Patents Issued in July 14, 2020
  • Patent number: 10713350
    Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: July 14, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad
  • Patent number: 10713351
    Abstract: An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.
    Type: Grant
    Filed: September 17, 2018
    Date of Patent: July 14, 2020
    Assignee: Apple Inc.
    Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
  • Patent number: 10713352
    Abstract: A method and an apparatus for trusted measurement, where the method includes: obtaining a first processing result by performing a first-manner processing on a code segment, and using a result obtained by performing a second-manner processing on the first processing result as a reference value; obtaining, at a first moment when the system is running, a second processing result by performing the first-manner processing on the code segment, and obtaining a first measurement value by performing the second-manner processing on the second processing result; and determining whether the first measurement value and the reference value are equal, and when the first measurement value and the reference value are equal, the system is trusted, where the code segment in the memory is a code segment that does not change with normal running of the system during one start-up and a running process of the system.
    Type: Grant
    Filed: March 16, 2017
    Date of Patent: July 14, 2020
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Chong Zhou, Tianfu Fu
  • Patent number: 10713353
    Abstract: The present disclosure addresses the meltdown vulnerability resulting from speculative execution in a multi-core processing system. The operating system (OS) can be loaded for execution on one of several processing cores (OS core), while an application can be loaded for execution on another of the processing cores (application core). The OS core uses process page tables that map the entire kernel address space to physical memory. Conversely, the application core uses pages tables that map only a portion of the kernel address space to physical memory.
    Type: Grant
    Filed: June 22, 2018
    Date of Patent: July 14, 2020
    Assignee: VMware, Inc.
    Inventors: Michael Wei, Dan Tsafrir, Nadav Amit
  • Patent number: 10713354
    Abstract: An apparatus includes a display, a processor coupled to the display and a memory coupled to the processor, wherein the memory includes instructions executable by the processor to identify an access attempt to a monitored resource by an application, the identification occurring after an access permission check is performed. The memory further includes instructions executable by the processor to determine whether the access attempt involves suspicious activity by evaluating a potential risk associated with the application accessing the monitored resource, and in response to determining that the access attempt involves suspicious activity to provide a graphical user interface (GUI) to the display, the GUI providing a notification of the access attempt.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: July 14, 2020
    Inventors: Xun Chen, Seonghun Moon, HyungDeuk Kim, Jisu Kim
  • Patent number: 10713355
    Abstract: Certain embodiments may generally relate to controlling access to data held in the cloud. A method for controlling access to data held in the cloud may include determining, at a cloud server, the validity of user credentials received from a user device. The method may also include receiving context data related to the user device based on the validity of the user credentials. The method may further include synchronizing the context data with the cloud server. In addition, the method may include enforcing context-sensitive security checks on requests made by the user for resources based on the sensor data collected by the user device.
    Type: Grant
    Filed: October 17, 2017
    Date of Patent: July 14, 2020
    Assignee: QATAR UNIVERSITY
    Inventors: Bashar Nuseibeh, Arosha Bandara, Khaled M. Khan, Niamul Haque Khan, Armstrong Nhlabatsi, Thein Than Tun, Yijun Yu
  • Patent number: 10713356
    Abstract: Deception-based techniques for responding to security attacks are described herein. The techniques include transitioning a security attack to a monitored computing device posing as a computing device impacted by the security attack and enabling the adversary to obtain deceptive information from the monitored computing device. Also, the adversary may obtain a document configured to report identifying information of an entity opening the document, thereby identifying the adversary associated with the attack. Further, the techniques include determining that a domain specified in a domain name request is associated with malicious activity and responding to the request with a network address of a monitored computing device to cause the requesting process to communicate with the monitored computing device in place of an adversary server. Additionally, a service may monitor dormant domains names associated with malicious activity and, in response to a change, respond with an alert or a configuration update.
    Type: Grant
    Filed: March 4, 2013
    Date of Patent: July 14, 2020
    Assignee: CrowdStrike, Inc.
