Object Protection Patents (Class 713/167)
-
Patent number: 11310134Abstract: A method and a computing apparatus for tracking device utilization are provided. The method includes: obtaining first data that relates to a physical location of a device; obtaining second data that relates to network switch information of the device; obtaining third data that relates to a network activity performed by using the device; using each of the first data, second data, and third data to determine a utilization of the device; and outputting a result of the determination. The first data may include a building identification, a floor number, and/or a seat identification. The second data may include a switch host name, card information, and/or port information. The third data may include a management system into which the device is logged in.Type: GrantFiled: March 12, 2020Date of Patent: April 19, 2022Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Gina Manacci, Simon Lane, David Anselmo, Alpa Stamp, Jonathan M Baum, Chetan Trikha, Jerome Rulewicz, Jr., Rakesh Bhola, Nick Rosenberg
-
Patent number: 11295004Abstract: A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.Type: GrantFiled: January 31, 2020Date of Patent: April 5, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher L. Walstad
-
Patent number: 11271716Abstract: A method of blockchain-based data management of distributed binary objects includes identifying a binary object to be stored in a first data store. The method further includes encrypting, by a processing device, the binary object using a cryptographic function of a blockchain to generate an encrypted binary object. The method further includes storing the encrypted binary object in the first data store. The method further includes storing a reference to the encrypted binary object on the blockchain.Type: GrantFiled: January 28, 2021Date of Patent: March 8, 2022Assignee: emTRUTH, Inc.Inventors: Irene Wong Woerner, Ronald Chi King Kong
-
Patent number: 11271920Abstract: A method for validating a message recipient includes: storing, in a memory of a processing server, a device profile, wherein the device profile is related to a mobile computing device and includes at least a device identifier, and token validation data; receiving, by a receiver of the processing server, a data signal from an external system that is encoded with a message packet, wherein the message packet includes at least the device identifier, a device token, and a content message; validating, by a processing device of the processing server, the device token using at least the token validation data; and electronically transmitting, by a transmitter of the processing server, the content message to the mobile computing device.Type: GrantFiled: January 29, 2019Date of Patent: March 8, 2022Assignee: MASTERCARD INTERNATIONAL INCORPORATEDInventors: Ankur Arora, Rakesh Patel, Shashank Kumar Trivedi
-
Patent number: 11258587Abstract: Generating a rights blockchain storing rights of a user, including: receiving an enrollment request and a public key from the user; verifying that the user has a private key corresponding to the public key; generating a user identifier using the public key; and generating and delivering the rights blockchain having a genesis block including the user identifier to the user.Type: GrantFiled: March 14, 2017Date of Patent: February 22, 2022Assignees: Sony Corporation, Sony Pictures Entertainment Inc.Inventor: Eric Diehl
-
Patent number: 11251949Abstract: A method of storing data allowing a seed value for generating an encryption key to be retrieved is provided. The method comprises obtaining, for each of a plurality of biological data sources, a respective set of biometric data from an authorised user. A respective biometric identifier is generated from each set of biometric data. The biometric identifiers are stored in a database. A plurality of seed portions are generated that are combinable using a function to generate the seed value. Each seed portion is stored in the database in association with a biometric identifier.Type: GrantFiled: July 6, 2016Date of Patent: February 15, 2022Assignee: PIPA SOLUTIONS LTDInventor: Sher Khan
-
Patent number: 11240251Abstract: The present invention discloses an intelligent cloud server for cloud storage information management and encryption. In some embodiments, the intelligent cloud server can save and store documents without the need of first saving them in a local drive for upload. Upon storage, the document can be scanned and classified in a security level according to pre-determined settings and parameters. In some embodiments, depending on the classification, the system can encrypt portions of the document in order to facilitate the sharing and access of information in a secure way. Encryption keys and access to the encrypted portions are only provided upon authentication of the user, network, and/or need, according to corresponding protocols for the information.Type: GrantFiled: November 21, 2019Date of Patent: February 1, 2022Assignee: KEEPIISAFE (IRELAND) LIMITEDInventors: Saheeq Sayed, Karolina Kondzielewska, John Eikenberry
-
