System Access Control Based On User Identification By Cryptography Patents (Class 713/182)
-
Patent number: 9819491Abstract: Embodiments of the present disclosure include systems and methods for secure release of secret information over a network. The server can be configured to receive a request from a client to access the deposit of secret information, send an authorization request to at least one designated trustee in the set of designated trustees for the deposit of secret information, receive responses over the network from one or more of the designated trustees in the set of designated trustees and apply a trustee policy to the responses from the one or more designated trustees in the set of trustees to determine if the request is authorized. If the request is authorized, the server can send the secret information to the client. If the request is not authorized, the server denies access by the client to the secret information.Type: GrantFiled: May 9, 2016Date of Patent: November 14, 2017Assignee: Cloudera, Inc.Inventors: Dustin C. Kirkland, Eduardo Garcia
-
Patent number: 9817641Abstract: A method, system, and medium are provided for facilitating development of an application by a user for a mobile communications device. A portion of programmatic code provided by the user is retrieved and a classification corresponding to the code is determined. A set of rules comprising a use restriction associated with a protected application component is referenced to determine whether the code classification corresponds to a use restriction. Incident to identifying an associated use restriction, feedback is presented to the user that indicates that the portion of code corresponds to a use restriction.Type: GrantFiled: June 8, 2015Date of Patent: November 14, 2017Assignee: Sprint Communications Company L.P.Inventors: Ryan Alan Wick, Raymond Emilio Reeves, John Marvin Jones, III
-
Patent number: 9813441Abstract: A security device may receive a request from a client device and intended for a server device. The security device may identify the request as being associated with a malicious activity. The malicious activity may include one or more undesirable tasks directed to the server device. The security device may generate a challenge-response test based on identifying the request as being associated with the malicious activity. The challenge-response test may be generated using one or more construction techniques. The security device may provide the challenge-response test to the client device. The security device may receive, from the client device, a proposed solution to the challenge-response test. The security device may identify the proposed solution as being generated using an optical character recognition (OCR) program. The security device may protect the server device from the client device based on identifying the solution as being generated using an OCR program.Type: GrantFiled: December 17, 2015Date of Patent: November 7, 2017Assignee: Juniper Networks, Inc.Inventor: Kyle Adams
-
Patent number: 9811381Abstract: Resource restrictions are associated with a user identifier. A resource restriction agent receives operating system calls related for resources and provides resource request data to a resource agent. The resource agent determines whether the resource is restricted based on the resource request data and resource restriction data and generates access data based on the determination. The resource restriction agent grants or denies the system call based on the access data.Type: GrantFiled: July 25, 2016Date of Patent: November 7, 2017Assignee: APPLE INC.Inventors: Jussi-Pekka Mantere, III, Alexander Tony Maluta, John William Scalo, Eugene Ray Tyacke, Bruce Gaya, Michael John Smith, Peter Kiehtreiber, Simon P. Cooper
-
Patent number: 9807611Abstract: An electronic device uses a voiceprint for user authentication, and includes a storage unit, a voice input unit, and at least one processor. The storage unit registers a first voiceprint based on first voice corresponding to a first character string and a second voiceprint based on second voice corresponding to a second character string longer than the first character string. The at least one processor generates a third voiceprint from third voice input to the voice input unit after registration of the voiceprint in the storage unit, and makes a first comparison between the first voiceprint and the third voiceprint as first user authentication. The at least one processor generates a fourth voiceprint from fourth voice input to the voice input unit after the third voice, and makes a second comparison between the second voiceprint and the fourth voiceprint, when the first user authentication has failed.Type: GrantFiled: April 20, 2016Date of Patent: October 31, 2017Assignee: KYOCERA CORPORATIONInventor: Hayato Takenouchi
-
Patent number: 9800681Abstract: A network traffic monitoring system for redirecting network traffic between a client device and a cloud service includes a monitor proxy server configured as a network intermediary between the client device and the cloud service; and a published identity provider. The published identity provider is configured to receive a login request from a client device and to authenticate the client device at a federated identity provider. The published identity provider is configured to receive from the federated identity provider a redirect response including an identity assertion and a redirect web address to the cloud service. The published identity provider is configured to rewrite the redirect web address to the web address of the monitor proxy server. As a result, network traffic between the cloud service and the client device is routed through the monitor proxy server after user authentication using the published identity provider.Type: GrantFiled: August 12, 2015Date of Patent: October 24, 2017Assignee: Skyhigh Networks, Inc.Inventors: Sekhar Sarukkai, Kaushik Narayan, Rajiv Gupta
