshankar Dhandayuthapany, Ramesh Karri
  • Patent number: 10083304
    Abstract: Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful authentication, analyze sensor data to determine whether it is likely that the user authenticated under duress. If so, the computing device performs a security operation such as generating an alert or presenting false but plausible data to the user. Additionally or alternatively, the computing device, within a trusted execution environment, may monitor sensor data and apply a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack. For example, the classifier may identify potential user identification fraud. The computing device may trigger a security response if elevated risk of attack is detected. For example, the trusted execution environment may trigger increased authentication requirements or increased anti-theft monitoring for the computing device. Other embodiments are described and claimed.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: September 25, 2018
    Assignee: Intel Corporation
    Inventors: Jasmeet Chhabra, Ned M. Smith, Micah J. Sheller, Nathan Heldt-Sheller
  • Patent number: 10083305
    Abstract: A preferred method for providing multi-level security to a gate level information flow receives or specifies a security lattice having more than two security levels. The security lattice defines how security levels relate to each other. A hardware design implementing information flows including flows having security levels specified by the security lattice is received. Logic is created for testing the hardware design in view of the security lattice. A logic function is created based upon the hardware design and the logic for testing to implement the security lattice. Another method receives a hardware design in a hardware description language. At least a portion of the hardware design is synthesized to gate level primitives. Functional component tracking logic supporting more than two-security levels is built from the gate level primitives. Functional components in the hardware design are simulated with the functional component tracking logic.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: September 25, 2018
    Assignee: The Regents of the University of California
    Inventors: Ryan Kastner, Jason Oberg, Wei Hu, Timothy Sherwood, Mohit Tiwari
  • Patent number: 10083306
    Abstract: An Internet-of-Things (IoT) device platform to communicate in a trusted portion of an IoT network is disclosed. The trusted IoT platform can include a secure IoT system-on-chip (SoC) and can be integrated into various devices such that each of the devices may implement “roots of trust” to establish a trusted portion, or a trusted backbone, of the IoT network.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: September 25, 2018
    Assignee: INTEL CORPORATION
    Inventors: Ned M. Smith, Victoria C. Moore, Reshma Lal
  • Patent number: 10083307
    Abstract: An approach is proposed that contemplates systems, methods, and computer-readable storage mediums to support receiving, from a computerized system, a first encrypted file entity key and signed access metadata, wherein the first encrypted file entity key is created by encrypting a file entity key using a first encryption key, the signed access metadata is signed by the file entity key and the encrypted file entity is created by encrypting a file entity using the file entity key. The approach then determines whether to facilitate the decryption of the encrypted file entity by the computerized system and sends a second encrypted file entity key to the computerized system if it is determined to facilitate the decryption. The approach prevents the computerized system to decrypt the encrypted file entity if it is determined not to facilitate the decryption of the encrypted file entity by the computerized system.
    Type: Grant
    Filed: May 5, 2016
    Date of Patent: September 25, 2018
    Assignee: Barracuda Networks, Inc.
    Inventors: Asaf Cidon, Israel Cidon, Lior Gavish, Prabandham Madan Gopal, Chandrashekhar Shetty
  • Patent number: 10083308
    Abstract: Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of length s having positions i=1, 2, . . . s each having a corresponding value vi associated therewith, wherein the value vi is given by vi=h (vi+1), for a given hash function or other one-way function h. An initial distribution of helper values may be stored for the one-way chain of length s, e.g., at positions given by i=2j for 0?j?log2 s. A given one of the output values vi at a current position in the one-way chain may be computed utilizing a first helper value previously stored for another position in the one-way chain between the current position and an endpoint of the chain. After computation of the given output value, the positions of the helper values are adjusted so as to facilitate computation of subsequent output values.
    Type: Grant
    Filed: July 21, 2017
    Date of Patent: September 25, 2018
    Assignee: Crypto Research, LLC
    Inventor: Bjorn Markus Jakobsson
  • Patent number: 10083309
    Abstract: Methods and systems for secure cloud storage are provided. According to one embodiment, file storage policies are maintained for users of an enterprise network by a trusted gateway device interposed between the network and multiple third-party cloud storage services. Responsive to receiving a request to store a local file from a user: (i) searchable encrypted data is created by the gateway corresponding to one or more of (a) content of the local file and (b) metadata associated with the local file and (ii) the searchable encrypted data is distributed by the gateway among the cloud storage services based on a storage diversity requirement defined by the user's file storage policy by uploading a subset of the searchable encrypted data to each of the cloud storage services.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: September 25, 2018
    Assignee: Fortinet, Inc.