Patent number: 11240043Abstract: This disclosure is directed to computing services that provide secure network connections using public-private key-based security for Internet of Things (IoT) devices, such as voice devices, that may have more than a predefined set of users. Device certificates that authorize IoT devices to access a secure network, such as an enterprise network and/or services eternal to an enterprise network are provided. A setup system may cooperate with an IoT device and a subordinate CA to generate a device certificate that allows the IoT device to access a secure enterprise network and services outside of the secure enterprise network. The IoT device may generate a certificate signing request (CSR) which may be signed by a remote subordinate CA to generate the device certificate using a root certificate of an enterprise CA. Systems are also disclosed that renew certificates for the IoT devices prior to their expiration.Type: GrantFiled: August 10, 2018Date of Patent: February 1, 2022Assignee: Amazon Technologies, Inc.Inventors: Jonathan Alan Leblang, Jaykumar Harish Gosar, Farzad Sangi, Ankur Rawat, Danny Yu, Sujay Vaishampayan
-
Patent number: 11205194Abstract: A method includes sending an encrypted first hash value set to a data provider; receiving an encrypted second hash value set and a double-encrypted first hash value set from the data provider; re-encrypting the received encrypted second hash value set to obtain a double-encrypted second hash value set; calculating an intersection of the double-encrypted first hash value set and the double-encrypted second hash value set to determine one or more shared users shared with the data provider; and recommending or providing a service to the one or more shared users.Type: GrantFiled: April 6, 2020Date of Patent: December 21, 2021Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventors: Hui Huang, Zhenyu Zhang
-
Patent number: 11194568Abstract: Technologies are described for retaining configuration information for software applications during upgrades. For example, when an addon software package is deployed to a web application server running a main software platform, the configuration information for the addon software package can be preserved separately (e.g., independent of the common configuration file) and used later to restore the addon configuration information if needed. In some implementations, an addon presence file is used to store an entry for the addon software package. The entry identifies another file containing the configuration information for the addon software package. If the main software platform is upgraded resulting in the common configuration file being overwritten or replaced, then the addon configuration information can be added back to the common configuration file using the preserved configuration information.Type: GrantFiled: October 27, 2020Date of Patent: December 7, 2021Assignee: SAP SEInventors: Devashish Biswas, Nikita Jain
-
Patent number: 11188441Abstract: Techniques are described for sampling across trusted and untrusted distributed components. In accordance with embodiments, a first computing device receives a request from a second computing device, the first request including an operation identifier (ID) and a sampling ID that was generated by transforming a telemetry scope ID from a first value in a first domain to a second value in a second domain. The transformation may serve to anonymize and compress the telemetry scope ID. The first computing device determines whether or not to sample by comparing a ratio between the sampling ID and a size of the second domain with a sampling rate associated with the first computing device. The first computing device records telemetry about its processing of the first request in response to determining to sample and does not record any telemetry about its processing of the first request in response to determining not to sample.Type: GrantFiled: March 20, 2020Date of Patent: November 30, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Zaki Maksyutov, Dmitry G. Matveev, Sergey Kanzhelev, David J. Lubash, Soubhagya Kumar Dash, Arun Mathew Abraham
-
Patent number: 11178060Abstract: Examples include blocking an interface of a sponsor networking device from receiving data packets and receiving at the sponsor networking device an authentication packet from a first networking device. The first networking device is physically connected to the interface. Examples also include automatically setting by the first networking device, a unique local address for the first networking device; receiving, at the sponsor networking device, a local data packet from the first networking device, and translating, by the sponsor networking device, the local data packet to an off-fabric data packet.Type: GrantFiled: October 8, 2019Date of Patent: November 16, 2021Assignee: Hewlett Packard Enterprise Development LPInventors: Christopher Wild, Craig Mills
-
Patent number: 11172365Abstract: A smart tag and methods of interacting with and authenticating interactions with the same are provided. The smart tag is enabled to generate a Tag Authentication Cryptogram (TAC) and include the TAC in response to a read request. Accordingly, each response generated by the smart tag will include a different TAC. It follows that interactions between the smart tag and a reading device can be authenticated as unique interactions if the TAC is validated as a unique and correct TAC.Type: GrantFiled: July 26, 2019Date of Patent: November 9, 2021Assignee: ASSA ABLOY ABInventors: Philip Hoyer, Julian Eric Lovelock, Mark Robinton
-
Patent number: 11170387Abstract: Embodiments are directed towards collecting, aggregating and indexing unique and non-unique user data from a plurality of users. The result for a query of this indexed aggregation of user data is provided in a plurality of sub-sets of aggregated user data. Each subset of aggregated user data corresponds to a particular portion of the plurality of users. Also, each of these particular portions of the users is set at least large enough to provide general anonymity for the individual users. User data may be collected by one or more user data suppliers and provided to a user data aggregator. In some embodiments, user data may be collected as unique user data, non-unique user data, or any combination thereof. In some embodiments, user data may be aggregated by zip code, expanded zip code, and/or one or more attributes.Type: GrantFiled: December 20, 2018Date of Patent: November 9, 2021Assignee: Blue Kai, Inc.Inventors: Omar Tawakol, Lucian Vlad Lita