    Inventors: Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
  • Patent number: 10713357
    Abstract: The subject matter described herein provides protection against zero-day attacks by detecting, via a hypervisor maintaining an extended page table, an attempt to execute arbitrary code associated with malware in a guest operation system (OS) running within a virtual machine (VM). Further, the subject matter provides detection of lateral movement of the malware. The hypervisor uses hidden breakpoints to detect a request for thread creation, and then determines whether the request is to download and execute arbitrary code.
    Type: Grant
    Filed: February 16, 2018
    Date of Patent: July 14, 2020
    Assignee: NICIRA, INC.
    Inventor: Prasad Dabak
  • Patent number: 10713358
    Abstract: A system and method operable to identify malicious software by extracting one or more features disassembled from software suspected to be malicious software and employing one or more of those features in a machine-learning algorithm to classify such software.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: July 14, 2020
    Assignee: FireEye, Inc.
    Inventors: Michael Sikorski, William Ballenthin
  • Patent number: 10713359
    Abstract: Disclosed are systems and methods for detection of malicious intermediate language files. In one exemplary aspect, the system comprises a database comprising hashes of known malicious files, a resource allocation module configured to select a set of resources from a file being analyzed, a hash calculation module, coupled to the resource allocation module, configured to calculate a perceptive hash of the set of resources; and an analysis module, coupled to the other modules, configured to identify a degree of similarly between the set of resources and a set of resources from known malicious files by comparing the perceptive hash with perceptive hashes of the set of resources from known malicious files, determine a harmfulness of the file being analyzed based on the degree of similarity and remove or quarantine the file being analyzed when the harmfulness exceeds a predetermined threshold.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: July 14, 2020
    Assignee: AO Kaspersky Lab
    Inventors: Vladimir V. Krylov, Alexander V. Liskin, Alexey E. Antonov
  • Patent number: 10713360
    Abstract: A system for collection and analysis of forensic and event data comprising a server and an endpoint agent operating on a remote system. The server is configured to receive event data including process creation data, persistent process data, thread injection data, network connection data, memory pattern data, or any combination thereof, and analyze the event data to detect compromises of a remote system. The endpoint agent is configured to acquire event data, and communicate the event data to the server.
    Type: Grant
    Filed: February 17, 2017
    Date of Patent: July 14, 2020
    Assignee: SecureWorks Corp.
    Inventors: Ross R. Kinder, Aaron Hackworth, Matthew K. Geiger, Kevin R. Moore, Timothy M. Vidas
  • Patent number: 10713361
    Abstract: Disclosed are systems and methods for protecting a computer system from ransomware and malware by copying and backing up files using a volume filter. A storage stack of the computer system includes a file protector driver and a volume filter driver. The file protector driver monitors for potentially dangerous actions to the system's files. The volume filter driver tracks any requested changes to files on a block level, and makes backup copies of the modified blocks when the blocks change on a block level of the storage device.
    Type: Grant
    Filed: June 12, 2017
    Date of Patent: July 14, 2020
    Assignee: Acronis International GmbH
    Inventors: Vladimir Strogov, Vyacheslav Levchenko, Anatoly Stupak, Stanislav Protasov, Mark Shmulevich, Serguei Beloussov
  • Patent number: 10713362
    Abstract: A method of detecting malware in a specimen of computer content or network traffic is described. The method features conducting a first analysis on the specimen in accordance with a first plurality of analyses and an order of the first plurality of analyses. A second analysis is conducted on the specimen different than the first analysis type. Thereafter, further analyses on the specimen may be altered by modifying information associated with the first plurality of analyses or the order of the first plurality of analyses in response to feedback information based on results from at least the first analysis. The modified information changes a malware analysis of the specimen from being conducted in accordance with the first plurality of analyses to being conducted in accordance with a second plurality of analyses different in analysis type or in order of analyses than the first plurality of analyses.
    Type: Grant
    Filed: March 5, 2018
    Date of Patent: July 14, 2020
    Assignee: FireEye, Inc.
    Inventors: Michael Vincent, Ali Mesdaq, Emmanuel Thioux, Abhishek Singh, Sai Vashisht
  • Patent number: 10713363
    Abstract: In one or more embodiments, one or more systems, methods, and/or processes may receive a digital signature, signed by a signing authority, for a request for utilization of an information handling system firmware application programming interface (API) of the information handling system firmware, signed based at least on information associated with a certificate signed by a certificate authority; may determine that the signing authority is authorized for the request for utilization of the information handling system firmware API; may determine that the signing authority is authorized for the request for utilization of the information handling system firmware API on a platform model of the information handling system; may determine that the certificate is not on a certificate revocation list; and may permit utilization of the information handling system firmware API.