    Inventor: David A. Redberg
  • Patent number: 10083310
    Abstract: Described is a system for mobile proactive secure multiparty computation using commitments. The system generates, at each server, secret sharings for each of its input gates using a Secret-Share protocol. Thereafter, sharings of inputs are generated for random gates using a GenPoly protocol. Sharings of multiplication triples are then generated for multiplication gates using a Multiplication-Triple protocol. Affine gates are then evaluated. Multiplication gates can then be evaluated using the multiplication triples and implementing a Secret-Open protocol. A Secret-Redistribute protocol is used to re-randomize the secret sharing. The Secret-Open protocol is implemented after a sharing for an output gate has been computed to reveal the secret.
    Type: Grant
    Filed: March 12, 2014
    Date of Patent: September 25, 2018
    Assignee: HRL Laboratories, LLC
    Inventors: Joshua D. Lampkins, Karim El Defrawy
  • Patent number: 10083311
    Abstract: A method for managing a file, including receiving a request to encrypt the file, the request identifying a target location; determining a plurality of coordinates based on the target location; generating a cryptographic key based on the plurality of coordinates; generating an encrypted version of the file using the cryptographic key; and storing the encrypted version of the file.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: September 25, 2018
    Assignee: Konica Minolta Laboratory U.S.A., Inc.
    Inventor: Kurt N. Nordback
  • Patent number: 10083312
    Abstract: Systems and methods for ensuring the quality of identity and access management information at a computing system are described. Access right information that respectively corresponds to one or more access rights may be stored at a data store. The access right information may be stored in accordance with a data model that defines respective relationships between the access rights and both the users having access to the computing system and the computing resources of the computing system. At least a portion of the access right information may be retrieved, and quality assurance tasks may be performed using the portion of the access right information retrieved.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: September 25, 2018
    Assignee: Bank of America Corporation
    Inventors: Armen Moloian, Ronald W. Ritchey
  • Patent number: 10083313
    Abstract: The disclosure provides for a telecommunication method using a communication system, wherein the communication system comprises: a main database system; a local database system; a first network connection for exchanging data between the main database system and the local database system, wherein the main database system and the local database system are separated by a first firewall; a handheld telecommunications device with digital mobile telecommunication connection to the local database system.
    Type: Grant
    Filed: December 2, 2015
    Date of Patent: September 25, 2018
    Assignee: SAP SE
    Inventor: P. Meenakshi Sundaram
  • Patent number: 10083314
    Abstract: A secret parallel processing device reducing communication amount includes: a randomization unit that obtains a non-randomized input sequence and outputs a randomized sequence obtained by joining the non-randomized sequence and a dummy record sequence formed of a disclosed value and subjecting the joined sequences to random replacement processing and concealed random replacement data obtained by concealing used random replacement data; a calculation unit that obtains the non-randomized sequence, the randomized sequence, and the dummy record sequence, applies a predetermined function to the sequences, and generates an output checksum for each sequence by using calculation procedure data used in the processing of applying the function; and a correctness verification unit that obtains the output checksum for each sequence and the concealed random replacement data, assesses the output checksum for each sequence, and outputs a final test result determining whether the predetermined function has been correctly appl
    Type: Grant
    Filed: October 3, 2014
    Date of Patent: September 25, 2018
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
  • Patent number: 10083315
    Abstract: Examples of the present disclosure describe systems and methods for enhancing the privacy of a personal search index. In some aspects, a personal cleartext document may be used to generate an encrypted document digest and an encrypted document on a first device. A second device may decrypt the document digest, build a personal search index based on the decrypted document digest, and store the encrypted document in a data store. The first device may subsequently receive a cleartext search query that is used to query the personal search index on the second device for encrypted documents.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: September 25, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Ho John Lee
  • Patent number: 10083316
    Abstract: An apparatus is described that includes an execution unit to execute a first instruction and a second instruction. The execution unit includes input register space to store a first data structure to be replicated when executing the first instruction and to store a second data structure to be replicated when executing the second instruction. The first and second data structures are both packed data structures. Data values of the first packed data structure are twice as large as data values of the second packed data structure. The execution unit also includes replication logic circuitry to replicate the first data structure when executing the first instruction to create a first replication data structure, and, to replicate the second data structure when executing the second data instruction to create a second replication data structure.