-
Patent number: 9798876Abstract: A computer-implemented method for creating security profiles may include (1) identifying, within a computing environment, a new actor as a target for creating a new security behavior profile that defines expected behavior for the new actor, (2) identifying a weighted graph that connects the new actor as a node to other actors, (3) creating, by analyzing the weighted graph, the new security behavior profile based on the new actor's specific position within the weighted graph, (4) detecting a security anomaly by comparing actual behavior of the new actor within the computing environment with the new security behavior profile that defines expected behavior for the new actor, and (5) performing, by a computer security system, a remedial action in response to detecting the security anomaly. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: August 19, 2015Date of Patent: October 24, 2017Assignee: Symantec CorporationInventors: Aleatha Parker-Wood, Anand Kashyap, Christopher Gates, Kevin Roundy, Leylya Yumer, Sandeep Bhatkar, Yin Liu
-
Patent number: 9800660Abstract: A communication device according to the present invention aims to restart data transmission/reception between communication devices in a short amount of time, without performing key sharing again, even when a communication device of a transmitting side is rebooted. The communication device includes a volatile memory storing a count value, a generator generating data including a count value, a communicator transmitting data to another communication device, a storage instructor, each time the communicator transmits data, updating the volatile memory with a count value, and a nonvolatile memory. A count value is incremented each time the communicator transmits data, the storage instructor causes the nonvolatile memory to store a count value at certain intervals, and the generator, when the communication device is rebooted, includes in data a sum of a certain value and a count value stored in the nonvolatile memory.Type: GrantFiled: January 29, 2014Date of Patent: October 24, 2017Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventors: Yoichi Masuda, Masaki Ikeda, Tomoya Watanabe, Keiji Sakaguchi, Hirotatsu Shinomiya, Seiji Nimura
-
Patent number: 9792606Abstract: A method for performing a secure transaction between a secure device (2) and a terminal (4), the method being carried out by the secure device (2) and comprising the steps of: receiving transaction data from the terminal (4), characterized in that it comprises, before the step of receiving transaction data from the terminal (4), the steps of obtaining transaction data entered by a user of the secure device (2), and transmitting the transaction data to the terminal (4).Type: GrantFiled: August 10, 2012Date of Patent: October 17, 2017Assignee: Oberthur TechnologiesInventors: Yann-loic Aubin, Vincent Guerin, Matthieu Boisde
-
Patent number: 9794542Abstract: A wearable computer interface comprising a three dimensional (3D) range camera and a picture camera that image the user and a controller that process the images to identify the user and determine if the user is authorized to use the interface to access functionalities provided by a computer interfaced by the interface.Type: GrantFiled: July 3, 2014Date of Patent: October 17, 2017Assignee: Microsoft Technology Licensing, LLC.Inventors: Amir Nevet, Giora Yahav
-
Patent number: 9785708Abstract: An architecture for a multimedia search system is described. To perform similarity matching of multimedia query frames against reference content, reference database comprising of a cluster index using cluster keys to perform similarity matching and a multimedia index to perform sequence matching is built. Methods to update and maintain the reference database that enables addition and removal of the multimedia contents, including portions of multimedia content, from the reference database in a running system are described. Hierarchical multi-level partitioning methods to organize the reference database are presented. Smart partitioning of the reference multimedia content according to the nature of the multimedia content, and according to the popularity among the social media, that supports scalable fast multimedia identification is also presented.Type: GrantFiled: May 21, 2015Date of Patent: October 10, 2017Assignee: GRACENOTE, INC.Inventors: Sunil Suresh Kulkarni, Jose Pio Pereira, Pradipkumar Dineshbhai Gajjar, Shashank Merchant, Prashant Ramanathan, Mihailo M. Stojancic
-