    Type: Grant
    Filed: April 27, 2018
    Date of Patent: July 14, 2020
    Assignee: Dell Products L.P.
    Inventors: Marshal F. Savage, Jason Matthew Young
  • Patent number: 10713364
    Abstract: A method, computerized apparatus and computer program product, the method comprising: obtaining computer code; determining from the computer code a collection of components reachable from the computer code; providing information about the components to a server; identifying by the server using information retrieved from a database, reachable components associated with the collection of components, which have stored vulnerabilities; determining from the computer code and the reachable components that have stored vulnerabilities, a collection of reachable finer resolution components; identifying, further components from the collection of reachable finer resolution components, which have stored vulnerabilities; and outputting information about the further components, wherein the computer code cannot be reconstructed from the information about the collection of components and the information about the finer resolution components.
    Type: Grant
    Filed: May 8, 2018
    Date of Patent: July 14, 2020
    Assignee: WHITESOURCE LTD.
    Inventors: Aharon Abadi, Doron Cohen, David Habusha, Ron Rymon, Rami Sass
  • Patent number: 10713365
    Abstract: Provided are systems, methods, and computer-readable medium for a simulation platform that can generate simulated activity data for testing a security monitoring and control system. In various examples, the simulation platform can parse the activity data from a cloud service to determine the fields associated with each action in the activity data. The simulation platform can then generate a template, where each entry in the template describes an action and the fields associated with the action. The simulation platform can further generate a configuration that describes a test scenario. The simulation platform can use the configuration and the template to generate the particular action, including randomizing some or all of the fields of the action. When input into the security monitoring and control system, the system can operate on the simulated activity data in the same way as when the system ingests live activity data.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: July 14, 2020
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Kamalendu Biswas, Gaurav Bhatia, Shachi Prasad, Kiran Shriniwas Doddi
  • Patent number: 10713366
    Abstract: Threat modeling systems include one or more computing devices communicatively coupled with one or more databases, the database(s) including threat model components and threats associated with one another. One or more mapping files coupled with the database(s) correlate the threat model components with visual diagram components of a third party software application. An import interface initiates reading of a third party generated data file by the computing device(s), the data file including a subset of the third party diagram components and relationships between the subset. An interface receiving input initiates a determination of threat model components correlated with the subset. A diagram interface displays a relational diagram using visual representations of threat model components correlated with the subset, the relational diagram defining a threat model.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: July 14, 2020
    Assignee: ThreatModeler Software Inc.
    Inventor: Anurag Agarwal
  • Patent number: 10713367
    Abstract: An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may include various features, including but not limited to: (1) secure transfer of e-mail messages, without the need for users to replace existing e-mail clients or to change e-mail addresses; (2) tracking of all actions performed in connection with an e-mail transmission; (3) the ability for a recipient to view information about an e-mail message, optionally including information about how other addressees have responded to it, before deciding whether to retrieve the e-mail message; (4) the aggregation of entire e-mail conversations into a single threaded view; (5) the ability to include both private and public messages in a single e-mail communication; (6) sender control over downstream actions performed in connection with an e-mail message; (7) flexible control over cryptographic methods used to encrypt emails messages for storage.
    Type: Grant
    Filed: May 16, 2016
    Date of Patent: July 14, 2020
    Assignee: AppRiver Canada ULC
    Inventors: Thierry LeVasseur, Esteban Astudillo, Matt McLean
  • Patent number: 10713368
    Abstract: A user interface for applying restriction parameters to content items and users in a grouped manner is provided. A selection of one or more restriction groups can be received through a graphical user interface on a display device associated with a content management system. One or more restriction marks associated with the one or more restriction groups can be displayed on the graphical user interface. A selection of the displayed one or more restriction marks can be received through the graphical user interface for being assigned to a content item stored in the content management system. The content item can have associated metadata stored in the content management system. Metadata associated with the content item can be updated. The updated metadata can indicate that the selection of the one or more restriction marks is assigned to the content item.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: July 14, 2020
    Assignee: Alfresco Software, Inc.