    Type: Grant
    Filed: August 23, 2016
    Date of Patent: September 25, 2018
    Assignee: INTEL CORPORATION
    Inventors: Elmoustapha Ould-Ahmed-Vall, Robert Valentine, Jesus Corbal, Bret L. Toll, Mark J. Charney
  • Patent number: 10083317
    Abstract: Techniques are disclosed for enabling tenant hierarchy information to be migrated directly between different multi-tenant system (e.g., from a shared IDM system to a Nimbula system, or vice versa). A corresponding new tenant is created in a Nimbula system based on a combination of the tenant information and the service information from the shared IDM system. The Nimbula system extracts the tenant name and the service name from a request and asks the shared IDM system to verify that the user actually is a member of the tenant identified by the extracted tenant name. Upon successful authentication of the user, the Nimbula system requests the IDM system for roles that are associated with both the user and the extracted service name. The Nimbula system enable access to the service upon determining whether the requested operation can be performed relative to the specified service based on the roles.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: September 25, 2018
    Assignee: Oracle International Corporation
    Inventors: Jeffrey Pleau, Naresh Revanuru
  • Patent number: 10083318
    Abstract: Systems and methods for preprocessing data to facilitate DLP pattern matching are provided. An input string is received by a Data Leak Prevention (DLP) system. The input string is converted by the DLP system into a fixed string pattern. The conversion is performed based on multiple class definitions, including a digit class, a letter class and a symbol class. A determination is then made by the DLP system regarding whether the input string contains potential sensitive data to which a full-match is to be applied by matching the fixed string pattern against one or more stored target strings representative of sensitive data.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: September 25, 2018
    Assignee: Fortinet, Inc.
    Inventor: Juneng Zheng
  • Patent number: 10083319
    Abstract: A method is provided in accordance with an aspect of the present disclosure. The method includes receiving and processing information from a first electronic device. The information includes at least location data, privacy zone data, and privacy distance data of the first electronic device. The method further includes calculating a current distance between the first electronic device and at least one sensor of a second electronic device, comparing the current distance with a predetermined privacy distance retrieved from the privacy distance data for the first electronic device, and determining an orientation of the at least one sensor of the second electronic device when the current distance is less than or equal to the privacy distance. The orientation is determined in relation to a privacy zone of the first electronic device.
    Type: Grant
    Filed: February 24, 2014
    Date of Patent: September 25, 2018
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Edward Joseph Wilmes
  • Patent number: 10083320
    Abstract: Dynamic content redaction though the generation of redaction schemas associated with document, image, media, or other data files is described. A redaction schema can include at least one range of content in a data file to be concealed for a user, a group of users, or operating parameters of various devices, for example. When the data file is opened for display on a device, the redaction schema can be parsed to identify whether masking objects should be added to a masking layer for overlay upon or above the content displayed. The masking layer can be generated based on the redaction schema, a user of the device, or operating parameters of the device, for example. Masking objects in the masking layer can conceal one or more ranges of the content in a data file from view or based on users or operating parameters of various devices.
    Type: Grant
    Filed: October 2, 2015
    Date of Patent: September 25, 2018
    Assignee: Airwatch LLC
    Inventors: Ramani Panchapakesan, Vijaykumar Bhat, Gangadhar Nittala
  • Patent number: 10083321
    Abstract: Systems and method for alerting a user device based on a proposed anonymization of a contribution to a conversation thread via one or several location-based anonymization rules are disclosed herein. The system can include a user device that can have location-determining features that can determine a physical location of the user device; a network interface that can exchange data with a server via a communication network; and an I/O subsystem that can convert electrical signals to user-interpretable outputs in a user interface. The system can include a server that can: receive a contribution from the user device; determine an anonymization level for applying to the contribution; identify a potential identifier in the content of the contribution; anonymize the potential identifier according to the determined anonymization level; and generate and provide an alert to the user device.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: September 25, 2018
    Assignee: PEARSON EDUCATION, INC.
    Inventors: Sean A. York, Scott A. Hellman, James Wyatt, Marko Rodriguez, Steven H. Hill
  • Patent number: 10083322
    Abstract: An injection engine monitors whether a pattern of a current selection of web address requests in outbound web traffic for a user matches one or more web usage patterns that allow for identifying the user based on the current selection of web address requests. The injection engine, responsive to detecting the pattern of the current selection of web address requests by the user matches the one or more web usage patterns, injects one or more random valid web address requests into the outbound web traffic for the user, wherein the one or more random valid web address requests obscure the current selection of web address requests from using the one or more web usage patterns.