-
Patent number: 11163893Abstract: The present invention discloses methods and systems for redundantly securing data using an array of independent networks. Methods include the steps of: upon receiving a storage request and secret data for securely storing the secret data, independently requesting random data from each of at least one independent partner network out of an array of at least two independent partner networks; independently receiving the random data from each of at least one independent partner network, wherein respective random data is also stored on a respective independent partner network; cumulatively calculating complementary data as an encrypted form of the secret data with a complement function using the random data; and sending the complementary data to an independent storage partner network for storage, wherein the independent storage partner network is part of the array, and wherein the independent storage partner network is independent from at least one independent partner network.Type: GrantFiled: July 13, 2016Date of Patent: November 2, 2021Assignee: nsKnox Technologies Ltd.Inventors: Alon N. Cohen, Ilan Shiber, Sagi Vizner, Yoav Hermon
-
Patent number: 11157944Abstract: A method and system for bringing together online and offline advertising uses partner-encoded anonymous links that are associated with consumer data. The partner-encoded anonymous links allow processing without personally identifiable information (PII) in a secure environment. Data is matched using identifiers that are encrypted for use in connection with individual match distribution partners. The method and system allows a marketer to utilize offline data to precisely target advertisements without the use of PII, and to perform analytics concerning the use of the online advertisements to more precisely determine the effectiveness of multichannel marketing efforts.Type: GrantFiled: September 5, 2014Date of Patent: October 26, 2021Assignee: LiveRamp, Inc.Inventors: Thierry Roullier, Dana S. Robbins, Linda Young, Scott Jones, Mike Zukerman, Russell Della Rosa
-
Patent number: 11151236Abstract: An example operation may include one or more of initiating, by a file verification device, verification of a source file or a redacted source file, executing one of a smart contract or chaincode to verify the chameleon hash signature and the auxiliary data hash signature, and providing a notification whether the verification was successful or unsuccessful. In response to initiating verification of the source file, the method further includes the file verification device receiving stored source file segments and stored auxiliary data segments, generating a chameleon hash signature, and generating an auxiliary data hash signature. In response to initiating verification of the redacted source file, the method further includes receiving stored redacted file segments, stored auxiliary data segments, and stored modified auxiliary data, generating a chameleon hash signature, and generating an auxiliary data hash signature.Type: GrantFiled: December 20, 2018Date of Patent: October 19, 2021Assignee: International Business Machines CorporationInventors: Karthik Nandakumar, Nalini K. Ratha, Sharathchandra Pankanti
-
Patent number: 11146645Abstract: Network and/or application resources can be dynamically instantiated based on service attributes and/or network capabilities. In one aspect, a customized and/or localized core slice can be selected that can deliver the requested service with target performance parameters. According to an aspect, dynamic selection, control, and/or management reporting can be provided for core network slices. Moreover, optimal core network slice selection can be performed to reduce network transport costs and efficiently deliver various services using an optimal core slice that matches a service profile being requested by an end user and/or device.Type: GrantFiled: February 7, 2020Date of Patent: October 12, 2021Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Rajendra Prasad Kodaypak, Jianrong Wang, Jiansong Wang
-
Patent number: 11140148Abstract: A method, a non-transitory computer readable medium, and a system are disclosed for a single sign-on for services. The method includes: receiving, on a computer processor, user identification captured by a biometric device of a user; forwarding, by the computer processor, the user identification to an authentication server; receiving, on the computer processor, a user JSON Web Token (user-JWT), user principle name, active directory domain name, and user domain name password, upon authentication of the user by the authentication server; performing, by the computer processor, an active directory join operation with an active directory using the user principle name, the active directory domain name, and the user domain name password; launching, on the computer processor, a browser that communicates with the authentication server; and receiving, on the computer processor, an HTML page constructed with JavaScript code with clickable icons for provisioned services from the authentication server.Type: GrantFiled: March 30, 2020Date of Patent: October 5, 2021Assignee: Konica Minolta Business Solution U.S.A., Inc.Inventor: Rahul Suraparaju
-