    Inventors: Roy Wetherall, Shane Maciak, John Iball
  • Patent number: 10713369
    Abstract: The disclosure discloses a method and device for access control. The method includes: when a group of tasks are executed, controlling an access of a subject to an object according to operation permission corresponding to each of the tasks in the group of tasks. The device comprises a control component arranged to, when a group of tasks are executed, control an access of a subject to an object according to operation permission corresponding to each of the tasks in the group of tasks.
    Type: Grant
    Filed: April 17, 2015
    Date of Patent: July 14, 2020
    Assignee: ZTE CORPORATION
    Inventors: Yao Tong, Yihui Peng
  • Patent number: 10713370
    Abstract: A system and method is described for implementing or managing IRM controls over digital content through a browser. The computer implementing or managing IRM controls over digital content through a browser includes at least one user device and a server. The user device includes a browser, the server comprises a database to store a plurality of IRM rights data and corresponding user permission, an identifier module to identify the user, an editor module to allow the user to view, edit, copy, paste and print the digital content based on the user permission defined for any respective protected document within the user device or downloaded through the Internet.
    Type: Grant
    Filed: August 17, 2017
    Date of Patent: July 14, 2020
    Assignee: Seclore Technology Private Limited
    Inventors: Yogesh Ugale, Hiranya Patel
  • Patent number: 10713371
    Abstract: A content management system for collecting files from one or more submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder. A submitter submits one or more files along with one or more comments associated with the one or more of submitted files. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: July 14, 2020
    Assignee: DROPBOX, INC.
    Inventors: Mindy Zhang, Pranav Piyush
  • Patent number: 10713372
    Abstract: A method of adding sensing of moisture and other characteristics into a garment such as a diaper, incontinence garment, brief, or underwear is disclosed. The primary design intent is optimal moisture detection, low per unit cost, and wide-scale data analysis of groups of patients. The embodiments place various forms of electrodes within a garment, and measuring the electrical properties of the electrodes to determine if the garment has contacted moisture. The embodiments herein could be used for sensing incontinence, sensing perspiration, and detecting failure of protective garments, among other purposes. The target moisture is urine and feces; however, other sources of body moisture can also be sensed. A specialized mesh network achieves accuracy of the information obtained, as well as redundancy and timely updating of that information.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: July 14, 2020
    Assignee: BioLink Systems, LLC
    Inventors: Ken Heyl, Roger King
  • Patent number: 10713373
    Abstract: A computing system includes: a control unit configured to: receive user information through a vault user account; process the user information for storage in an information vault; implement a security protocol for the vault user account including to determine a security breach to the vault user account based on receiving an electronic communication from a user electronic contact address addressed to a breach detection contact address; a storage unit, coupled to the control unit, configured to store the user information.
    Type: Grant
    Filed: February 9, 2017
    Date of Patent: July 14, 2020
    Assignee: LifeSite, Inc.
    Inventors: Christopher Lloyd Wong, Barney G. Lee, Joseph Michael Kolba, Scott Anthony Sylvester
  • Patent number: 10713374
    Abstract: A method for execution by a storage unit of a dispersed storage network includes receiving an access request from a requestor. An access anomaly of the access request is detected, and the access request is queued for processing in response. An anomaly detection indicator is issued to a plurality of other storage units. A secondary authentication process is initiated with the requestor, and a secondary authentication response from the requestor. The access request is processed when the secondary authentication response is favorable.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: July 14, 2020
    Assignee: PURE STORAGE, INC.
    Inventors: Teague S. Algie, Jason K. Resch
  • Patent number: 10713375
    Abstract: Methods, systems, and computer program products for accessing a database element are described. A table link of a persistency interface is defined, the table link being a representation of a table of a persistency schema. A role for the persistency interface is defined, the role defining a type of access for a specified portion of the database element.