    Type: Grant
    Filed: July 30, 2015
    Date of Patent: September 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary Denner, Daniel C. Gurney, Liam Harpur, Brian A. O'Crowley
  • Patent number: 10083323
    Abstract: Provided is a strategy based feature disablement that includes determining a device/browser combination based on an indication that a user device is attempting to access a resource. The device/browser combination is compared to a database of device/browser combinations. Access to the resource is allowed based on a determination that the device/browser combination is not included in the database of device/browser combinations. Alternatively, the resource is reconfigured based on a determination that the device/browser combination is included in the database of device/browser combinations.
    Type: Grant
    Filed: May 7, 2015
    Date of Patent: September 25, 2018
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Himanshu G. Patel, Bhanu Sankaran
  • Patent number: 10083324
    Abstract: Qualified web application security based on multi-layered evaluation of web application hierarchy is described. A system receives a web application login request from a web browser associated with a user device. The system identifies a portion of qualified user information associated with the user device. The system creates an executable file based on using the portion of the qualified user information to evaluate a web application hierarchy file comprising hierarchical nodes, wherein each of the hierarchical nodes is associated with a corresponding web application function, at least one corresponding business rule, and a corresponding scope-based security configuration. The system sends the executable file to the web browser, thereby enabling the web browser to use another portion of the qualified user information to evaluate the executable file and to execute the evaluated executable file to provide qualified web application security for web application access requests from the user device.
    Type: Grant
    Filed: March 17, 2016
    Date of Patent: September 25, 2018
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Sachin G Totale, Pawel Zieminski, Julian Hjortshoj
  • Patent number: 10083325
    Abstract: Techniques are disclosed for securing backup operational data (e.g., of an aircraft) maintained by a line-replaceable unit (LRU) in a removable storage media device. The LRU generates a first encryption key. The LRU encrypts the operational data using the first encryption key. The LRU generates a second encryption key based on key data of at least a second LRU. The LRU encrypts the first encryption key using the second encryption key.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: September 25, 2018
    Assignee: THE BOEING COMPANY
    Inventors: Ian Gareth Angus, Rodolfo Acuna Santiago
  • Patent number: 10083326
    Abstract: A method of accessing a physically secured rack includes assigning a task identification by a key computer system, which specifies a task for an administrator of an administration user group for access to the rack, transmitting the task identification from the key computer system to the administrator and an access control unit for the rack, prompting an input of the task identification by the access control unit, verifying the input task identification by the access control unit, prompting input of a personal access identification of the administrators by the access control unit, verifying the input personal access identification of the administrator by the access control unit, and releasing a physical access security system for the access to the administrator to the rack if both preceding verification steps are successful.
    Type: Grant
    Filed: January 26, 2015
    Date of Patent: September 25, 2018
    Assignee: Fujitsu Technology Solutions Intellectual Property GmbH
    Inventors: Heinz-Josef Claes, Ulrich Feldmann
  • Patent number: 10083327
    Abstract: A card reader may include a magnetic sensor to detect whether magnetic data are recorded in the magnetic stripe of the card; a control section to supply electric power to the magnetic sensor and into which an output signal of the magnetic sensor is inputted; and a card insertion port into which the card is inserted and in which the magnetic sensor is disposed. The magnetic sensor may output an output signal when the electric power is supplied from the control section. The control section may supply the electric power to the magnetic sensor during a first supply time period which is shorter than a card passage time period.
    Type: Grant
    Filed: August 21, 2015
    Date of Patent: September 25, 2018
    Assignee: NIDEC SANKYO CORPORATION
    Inventors: Katsuhisa Higashi, Yukihiko Takita, Kazutoshi Ishikawa, Hiroshi Kawate, Tadashi Taguchi
  • Patent number: 10083328
    Abstract: An apparatus, system and method to track location, the apparatus including: a substantially planar disposable housing comprising an electronics compartment; a secondary technology sensor disposed along a periphery of the disposable housing; an electronics module disposed within the electronics compartment, the electronics module comprising: a processor coupled to a memory; an RF transceiver coupled to an RF antenna and to the processor; a secondary technology transceiver coupled to the processor; and a battery coupled to the apparatus, wherein the battery is not field-replaceable. The apparatus may further include a marking to indicate a predetermined period of time that the apparatus is operable. Embodiments further include an unattended smart container to autonomously collect a plurality of the apparatus and to report status to a central monitor system.
    Type: Grant
    Filed: April 4, 2018
    Date of Patent: September 25, 2018
    Assignee: CENTRAK, INC.