Patent number: 11139960Abstract: An example operation may include one or more of determining, by a file redaction device, redacted segments of a source file, receiving, by a signature update device, the redacted source file segments, a stored trapdoor key, and stored auxiliary data segments, determining modified auxiliary data from the redacted source file segments, the trapdoor key and the auxiliary data segments, executing chaincode to obtain a modified auxiliary data signature and identifiers of the redacted source file segments, and storing the modified auxiliary data signature and identifiers of the redacted source file segments to a shared ledger of a blockchain network. Each stored auxiliary data segment including a random string of data corresponding to a segment of the source file.Type: GrantFiled: December 20, 2018Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Karthik Nandakumar, Nalini K. Ratha, Sharathchandra Pankanti
-
Patent number: 11108545Abstract: Implementations of this specification provide a method and an apparatus for creating a blockchain account and verifying blockchain transactions. An example method performed by a blockchain platform includes receiving a transaction, the transaction including at least an initiator field that specifies an account to be created, a receiver field that specifies a pre-determined field value, and a data field that specifies a user-defined key control rule. The user-defined key control rule includes at least one 3-tuple, and each 3-tuple includes a key identifier, an action identifier, and a permission setting. The blockchain platform seals the transaction into a block, and sends the sealed transaction to at least one other full node in the blockchain network.Type: GrantFiled: January 31, 2020Date of Patent: August 31, 2021Assignee: Advanced New Technologies Co., Ltd.Inventor: Jun Zuo
-
Patent number: 11108773Abstract: A client device accesses an online system using an authentication process when it is connected to a public network and not a private network. The client device requests access using an authentication broker via the public network. The authentication broker determines an authentication system and transmits identification information for the client device to the authentication system via the private network. The authentication broker receives an authentication vector generated by the authentication system via the private network, and receives a verification response from the client device via the public network. The verification response corresponds to a verification challenge generated based on the authentication vector by the authentication broker.Type: GrantFiled: July 22, 2019Date of Patent: August 31, 2021Assignee: Facebook, Inc.Inventor: Govardhan Reddy Dhani Reddy
-
Patent number: 11068466Abstract: A method for validating data structures includes generating and storing, at each of multiple intervals, a signature for each of multiple data structures, including a parent data structure and a child data structure. The method also includes, in response to a request to validate the child data structure, retrieving active state signatures of the parent and child data structures, and comparing the active state signatures. The method further includes, when the active state signatures are inconsistent, comparing the active state signature of the child data structure to a first prior state signature of the parent data structure; and when the active state signature of the child data structure is consistent with the first prior state signature of the parent data structure, notifying a user that the child data structure is a match for the parent data structure but out of sync therewith.Type: GrantFiled: December 31, 2018Date of Patent: July 20, 2021Assignee: MASTERCARD INTERNATIONAL INCORPORATEDInventor: Kenneth Gene Feulner
-
Patent number: 11070937Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: recording position data for a mobile device over time, the position data being associated to an identifier of the mobile device; outputting to a user an identification code associated to the identifier; receiving input data from a user, the input data including the identification code and user identifying information from a user; responsively to the receiving the input data from a user associating the identification code and the user identifying information; based on the associating processing the position data and user profile data associated to the user identifying information; sending a message to the user based on a result of the processing.Type: GrantFiled: September 4, 2019Date of Patent: July 20, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jeremy A. Greenberger, Zachary M. Greenberger
-
Patent number: 11055479Abstract: Techniques for obtaining electronic signatures via word processing applications are described. One approach utilizes a code module, also referred to as a “markup module,” that executes within a word processing application and that facilitates the preparation of a document for electronic signature. A user can operate the word processing application together with the markup module in order to add signature tag markers to the document and to provide recipient information about intended signers, such as names and email addresses. Once the document has been prepared, the code module transmits the document (including the added signature tag markers) and the recipient information to a digital transaction service. The digital transaction service then manages the signing of the document, such as by notifying the recipient, receiving the recipient's signature and securely storing the signature in association with the document.Type: GrantFiled: January 30, 2015Date of Patent: July 6, 2021Assignee: DOCUSIGN, INC.Inventors: Inbar Gazit, Joe Cartano, Jenson Yan, Lahini Arunachalam, Tamara Solorzano Tejeda
-