    Type: Grant
    Filed: October 9, 2015
    Date of Patent: July 14, 2020
    Assignee: SAP SE
    Inventors: Peter Eberlein, Volker Driesen, Arne Harren
  • Patent number: 10713376
    Abstract: The technology disclosed relates to assigning field level security to fields extracted from primary sources on a batch basis and compiled into analytical, read-only databases, for ultra-fast, ad-hoc data exploration and faceted navigation on integrated, heterogeneous data sets. The method includes assigning field level security to the extracted fields by combining user selectable inheritance of field level security from source fields that yield the extracted fields, with pinning of inheritance of field level security for the extracted fields to reference fields in the database sources wherein the reference fields are distinct from the extracted fields.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: July 14, 2020
    Assignee: salesforce.com, inc.
    Inventors: Jan Michael Timmerman, Donovan Schneider, Alex Gitelman
  • Patent number: 10713377
    Abstract: This disclosure relates to sharing confidential data between a first data provider and a second data provider. A processor determines a correspondence between one of multiple first data records from the first data provider and one of multiple second data records from the second data provider. The multiple first data records are stored on a first data store accessible by the first data provider and protected by encryption from the second data provider. The multiple second data records are stored on a second data store accessible by the second data provider and protected by encryption from the first data provider. The processor creates a first reference to the one of the multiple first data records and a second reference to the one of the multiple second data records. The first reference is accessible by the second data provider and the second reference is accessible by the first data provider.
    Type: Grant
    Filed: November 18, 2016
    Date of Patent: July 14, 2020
    Assignee: IXUP IP PTY LTD
    Inventors: Dean Joscelyne, Rhona Marks
  • Patent number: 10713378
    Abstract: A method and apparatus for inheritance-based propagation is provided. The method comprises receiving a request from a client computer to update an access permission associated with a specific namespace in a nested namespace structure for a user, the specific namespace being associated with a group of users, wherein the nested namespace structure includes one or more child namespaces of the specific namespace; causing updating of the access permission associated with the specific namespace for the user; identifying the specific namespace as the current namespace; and performing an iterative process having the following steps until a termination criterion is satisfied.
    Type: Grant
    Filed: December 19, 2017
    Date of Patent: July 14, 2020
    Assignee: DROPBOX, INC.
    Inventors: Tsahi Glik, Shuoqing Ding, Ben Newhouse, Aaron Staley
  • Patent number: 10713379
    Abstract: A distributed storage system for the long-term storage of data objects that is implemented utilizing one or more distinct storage sites that may be comprised of system controllers and object storage systems that act in concert to embody a single distributed storage system. A system may include a one or more types and/or instances of object storage systems. A system may include witness functionality in which a trusted user and/or client acts to maintain consistent storage policies on behalf of one or more users and/or clients. A system may further include system controllers associated with logical and/or physical sites that coordinate object, user, device, and system management functionally.
    Type: Grant
    Filed: September 3, 2018
    Date of Patent: July 14, 2020
    Inventor: David Lane Smith
  • Patent number: 10713380
    Abstract: Systems, methods, and devices for generating a secure join of database data are disclosed. A method includes determining data stored in a first account to be compared with data stored in a second account. The method includes determining a function for generating a secure join key, wherein the secure join key includes a hashed string that hashes one or more of a data entry of the first account and a data entry of the second account. The method includes providing the secure join key to the first account and/or the second account.
    Type: Grant
    Filed: December 9, 2019
    Date of Patent: July 14, 2020
    Assignee: Snowflake Inc.
    Inventors: Justin Langseth, Matthew J. Glickman, Christian Kleinerman, Robert Muglia, Daniel Freundel, Thierry Cruanes, Allison Waingold Lee
  • Patent number: 10713381
    Abstract: Provided are a method for securely calling fingerprint information, an apparatus for securely calling fingerprint information, and a mobile terminal. The method includes: receiving a request for calling the fingerprint information (S101); according to a unique identification in an application process sending the request for calling the fingerprint information, determining whether the application corresponding to the application process is a legitimate application (S102); when it is determined that the application corresponding to the application process is a legitimate application, allowing the application corresponding to the application process to call the fingerprint information (S103).