Patent number: 9785623Abstract: Some described embodiments relate to techniques for editing markup elements of a markup language document to emphasize a portion of the visible content elements of the markup language document. The techniques may be implemented in any suitable manner, including via scripting language code (e.g., JavaScript) that is incorporated into the markup language document but is not preconfigured with information regarding the markup language document or any other markup language document. The scripting language code may perform the editing automatically, and based on an automatic analysis of markup elements of the markup language document. Some embodiments may include determining the portion of the markup language document to be emphasized by identifying content of interest to a user, including by determining a set of related content through analyzing a structure of markup elements of the markup language document and/or layout of visible content elements of the markup language document.Type: GrantFiled: January 22, 2015Date of Patent: October 10, 2017Assignee: Freedom Scientific, Inc.Inventor: Aaron M. Leventhal
-
Patent number: 9785790Abstract: Protecting a computer security application by executing the computer security application on a computer in a first namespace associated with an operating system of the computer, and creating a second namespace associated with the operating system of the computer, where the second namespace is accessible to the computer security application, and where the first namespace is inaccessible from the second namespace.Type: GrantFiled: December 15, 2015Date of Patent: October 10, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Shmuel Regev, Shahar Kohanim, Shai Barlev
-
Patent number: 9781127Abstract: A method and system to regulate a digital security system that controls access to a resource is disclosed. The system controls access to the resource according to a multi-level security protocol including a high-security-level access protocol and a low-security-level access protocol. The regulation method and system are configured to collect data from a set of user-data sources with which the user interacts during his daily life and, based on the collected data, to compute security parameters characterizing user activity. The computed security parameters are compared to a digital profile that models the characteristic behavior of this user. When the comparison indicates that the observed user activity is inconsistent with the digital behavior profile, the digital security system is regulated to set (or maintain) it in an operating state such that, when the user requests access to the resource in the future, the system will automatically implement the high-security-level access protocol.Type: GrantFiled: June 11, 2015Date of Patent: October 3, 2017Assignee: ORANGEInventors: Maria Prokopi, Mobeen Qureshi, Zaheer Ahmad
-
Patent number: 9772605Abstract: A wearable device includes: a touch screen; an acceleration sensor configured to generate an acceleration signal; an optical sensor using a light source and configured to generate a touch interrupt signal; and a control unit configured to detect a wearing state of the wearable device, the wearing state of the wearable device including a not-wearing state for the wearable device, a wrist wearing state, and a hand gripping state on the basis of the acceleration signal and the touch interrupt signal, and to execute a function corresponding to the wearing state of the wearable device.Type: GrantFiled: July 12, 2016Date of Patent: September 26, 2017Assignee: LG ELECTRONICS INC.Inventors: Hongjo Shim, Gukchan Lim, Youngho Sohn, Seonghyok Kim, Chohee Kwon, Hyunwoo Kim
-
Patent number: 9774608Abstract: A device control method used in a device control system in which an operation terminal is used to remotely operate a device with a server device mediating between the operation terminal and the device, the device control method including: acquiring, upon reception of an operation instruction for operation of the device from the operation terminal, environment information pertaining to at least one of the device and the operation terminal; performing a determination of whether or not to cause execution of processing corresponding to the operation instruction based on whether or not the environment information satisfies a predetermined condition; and causing the device to execute an execution command for execution of the processing when a result of the determination is affirmative, and not causing the device to execute the execution command when the result of the determination is negative.Type: GrantFiled: August 1, 2013Date of Patent: September 26, 2017Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventors: Toshihisa Nakano, Masayuki Kozuka, Masataka Minami, Motoji Ohmori, Takeshi Matsuo, Tsuyoshi Sakata, Fumiaki Suzuki
-
Patent number: 9772623Abstract: Techniques for securing a device for use in or with a process plant include provisioning the device with a key generated at least in part from data indicative of necessary conditions and/or attributes that must be met before the device is allowed access to a network of the process plant. Upon initialization, the device determines, based on the key, whether or not the necessary conditions are met, and the device isolates itself or accesses the process control network accordingly. Keys and the necessary conditions/attributes indicated therein may be based on, for example, location, time, context, customer, supplier, particular plant, manufacturer, user, data type, device type, and/or other criteria. Additionally, sub-keys associated with a key may be generated from another set of necessary conditions/attributes. Sub-keys may be provided by a different entity than the key provider entity.Type: GrantFiled: July 18, 2016Date of Patent: September 26, 2017Assignee: FISHER-ROSEMOUNT SYSTEMS, INC.Inventors: Mark J. Nixon, Ken J. Beoughter, Daniel D. Christensen, Deji Chen, James H. Moore, Jr.