Patent number: 11038855Abstract: The invention relates to a method and an apparatus for encrypted communication between a client and a server, wherein the communication comprises request messages, each with request elements, and response messages, each with response elements. Request elements and response elements can comprise data. It is an object of the invention to hamper or prevent unauthorized access to the data during communication and also during storage and processing on the server. In this case, it is assumed that the communication channel and also the server itself are not trustworthy and neither client nor server provide measures or are adaptable in order to counter said risks of unauthorized access, for example by means of cryptographic methods.Type: GrantFiled: June 23, 2016Date of Patent: June 15, 2021Assignee: medisite GmbHInventor: Torsten Frank
-
Patent number: 11032320Abstract: Systems and methods for dynamic application level encryption are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for dynamic application level encryption include: (1) receiving a plurality of data classification rules; (2) classifying data using the data classification rules; (3) identifying at least one protection option of a plurality of protection options for protecting the data in at least a rest state, an in-transit state, and an in-memory state; and (4) applying the at least one protection option to the data at rest.Type: GrantFiled: September 19, 2017Date of Patent: June 8, 2021Assignee: JPMorgan Chase Bank, N.A.Inventors: Jorge Garcia Reyero, Marco C. Pineda, Jody Spearing
-
Patent number: 10972860Abstract: A system and method for responding to changes in social traffic in a geographic area receives, via an electronic communications interface, information describing a geographic area and one or more attributes of people expected to be in the geographic area. A geofence is defined based on the information describing the geographic area, and a cohort of people expected to be in the geofence is defined based on the one or more attributes. Information from a sensor regarding an attribute of a person at a geographic location is received via an electronic communications network. Based on the attribute, a determination is made whether or not the person is a member of the cohort of people expected to be in the geofence. An alert may be triggered based at least in part on whether or not the person is a member of the cohort of people expected to be in the geofence.Type: GrantFiled: May 25, 2017Date of Patent: April 6, 2021Assignee: International Business Machines CorporationInventors: Paul R. Bastide, Matthew E. Broomhall, Robert E. Loredo, Fang Lu
-
Patent number: 10958629Abstract: Methods and apparatus for ensuring protection of transferred content. In one embodiment, content is transferred while enabling a network operator (e.g., MSO) to control and change rights and restrictions at any time, and irrespective of subsequent transfers. This is accomplished in one implementation by providing a premises device configured to receive content in a first encryption format and encodes using a first codec, with an ability to transcrypt and/or transcode the content into an encryption format and encoding format compatible with a device which requests the content therefrom (e.g., from PowerKey/MPEG-2 content to DRM/MPEG-4 content). The premises device uses the same content key to encrypt the content as is used by the requesting device to decrypt the content.Type: GrantFiled: August 13, 2018Date of Patent: March 23, 2021Assignee: Time Warner Cable Enterprises LLCInventor: Eric Hybertson
-
Patent number: 10951630Abstract: A method for verifying trusted communication between an agent device and an application providing apparatus using a registry apparatus. The registry apparatus maintains a device registry comprising authentication information for uniquely authenticating at least one agent device. The method includes the steps of obtaining from the device registry the authentication information for the agent device identified by a device identifier specified in an the authentication request from the agent device, performing verification of the agent device using the authentication information obtained from the device registry, and if the verification is not successful, transmitting to at least one of the agent device and the application providing apparatus revocation information for denying the trusted communication between the agent device and the application providing apparatus.Type: GrantFiled: October 12, 2018Date of Patent: March 16, 2021Assignee: ARM LimitedInventors: Norbert David, Szymon Sasin
-
Patent number: 10949555Abstract: A system and method for encryption and decryption of data is disclosed. The decryption system provides access to remotely stored data items, each of the data items being independently accessible. At least a subset of the remotely stored data items are encrypted and each encrypted data item has an associated access condition. Upon a client requesting access to a remotely stored data item, the decryption system is arranged provide non-encrypted data items and for encrypted data items provide a decrypted data item if the associated access condition is met.Type: GrantFiled: May 23, 2016Date of Patent: March 16, 2021Assignee: Exate Technology LimitedInventors: Sonal Rattan, Peter Lancos, Suraj Nittoor
-
Patent number: 10902145Abstract: Techniques for sorting encrypted data within a software as a service (SaaS) environment. Data is encrypted on a per symbol basis with a symbol based encryption module. Sort and search functionality preserving encryption that allows other modules to sort tokens and to search for tokens is provided. Encrypted tokens that have been encrypted by the symbol based encryption module are stored in a database. Access to the encrypted tokens is provided through the SaaS environment.Type: GrantFiled: March 4, 2019Date of Patent: January 26, 2021Assignee: salesforce.com, inc.Inventor: David Movshovitz