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: July 14, 2020
    Assignee: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventors: Qiang Zhang, Lizhong Wang, Haitao Zhou, Kui Jiang, Wei He
  • Patent number: 10713382
    Abstract: In an example, an anonymized set of confidential data data values of a first confidential data type is obtained. Then an anonymized set of confidential data data values of a second confidential data type is also obtained. A multiplier following a log-normal distribution is determined for the anonymized set of confidential data data values of the first confidential data type. Then smoothing is performed independently for the anonymized set of confidential data data values of the first confidential data type and the multiplier. Percentiles for the anonymized set of confidential data data values of the second confidential data type are then determined using the smoothed anonymized set of confidential data data values of the first confidential data type and the smoothed multiplier.
    Type: Grant
    Filed: January 9, 2017
    Date of Patent: July 14, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Krishnaram Kenthapadi, Stuart MacDonald Ambler, Liang Zhang
  • Patent number: 10713383
    Abstract: Various methods and systems for processing at least some of genome sequences and at least some of associated information, for an individual, may be described and disclosed herein. A purpose of such processing may be to prevent, minimize, and/or mitigate against (1) identification of the individual from such genome sequence information and/or from associated information; and/or (2) using such genome sequence information and/or associated information as a basis for discriminating against the individual.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: July 14, 2020
    Inventor: Ethan Huang
  • Patent number: 10713384
    Abstract: A relational database is transformed so as to obfuscate secure and/or private aspects of data contained in the database, while preserving salient elements of the data to facilitate data analysis. A restructured database is generatively modeled, and the model is sampled to create synthetic data that maintains sufficiently similar (or the same) mathematical properties and relations as the original data stored in the database. In one example, various statistics at the intersection of related database tables are determined by modeling data using an iterative multivariate approach. Synthetic data may be sampled from any part of the modeled database, wherein the synthesized data is “realistic” in that it statistically mimics the original data in the database. The generation of such synthetic data allows publication of bulk data freely and on-demand (e.g., for data analysis purposes), without the risk of security/privacy breaches.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: July 14, 2020
    Assignees: Massachusetts Institute of Technology, ACCENTURE GLOBAL SOLUTIONS LIMITED
    Inventors: Kalyan Kumar Veeramachaneni, Neha Patki, Kishore Prabhakar Durg, Jeffrey Steven Wilkinson, Sunder Ranganathan Nochilur
  • Patent number: 10713385
    Abstract: Position data may gradually pseudonymized by a method, comprising: generating a sequence of relative positions from a sequence of absolute positions of a moving object; randomizing the sequence of relative positions using at least a sequence of random numbers generated from at least one seed; in response to receiving an analytical job comprising the at least one seed, restoring the sequence of relative positions from the randomized sequence of relative positions; and in response to receiving an analytical job comprising both the at least one seed and at least one absolute position derived from the sequence of absolute positions, restoring the sequence of absolute positions from the randomized sequence of relative positions.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: July 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Yasutaka Nishimura, Mari Abe Fukuda, Shoichiro Watanabe
  • Patent number: 10713386
    Abstract: A method and system which shows a user contacts that are nearby but protects those contacts' privacy by mixing indistinguishably into the list contacts that are not nearby thus creating an obfuscated list such that user is unable to identify which contacts are nearby and which are not nearby. The user selects contacts the user would want to see if they were nearby. If the user selects a contact who is actually nearby, the system then protects the user's privacy by presenting another obfuscated list to the selected contact. The system discloses proximity only after two users have each mutually selected each other. The system may more broadly be used by showing the user contacts that have any form of matching personal data while still protecting all users' privacy with obfuscated lists until two users have each mutually selected each other.
    Type: Grant
    Filed: August 5, 2019
    Date of Patent: July 14, 2020
    Assignee: Arrive Group, Inc.
    Inventor: Christian Bailey
  • Patent number: 10713387
    Abstract: In particular embodiments, a consent conversion optimization system is configured to test two or more test consent interfaces against one another to determine which of the two or more consent interfaces results in a higher conversion percentage (e.g., to determine which of the two or more interfaces lead to a higher number of end users and/or data subjects providing a requested level of consent for the creation, storage and use or cookies by a particular website). The system may, for example, analyze end user interaction with each particular test consent interface to determine which of the two or more user interfaces: (1) result in a higher incidence of a desired level of provided consent; (2) are easier to use by the end users and/or data subjects (e.g., take less time to complete, require a fewer number of clicks, etc.); (3) etc.