-
Patent number: 9769875Abstract: Embodiments disclosed herein provide systems and methods for allowing non-compliant communication devices to receive multimedia messages. In a particular embodiment, a method provides receiving, from a multimedia messaging system, a content identifier that a destination communication device will use to access content of a multimedia message transferred from a first communication device. The method further provides determining a device identifier for the destination communication device and inserting the device identifier into the content identifier. After inserting the device identifier, the method provides transferring the content identifier to the destination communication device.Type: GrantFiled: March 12, 2014Date of Patent: September 19, 2017Assignee: Sprint Communications Company L.P.Inventors: Sean Patrick Hoelzle, Nandana T. Maddumakumara, Michael A. Carey
-
Patent number: 9760700Abstract: Systems and methods of determining image characteristics are provided. More particularly, a first image having an unknown characteristic can be obtained. The first image can be provided to a plurality of user devices in a verification challenge. The verification challenge can include one or more instructions to be presented to a user of each user device. The instructions being determined based at least in part on the first image. User responses can be received, and an unknown characteristic of the first image can be determined based at least in part on the received responses. Subsequent to determining the unknown characteristic of the first image, one or more machine learning models can be trained based at least in part on the determined characteristic.Type: GrantFiled: December 3, 2015Date of Patent: September 12, 2017Assignee: Google Inc.Inventors: Wei Liu, Vinay Damodar Shet, Ying Liu, Aaron Malenfant, Haidong Shao, Hongshu Liao, Jiexing Gu, Edison Tan
-
Patent number: 9753865Abstract: The present disclosure relates systems and methods for executing an encrypted code section in a shieldable CPU memory cache. Functional characteristics of the software product of a vendor, such as gaming or video, may be partially encrypted to allow for protected and functional operability and avoid hacking and malicious usage of non-licensed user. The encrypted instructions may be written to the CPU memory cache and decrypted only once the CPU memory cache is switched into a shielded state. The decrypted code instructions may be executed from a designated cache-line of said CPU memory cache still in the shielded state.Type: GrantFiled: September 12, 2016Date of Patent: September 5, 2017Assignee: TRULY PROTECT OYInventors: Michael Kiperberg, Amit Resh, Nezer Zaidenberg
-
Patent number: 9756048Abstract: The present disclosure relates to systems and methods for enabling execution of encrypted managed programs in common managed execution environments. In particular the disclosure relates to method of loading and associating an extension module to the managed execution environment configured to receive execution event notifications. The events corresponding to the execution of encrypted methods are intercepted and passed on to a decryption module operable to execute within an hypervisor environment, such that the managed encrypted program is decrypted, executed in a secured location, preventing access of untrusted party. The decryption module is further configured to discard decrypted instruction if cooperation of the extension module is required, or upon program termination.Type: GrantFiled: November 11, 2015Date of Patent: September 5, 2017Assignee: TRULY PROTECT OYInventors: Michael Kiperberg, Amit Resh, Nezer Zaidenberg
-
Patent number: 9756050Abstract: Authorization decisions can be made in a resource environment using authorization functions which can be provided by customers, third parties, or other such entities. The functions can be implemented using virtual machine instances with one or more transient compute containers. This compute capacity can be preconfigured with certain software and provided using existing compute capacity assigned to a customer, or capacity invoked from a warming pool, to execute the appropriate authorization function. The authorization function can be a lambda function that takes in context and generates the appropriate security functionality inline. The utilization of ephemeral compute capacity enables the functionality to be provided on demand, without requiring explicit naming or identification, and can enable cause state information to be maintained for a customer.Type: GrantFiled: March 26, 2015Date of Patent: September 5, 2017Assignee: Amazon Technologies, Inc.Inventor: Eric Jason Brandwine
-
Patent number: 9754209Abstract: A method is used in managing knowledge-based authentication systems. Questions are created from organization based information. The questions are evaluated based on a set of parameters. Based on the evaluation, a set of questions is selected from the questions and a set of responses is selected for each question of the set of questions for a scenario. A user is authenticated in the scenario using the set of questions.Type: GrantFiled: September 27, 2012Date of Patent: September 5, 2017Assignee: EMC IP Holding Company LLCInventors: Boris Kronrod, Ido Zilberberg