-
Patent number: 10824770Abstract: Various examples are directed to systems and methods for executing a web application with client-side encryption. A web application may execute in a web browser at a client computing device. The web browser may generate a document comprising a secure display element. The web browser may request to render the document at the client computing device. A cryptographic tool of the web browser may decrypt the first encrypted value to generate a first clear value. The web browser may render the document at an output device of the client computing device using the clear value. The web browser may also be programmed to prevent the web application from accessing the first clear value.Type: GrantFiled: December 13, 2018Date of Patent: November 3, 2020Assignee: SAP SEInventor: Martin Johns
-
Patent number: 10803095Abstract: An approach is provided in which a system analyzes a first set of data to derive a first distribution output that is based on a first conjugated distribution corresponding to the first set of data and a domain class model. The system utilizes the first distribution output as a baseline input to generate a second conjugated distribution corresponding to a second set of data and the domain class model. Next, the system derives a second distribution output of the second set of data based on the second conjugated distribution. The second distribution output identifies at least one personally identifiable information (PII) data field corresponding to the second set of data that was not identified as a PII data field in the domain class model. In turn, the system tags at least a portion of the second set of data as PII based on the derived second distribution output.Type: GrantFiled: July 30, 2018Date of Patent: October 13, 2020Assignee: International Business Machines CorporationInventors: Robert H. Grant, Trudy L. Hewitt, Brian A. O'Crowley, Jonathan Dunne
-
Patent number: 10785217Abstract: An authentication control method, system, and computer program product, includes performing an initial calibration to login to a registered device by detecting a plurality of biological signals, biometric signals, and idiosyncratic signals of a user and selecting a combination of the plurality of biological signals, biometric signals, and idiosyncratic signals to use in an initial calibration-authentication score, computing a login-authentication score at a time of the login based on a user input of signals corresponding to the signals of the initial calibration-authentication score, and allowing the login to the registered device if the login-authentication score is within a predetermined threshold of the initial calibration-authentication score.Type: GrantFiled: January 10, 2017Date of Patent: September 22, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Saritha Arunkumar, Kuntal Dey, Nizar Lethif, Enara C. Vijil
-
Patent number: 10783264Abstract: A non-transitory computer-readable storage medium storing a control program that causes a computer to execute a process including receiving specified information generated in response to reception of an acquisition request of data from a terminal device that decrypts an encrypted data corresponding to the data, and identification information on the terminal device, determining whether or not the specified information is stored, in a storage unit, in association with the received identification information on the terminal device that has sent the acquisition request, the storage unit storing the specified information to be generated in association with the identification information on a terminal device for which a data acquisition is permitted for each of the plurality of pieces of data, and transmitting information that permits decryption of the encrypted data corresponding to the data to the terminal device when the specified information is stored in association with the received identification information.Type: GrantFiled: August 31, 2017Date of Patent: September 22, 2020Assignee: FUJITSU LIMITEDInventors: Takanori Hamano, Seiji Kurimoto, Yumiko Yamagata, Yoko Miura, Yoshimi Yufu, Satoshi Wakabayashi, Yoriko Yamada
-
Patent number: 10776010Abstract: A system includes a read/write controller removably coupled to a storage drive. Responsive to detection of a coupling between the read/write controller and the storage drive, the read/write controller retrieves key information from the storage drive, uses the key information to locate adaptives associated with the primary storage medium, and loads the adaptives into volatile memory to configure read/write settings for access to the primary storage medium.Type: GrantFiled: April 19, 2019Date of Patent: September 15, 2020Assignee: SEAGATE TECHNOLOGY LLCInventors: Riyan Alex Mendonsa, Jon D Trantham, Anil J Reddy, Varun Reddy Boddu, Ajay Narayan Kulkarni
-
Patent number: 10743180Abstract: A method, an apparatus, and a system for authenticating a WI-FI network, where a terminal sends, to an associated authentication center when the WI-FI network exists in an area in which the terminal is located, a request message that carries a user identifier, receives access verification information allocated to a user represented by the first user identifier from the associated authentication center, sends, to a WI-FI authentication center, a login request that carries the access verification information, receives authentication information obtained and fed back by the WI-FI authentication center carrying a user identifier corresponding to the access verification information, and determines that the WI-FI network is a secure network when the user identifier carried in the authentication information is the same as the user identifier carried in the request message.Type: GrantFiled: December 29, 2017Date of Patent: August 11, 2020Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Zhengquan Huang