    Type: Grant
    Filed: September 4, 2019
    Date of Patent: July 14, 2020
    Assignee: OneTrust, LLC
    Inventors: Jonathan Blake Brannon, Casey Hill, Kevin Jones, Richard A. Beaumont
  • Patent number: 10713388
    Abstract: Various embodiments of the present technology generally relate to file sharing, encryption, and protection of digital assets. More specifically, some embodiments of the present technology relate to computer files comprising an unencrypted file combined with an encrypted file, and methods for creation of such combined files. The unencrypted file can be read by target applications and can present a variety of information (e.g., contact information, registration information, etc.). The encrypted data may be accessed only when the proper management software, drivers, application programming interfaces, and other components of a runtime environment have been installed on a computing device.
    Type: Grant
    Filed: May 15, 2018
    Date of Patent: July 14, 2020
    Assignee: Polyport, Inc.
    Inventors: Partha Ray, Michael James Shull
  • Patent number: 10713389
    Abstract: An aspect provides a method, including: accepting, at an input component of an information handling device, input of a user; identifying, using a processor, the input of the user as controlling input; determining, using a processor, one or more control factors associated with the controlling input; classifying, using a processor, the controlling input as a permissible control action for an application running on the information handling device based on the one or more control factors; and committing, using a processor, the permissible control action responsive to the classifying. Other aspects are described and claimed.
    Type: Grant
    Filed: February 7, 2014
    Date of Patent: July 14, 2020
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: John Weldon Nicholson, Aaron Michael Stewart, Corinna Paine Proctor
  • Patent number: 10713390
    Abstract: A computer-implemented technique is described herein for removing sensitive content from documents in a manner that preserves the usefulness of the documents for subsequent analysis. For instance, the technique obscures sensitive content in the documents, while retaining meaningful information in the documents for subsequent processing by a machine-learning engine or other machine-implemented analysis mechanisms. According to one illustrative aspect, the technique removes sensitive content from documents using a modification strategy that is chosen based on one or more selection factors. One selection factor pertains to the nature of the processing that is to be performed on the documents after they have been anonymized.
    Type: Grant
    Filed: July 17, 2017
    Date of Patent: July 14, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Curtis Dean Anderson, Robert Leslie Rounthwaite, Michael Dean Stokes, Mari Jean Broman Olsen, Michelle Elena Keslin, Erik Thomas Oveson, Tomasz Lukasz Religa
  • Patent number: 10713391
    Abstract: The disclosure includes a system and method for associating protection data to a video object and verifying the content and source of the video object based on the protection data. A video processing application receives, at a producer, a video object; computes, at the producer, a digital signature based on content of the first video object; adds, at the producer, identification information of the producer to the digital signature of the first video object, the producer being a source of the first video object; transmits the first video object along with the digital signature from the producer to a first consumer; and authenticates, at the first consumer, the content and source of the first video object based on the digital signature.
    Type: Grant
    Filed: March 8, 2018
    Date of Patent: July 14, 2020
    Assignee: Ricoh Co., Ltd.
    Inventors: Hector H. Gonzalez-Banos, Ramya Narasimha
  • Patent number: 10713392
    Abstract: A network interface device comprises an integrated circuit device comprises at least one processor. A network interface device comprises a memory. The integrated device is configured to execute a function with respect to at least a part of stored data in said memory.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: July 14, 2020
    Assignee: XILINX, INC.
    Inventors: Steven L. Pope, David J. Riddoch, Paul Fox
  • Patent number: 10713393
    Abstract: An information processing apparatus that transmits image information being displayed on a display unit to a client to causes the client to display the image information, when combining an image of a cursor with the image information being displayed on the display unit and storing a result of the combining, in a case that it is determined that the image information is information of a screen for inputting information having confidentiality, restricts viewing of the image of the cursor in the image information and transmits the image information in which the viewing of the image of the cursor is restricted to the client.