-
Patent number: 9749359Abstract: According to one embodiment, an apparatus includes a memory and a processor. The memory is configured to store a plurality of phishing scores, each phishing score of the plurality of phishing scores indicating a likelihood that a user will delete a phishing email. The processor is configured to determine that a plurality of phishing campaigns are occurring. For each phishing campaign of the plurality of phishing campaigns, the processor is configured to determine that a plurality of users deleted a phishing email of the phishing campaign and to determine a priority score for the phishing campaign based on the phishing score of each user of the plurality of users. The processor is further configured to rank the plurality of phishing campaigns based on the priority score of each phishing campaign, wherein the phishing campaign of the plurality of phishing campaigns with the highest rank is presented first.Type: GrantFiled: July 22, 2015Date of Patent: August 29, 2017Assignee: Bank of America CorporationInventor: Benjamin L. Gatti
-
Patent number: 9740920Abstract: The disclosed computer-implemented method for securely authenticating users via facial recognition may include (1) identifying a request from a user to complete an authentication process on the computing device via a facial-recognition system, (2) sending the user a randomized unique identifier to display to a camera on the computing device, (3) simultaneously observing, via the camera on the computing device, both the user and the randomized unique identifier that was sent to the user, and (4) authenticating the observed user in response to determining both that the observed user's facial characteristics match facial characteristics of the user stored in the facial-recognition system and that the observed randomized unique identifier matches the randomized unique identifier sent to the user. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 10, 2015Date of Patent: August 22, 2017Assignee: Symantec CorporationInventors: Andrew Chang, Ilya Sokolov
-
Patent number: 9742809Abstract: A system and method for authentication policy orchestration may include a user device, a client device, and a server. The server may include a network interface configured to be communicatively coupled to a network. The server may further include a processor configured to obtain, from a client device via the network, a transaction request for a transaction, determine an authorization requirement for the transaction request based, at least in part, on a plurality of authorization policies, individual ones of the plurality of authorization policies being separately configurable by at least one of a relying party and an authorizing party, and complete the transaction based on the authorization requirement having been met.Type: GrantFiled: August 22, 2016Date of Patent: August 22, 2017Assignee: ACCEPTTO CORPORATIONInventors: Nahal Shahidzadeh, Haitham Akkary
-
Patent number: 9742641Abstract: A monitoring device and method for identifying the identity of users requesting database accesses. The data request from application servers to an application server are monitored and parsed. The SQL statements associated with the data request from the application server are also monitored and parsed, so are the SQL responses from the database server. The SQL responses are sent back to the user as data responses. The data responses are also monitored and parsed. The monitoring device matches the parsed data request with the parsed SQL statements, the parsed SQL responses, and the parsed data responses. By matching the string portion of these parsed data, the monitoring device can then identity the identity of the user making such data base request.Type: GrantFiled: January 13, 2014Date of Patent: August 22, 2017Assignee: Datiphy Inc.Inventor: Yeejang James Lin
-
Patent number: 9740848Abstract: A method for authentication of a user to a device by a remote server comprises a remote server initiates a local procedure on the device that causes the user to perform an act, wherein the act is observed by the device, and further wherein the act involves relative movement between the user and a camera, where fiducial marks are captured, and information transmitted to the server for the server to make a determination of whether to authorize the user to the device.Type: GrantFiled: March 15, 2017Date of Patent: August 22, 2017Assignee: BRIVAS LLCInventors: Beau Robertson Parry, Yasodenkshna Boddeti
-