-
Patent number: 10691809Abstract: An information processing apparatus, including a function of mandatory access control, includes a storage unit that stores a security policy for managing access by the mandatory access control, an obtaining unit that obtains information on vulnerability of an application, and an updating unit that updates the security policy by a function of a kernel thread in accordance with the information obtained by the obtaining unit.Type: GrantFiled: February 25, 2016Date of Patent: June 23, 2020Assignee: Canon Kabushiki KaishaInventor: Kenichi Okihara
-
Patent number: 10691754Abstract: Described is a system for secure database searching. The system comprises a client-server architecture which allows a client to securely search a database of records possessed by a server. A database query is generated by the client and transmitted to the server. The database query is processed by the server using a privacy-preserving search protocol. An encrypted match result is produced by the server without decrypting the database query. The encrypted match result is sent to the client, and the client decrypts the encrypted match result to obtain a set of block identifiers representing blocks of records in the database that match the database query. The client obtains a block of encrypted records containing match results using only the set of block identifiers. The match results are decrypted by the client using a key obtained from the server. The unencrypted match results to the database query are then output.Type: GrantFiled: July 18, 2016Date of Patent: June 23, 2020Assignee: HRL Laboratories, LLCInventors: Karim El Defrawy, David W. Payton, Joshua W. Baron
-
Patent number: 10657248Abstract: The present disclosure describes a system for saving metadata on files and using attribute data files inside a computing system to enhance the ability to provide user interfaces based on actions associated with non-executable attachments like text and document files from untrusted emails, to block execution of potentially harmful executable object downloads and files based on geographic location, and to a create a prompt for users to decide whether to continue execution of potentially harmful executable object downloads and files. The system also records user behavior on reactions to suspicious applications and documents by transmitting a set of attribute data in an attribute data file corresponding to suspicious applications or documents to a server. The system interrupts execution of actions related to untrusted phishing emails in order to give users a choice on whether to proceed with actions.Type: GrantFiled: July 27, 2018Date of Patent: May 19, 2020Assignee: KnowBe4, Inc.Inventors: Bret Lowry, Gauvin Repuspolo
-
Patent number: 10635567Abstract: Techniques are described for sampling across trusted and untrusted distributed components. In accordance with embodiments, a first computing device receives a request from a second computing device, the first request including an operation identifier (ID) and a sampling ID that was generated by transforming a telemetry scope ID from a first value in a first domain to a second value in a second domain. The transformation may serve to anonymize and compress the telemetry scope ID. The first computing device determines whether or not to sample by comparing a ratio between the sampling ID and a size of the second domain with a sampling rate associated with the first computing device. The first computing device records telemetry about its processing of the first request in response to determining to sample and does not record any telemetry about its processing of the first request in response to determining not to sample.Type: GrantFiled: May 22, 2018Date of Patent: April 28, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Zaki Maksyutov, Dmitry G. Matveev, Sergey Kanzhelev, David J. Lubash, Soubhagya Kumar Dash, Arun Mathew Abraham
-
Patent number: 10601590Abstract: A computing device stores code associated with a computing function in a protected computing environment, such as a trusted execution environment, wherein the computing function is attested by a code measurement service associated with the protected computing environment. The computing device links the computing function to a secret stored in a hardware security module (HSM), the secret to enable execution of the computing function in the protected computing environment.Type: GrantFiled: November 9, 2017Date of Patent: March 24, 2020Assignee: Amazon Technologies, Inc.Inventor: Jasmeet Chhabra
-
Patent number: 10601932Abstract: Network and/or application resources can be dynamically instantiated based on service attributes and/or network capabilities. In one aspect, a customized and/or localized core slice can be selected that can deliver the requested service with target performance parameters. According to an aspect, dynamic selection, control, and/or management reporting can be provided for core network slices. Moreover, optimal core network slice selection can be performed to reduce network transport costs and efficiently deliver various services using an optimal core slice that matches a service profile being requested by an end user and/or device.Type: GrantFiled: June 9, 2017Date of Patent: March 24, 2020Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Rajendra Prasad Kodaypak, Jianrong Wang, Jiansong Wang