    Type: Grant
    Filed: December 5, 2017
    Date of Patent: July 14, 2020
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yohei Shogaki
  • Patent number: 10713394
    Abstract: Systems, methods, and software for filtering components, such as hardware components, compatible with computer-modeled structures are presented. A compatible components system provides selection methods that present components compatible with computer-aided design (CAD) models designed in computer modeling software. The system executes methods designed to filter components made available to designers using attribute information of the features and attribute information of the components. Designers may interact with the compatibility methods numerous times, narrowing components through a series or number of filtering steps until a desired compatible component is easily selected. The computer modeling software may include graphical user interfaces for selecting component source locations, filtering types of components presented by the system, and adding components to CAD models.
    Type: Grant
    Filed: June 12, 2014
    Date of Patent: July 14, 2020
    Inventors: James L. Jacobs, II, John E. Cronin, Justin R. Kunz, Steven M. Lynch
  • Patent number: 10713395
    Abstract: A method of designing a furniture product includes displaying a first and a second part members on a screen such that a first face of the first part member and a second face of the second part member are in parallel; setting XY coordinate in which a corner of a rectangle of each face of the first and second part members is set as an origin, and two sides extending orthogonally from the corner are set as X axis and Y axis to designate a first position on the first face by the XY coordinate; perpendicularly projecting the first face of the first part member onto the second face of the second part member to calculate a position on the second face that corresponds to the first position and designating the calculated position on the second face as a second position by the XY coordinate on the second face.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: July 14, 2020
    Assignee: DOMANS, INC.
    Inventors: Kenichi Ninomiya, Hiroyuki Masuda
  • Patent number: 10713396
    Abstract: Methods for aligning a digital 3D model of teeth represented by a 3D mesh to a desired orientation within a 3D coordinate system. The method includes receiving the 3D mesh in random alignment and changing an orientation of the 3D mesh to align the digital 3D model of teeth with a desired axis in the 3D coordinate system. The methods can also detect a gum line in the digital 3D model to remove the gingiva from the model.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: July 14, 2020
    Assignee: 3M INNOVATIVE PROPERTIES COMPANY
    Inventors: Guruprasad Somasundaram, Evan J. Ribnick, Ravishankar Sivalingam, Shannon D. Scott, Golshan Golnari, Aya Eid
  • Patent number: 10713397
    Abstract: Provided is a method of modeling a target object, the method including obtaining information about the target object including an arrangement of particles including target particles, generating coarse particles by down-sampling the target particles, modeling a movement of the target object based on the coarse particles, and redefining the target particles based on a result of the modeling.
    Type: Grant
    Filed: October 21, 2015
    Date of Patent: July 14, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Hwiryong Jung, Nahyup Kang, Hyong Euk Lee, Jiyeon Kim
  • Patent number: 10713398
    Abstract: A global objective function is initialized to an initial value. A particular model simulation process is executed using prepared input data. A mismatch value is computed by using a local function to compare an output of the particular model simulation process to corresponding input data for the particular model simulation process. Model objects associated with the particular model simulation process are sent to another model simulation process. An optimization process is executed to predict new values for input data to reduce the computed mismatch value.
    Type: Grant
    Filed: May 23, 2016
    Date of Patent: July 14, 2020
    Assignee: Saudi Arabian Oil Company
    Inventors: Mokhles Mustapha Mezghani, Nazih F. Najjar, Mahdi AbuAli, Rainer Zuhlke, Sedat Inan, Conrad K. Allen
  • Patent number: 10713399
    Abstract: Provided is a method of batching and scheduling for steelmaking production with plant-wide process consideration, including the steps of: establishing a mathematical model for quantitatively describing the decision problem of batching on steelmaking and continuous casting procedures; starting from the production capacity balance between parallel equipment of the same procedure, and material flow convergence between upstream and downstream procedures, establishing a model for the assignment and sequencing of batches on continuous casting equipment and the time dimension; integrating the batching plan and the production scheduling scheme, issuing the batching plan and the production scheduling scheme integrated to all production and manufacturing units at the steelmaking stage.
    Type: Grant
    Filed: November 14, 2016
    Date of Patent: July 14, 2020
    Assignee: NORTHEASTERN UNIVERSITY
    Inventors: Li xin Tang, Gong shu Wang, Wen jie Xu