Patent number: 9743333Abstract: A server coupled to wireless transceivers wirelessly communicating user data on corresponding ones of a plurality of wireless local area networks (WLAN) is disclosed. The server comprises: a memory, and a processor. The memory to store executable instructions. The processor is coupled with the memory, wherein the processor, responsive to executing the executable instructions, performs operations comprising: identifying wireless transceivers and access privileges requested by each of a plurality of WiFi service vendors; opening a control portal between each WiFi service vendor and the corresponding wireless transceivers identified in the identifying act; and arbitrating access by each WiFi service vendor to the corresponding identified wireless transceivers to avoid interruption of the wireless user data communications on corresponding ones of the WLANs.Type: GrantFiled: April 1, 2017Date of Patent: August 22, 2017Assignee: Quantenna Communications, Inc.Inventors: Huizhao Wang, Hossein Dehghan
-
Patent number: 9736148Abstract: In a method of approving access to a server network from any terminal requesting access, a communication request is sent from the terminal to a server on a first communication path. An image containing a series of symbols is communicated to the user on a communication path different from the first path. From the image the user calculates a response based upon a particular pattern in the image defining certain symbols which are then used in an operation to determine from the symbols a response which is different from the symbols. A comparison is made between the response received and a previously stored response to assess whether access should be allowed.Type: GrantFiled: August 7, 2015Date of Patent: August 15, 2017Assignee: Passrules US Security LLPInventor: Ken Kotowich
-
Patent number: 9727771Abstract: A touch device with fingerprint identification function includes a glass substrate having a first and a second face, a first electrode layer having multiple first electrodes, an insulation layer, a second electrode layer having multiple second electrodes, a wiring layer, a film layer covering the second electrode layer and the wiring layer, and a fingerprint identification sensation layer having multiple fingerprint identification chips and multiple transmission leads. The first face is defined with a touch section and a non-touch section. The first electrode layer is disposed on the second face. One face of the insulation layer covers the first electrode layer. The second electrode layer is disposed on the other face of the insulation layer. The wiring layer is disposed at the non-touch section and selectively electrically connected to the first and second electrode layers. The touch device is able to lower manufacturing cost and enhance fingerprint identification precision.Type: GrantFiled: April 14, 2015Date of Patent: August 8, 2017Inventor: Chih-Chung Lin
-
Patent number: 9729533Abstract: There is provided a system and method for human verification by a contextually iconic visual public Turing test. There is provided a method comprising receiving a request to verify whether a client is human controlled, selecting, by contextual criteria, a plurality of images each having one or more associated tags from a database, generating a challenge question and a corresponding answer set based on associated tags of a subset of the plurality of images, presenting the plurality of images and the challenge question to the client, receiving a submission to the challenge question from the client, and responding to the request by verifying whether the submission is contained in the answer set to determine whether the client is human controlled. The contextual criteria may comprise subject matter, branding, or intended audience of a content provider sending the request, thereby facilitating human responses while deterring automated systems.Type: GrantFiled: December 24, 2014Date of Patent: August 8, 2017Assignee: Disney Enterprises, Inc.Inventors: David Snelling, Brian Grutzius, Scott Thompson, Adam T. Fritz
-
Patent number: 9727517Abstract: In a wireless docking system a dockee device (120) communicates with a host device (100) that is coupled to at least one peripheral (110, 111, 112). The host device has a host communication unit (102) and a docking processor (101) arranged for docking at least one dockee device. The dockee device has a dockee communication unit (121), and a dockee processor (122) for docking to the host device. The dockee processor is arranged for providing at least one virtual peripheral device in a virtual docking environment, the virtual peripheral device having a privacy level. When docking, the virtual peripherals are mapped on actual peripherals so as to apply the privacy level to the actual peripheral. When docked, data transfer with the actual peripheral is controlled according to the respective peripheral privacy level.Type: GrantFiled: April 11, 2014Date of Patent: August 8, 2017Assignee: KONINKLIJKE PHILIPS N.V.Inventors: Dirk Valentinus Rene Engelen, Jente De Pee, Gerardus Henricus Adrianus Johannes Broeksteeg, Annemarie Paulien Buddemeijer-Lock, Tess Speelpenning
-