-
Patent number: 10572634Abstract: Embodiments include apparatuses, methods, and systems including a wireless display system to provide digital right management secure content to a display receiver device. The display transmitter device may determine to provide a decryption and presentation license for the display receiver device based on the DRM credential and the DRM scheme of the display receiver device. The display transmitter device may further pass through the secure DRM content to the display receiver device based on provision of the decryption and presentation license, wherein the secure DRM content is passed through the display transmitter device without transcription by the display transmitter device. Other embodiments may also be described and claimed.Type: GrantFiled: June 30, 2017Date of Patent: February 25, 2020Assignee: Intel CorporationInventors: Rajneesh Chowdhury, Karthik Veeramani, Rajesh Poornachandran
-
Patent number: 10552520Abstract: A provisioning system provisions a mobile software application to one or more remotely-located mobile computing devices. The remotely-located mobile computing devices may each have a native operating system. The mobile software application may include executable program code and a structured document such that the executable program code and structured document together instantiate at least a portion of the functionality provided by the mobile application. Moreover, in some embodiments, when the requested and sent mobile application is executed by a requesting mobile device, the structured document is parsed into a Document Object Model tree structure which when updated, updates at least in part the running state of the mobile application.Type: GrantFiled: June 12, 2018Date of Patent: February 4, 2020Assignee: SQGO Innovations, LLCInventors: Bruce Warila, Brian D. Markey, Jeremy Aaron Gilbert, James P. Echmalian, Todd Silverstein
-
Patent number: 10496480Abstract: A method for execution by a dispersed storage and task (DST) client module includes obtaining a data identifier for slice location identification. A source name corresponding to the data identifier is identified. A plurality of data segments are identified based on the source name. A set of slice names are generated for each of the plurality of data segments. A set of DST execution units are identified based on the sets of slice names. A set of query requests are generated for each data segment for transmission to the set of DST execution units. Query responses are received from the set of DST execution units. A storage record is generated that includes storage location information of the query responses. Migration of at least some encoded data slices associated with the sets of slice names is facilitated when the storage record compares unfavorably to a storage record requirement.Type: GrantFiled: June 7, 2018Date of Patent: December 3, 2019Assignee: PURE STORAGE, INC.Inventors: Vimalkumar P. Gajjar, Jason K. Resch
-
Patent number: 10496843Abstract: Systems and methods are provided executing jobs immediately upon receipt of a notification. The systems and methods may include receiving, at a cloud compute service, a notification that a sensitive file comprising sensitive data has been received at a file receipt location, the sensitive file being sent by a client device; generating, by the cloud compute service, a container instance in response to the notification; retrieving, by the container instance, the sensitive file from the file receipt location; generating, by the container instance, a stripped file by stripping the sensitive data from the sensitive file based on a configuration file; transmitting, by the container instance, the stripped file to a storage location; deleting the sensitive file and associated file pointers from the file receipt location; and terminating the container instance, wherein terminating the container instance comprises deleting files comprising sensitive data and associated file pointers.Type: GrantFiled: March 6, 2019Date of Patent: December 3, 2019Assignee: Capital One Services, LLCInventors: Nathal L. Fonseka, Ankit Pansari
-
Facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment
Patent number: 10491398Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment, where a database system-implemented method includes receiving, by the database system, a content file and metadata to be submitted to a data repository of the database system. The content file may include content, where the metadata may include identifying data associated with at least one of the content and a user associated with the content. The method may include verifying, by the database system, the identifying data of the metadata. The verification of the identifying data represents authentication of at least one of the user and the content. The method may include submitting, by the database system, the content file and the metadata to the data repository, upon authentication of at least one of the user and the content via successful verification of the identifying data.Type: GrantFiled: September 12, 2014Date of Patent: November 26, 2019Assignee: salesforce.com, inc.Inventors: Shiloh Cory Heurich, Frank Siebenlist, Taher Elgamal, Clayten Tyler Joseph Hamacher, Matthew Steele, Pathik Ashok Solanki, Matthew B. Schechtman -
Patent number: 10482260Abstract: Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation.Type: GrantFiled: September 20, 2016Date of Patent: November 19, 2019Assignee: Symantec CorporationInventors: Anthony John Bettini, Kevin Watkins, Domingo J. Guerra, Michael Price