    Inventors: Israel Amir, Ari Naim
  • Patent number: 10083329
    Abstract: A multi-protocol RFID interrogating system employs a synchronization technique (step-lock) for a backscatter RFID system that allows simultaneous operation of closely spaced interrogators. The multi-protocol RFID interrogating system can communicate with backscatter transponders having different output protocols and with active transponders including: Title 21 compliant RFID backscatter transponders; IT2000 RFID backscatter transponders that provide an extended mode capability beyond Title 21; EGO™ RFID backscatter transponders, SEGO™ RFID backscatter transponders; ATA, ISO, ANSI AAR compliant RFID backscatter transponders; and IAG compliant active technology transponders. The system implements a step-lock operation, whereby adjacent interrogators are synchronized to ensure that all downlinks operate within the same time frame and all uplinks operate within the same time frame, to eliminate downlink on uplink interference.
    Type: Grant
    Filed: October 6, 2017
    Date of Patent: September 25, 2018
    Assignee: Amtech Systems, LLC
    Inventors: Kelly Gravelle, Steven J. Catanach, Robert W. Tiernay, Joseph H. Kao, Michael Melville
  • Patent number: 10083330
    Abstract: A method and RFID writer-reader for selecting a RFID data carrier from a plurality of RFID data carriers detected by an RFID writer-reader, wherein the RFID data carrier of the RFID data carriers detected in productive operation is selected based on the respective degree of correspondence between sequences of actual values determined in productive operation that are compared with at least one sequence of setpoint values so as to reliably select a desired RFID data carrier even in difficult reception situations.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: September 25, 2018
    Assignee: Siemens Aktiengesellschaft
    Inventors: Dieter Horst, Markus Weinländer
  • Patent number: 10083331
    Abstract: Systems and methods are provided for positioning an object with respect to a target location, such as for auto-focusing. One implementation includes a positioning device, which includes a reference object having a plurality of dark-shaded bars arranged in parallel with and separated from each other by spaces equal to a width of each of the bars. The positioning device also includes a motor configured to move in a reciprocating manner and a sensor configured to sense at least one of the bars or spaces. The motor is connected to the reference object or the sensor and moves the reference object or sensor with respect to the other. The motor is configured to stop at a target location in two phases of motion.
    Type: Grant
    Filed: May 9, 2017
    Date of Patent: September 25, 2018
    Assignee: Hand Held Products, Inc.
    Inventors: H. Sprague Ackley, Jean-Pierre Stang, Khalid El Akel
  • Patent number: 10083332
    Abstract: In embodiments, apparatuses, methods, and storage media may be described for identifying a quick response (QR) image. A QR control code (QRCC) may be identified in the QR image based on a QR tag in the image. Based on the QRCC, a control command of an apparatus may be identified. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: August 8, 2014
    Date of Patent: September 25, 2018
    Assignee: Intel Corporation
    Inventors: Oleg Pogorelik, Alex Nayshtut, Hong Li, Justin Lipman
  • Patent number: 10083333
    Abstract: An indicia reading terminal has a three-dimensional depth sensor, a two dimensional image sensor, an autofocus lens assembly, and a processor. The three dimensional depth sensor captures a depth image of a field of view and create a depth map from the depth image, the depth map having one or more surface distances. The two dimensional image sensor receives incident light and capture an image therefrom. The autofocusing lens assembly is positioned proximate to the two dimensional image sensor such that the incident light passes through the autofocusing lens before reaching the two dimensional image sensor. The processor is communicatively coupled to the two dimensional image sensor, the three dimensional depth sensor, and the autofocusing lens assembly.
    Type: Grant
    Filed: October 2, 2017
    Date of Patent: September 25, 2018
    Assignee: Hand Held Products, Inc.
    Inventors: Erik Todeschini, Brian L. Jovanovski, Edward C. Bremer
  • Patent number: 10083334
    Abstract: Systems, methods, and computer-readable storage media are provided reconstructing barcode signals utilizing sequence alignment matrices. A barcode signal is received that is associated with a portion of a barcode symbol and includes a sequence of bar elements and space elements in alternating order. A sequence alignment matrix (SAM) is built such that each row represents an element of an already reconstructed portion of the barcode symbol, each column represents an element of the received barcode signal sequence, and the potential alignments are placed on a plurality of diagonals thereof. A score is assigned to each matrix square that includes an element of the received barcode signal sequence and a diagonal score is calculated for each of the plurality of diagonals by summing the scores for each matrix square respectively comprising each of the plurality of diagonals.
    Type: Grant
    Filed: December 6, 2016
    Date of Patent: September 25, 2018
    Assignee: DATALOGIC IP TECH S.R.L.
    Inventors: Francesco D'Ercoli, Marco Cumoli