Patent number: 9729573Abstract: According to one embodiment, an apparatus is configured to store a plurality of phishing scores, each phishing score of the plurality of phishing scores indicating a likelihood that a user will respond to a phishing email The apparatus is communicatively coupled to the memory and is configured to determine that a plurality of phishing campaigns are occurring. For each phishing campaign of the plurality of phishing campaigns, the apparatus is configured to determine that a plurality of users responded to the phishing campaign and to determine a priority score for the phishing campaign based on the phishing score of each user of the plurality of users. The apparatus is further configured to rank the plurality of phishing campaigns based on the priority score of each phishing campaign, wherein the phishing campaign of the plurality of phishing campaigns with the highest rank is reviewed first.Type: GrantFiled: July 22, 2015Date of Patent: August 8, 2017Assignee: Bank of America CorporationInventor: Benjamin L. Gatti
-
Patent number: 9723039Abstract: Access to a user profile of a user device at a location may be provided to a destination device upon detecting that the location is within a proximity of a destination location. An expiring token may be generated, associated with the user profile, and communicated to the second device. Access to the user profile provided to the destination device may be terminated upon an expiration of the expiring token.Type: GrantFiled: January 9, 2017Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Lisa Seacat DeLuca, Lydia M. Do, Geetika T. Lakshmanan
-
Patent number: 9723011Abstract: Access to a user profile of a user device at a location may be provided to a destination device upon detecting that the location is within a proximity of a destination location. An expiring token may be generated, associated with the user profile, and communicated to the second device. Access to the user profile provided to the destination device may be terminated upon an expiration of the expiring token.Type: GrantFiled: January 9, 2017Date of Patent: August 1, 2017Assignee: International Business Machines CorporationInventors: Lisa Seacat DeLuca, Lydia M. Do, Geetika T. Lakshmanan
-
Patent number: 9715621Abstract: Systems and methods for real-time user verification in online education are disclosed. In certain example embodiments, user identifying information associated with a user and a request to access online education content may be received from a user device. A face template including historical facial image data for the user can be identified. Current facial image data can be compared to the face template to determine if a match exists. Biometric sensor data, such as heart rate data, may also be received for the user. The biometric sensor data may be evaluated to determine if the user is currently located at the user device. If the user is currently located at the user device and the current facial image data matches the face template, access to the online education content may be provided to the user at the user device.Type: GrantFiled: December 22, 2014Date of Patent: July 25, 2017Assignee: MCAFEE, INC.Inventors: Ansuya Negi, Igor Tatourian
-
Patent number: 9712526Abstract: Systems and methods are provided for social networks that can verify that enrolled users are not misrepresenting facts about themselves such as age and gender. Verification can be performed, for example, by reference to biometric templates stored during the user enrollment process. The biometric templates can also be used to authenticate users logging into the social network to prevent user impersonation. The ability of some users to communicate to other users of the social network can be limited to only certified users, and even to those certified users that match a criterion, such as gender or age.Type: GrantFiled: April 4, 2016Date of Patent: July 18, 2017Assignee: IDEFEND LTD.Inventor: Paul Headley
-
Patent number: 9706010Abstract: Implementations of the disclosure describe systems and methods for triggering user notifications of media content items. It is determined that a plurality of media content items has a value of an interest metric exceeding a defined threshold value. The plurality of media content items are represented by a list of media content items compiled based on a pre-defined criterion. The interest metric reflects interest of a user to the plurality of media content items. The plurality of media content items is provided by a content channel that has not been subscribed to by the user. Among the plurality of media content items, a media content item that has not been consumed by the user is selected. A notification is provided to a device employed by the user to notify the user of the media content item.Type: GrantFiled: April 25, 2016Date of Patent: July 11, 2017Assignee: GOOGLE INC.Inventors: Justin Lewis, Ruxandra Georgiana Paun
-
Patent number: 9705882Abstract: The present invention discloses methods and systems for managing a node through a management server. The management server verifies whether a management confirmation has been received and allows a second user group to manage the node if the management confirmation is received. If the management confirmation is not received by the management server, the second user group is not allowed to manage the node through the management server.Type: GrantFiled: June 13, 2014Date of Patent: July 11, 2017Assignee: PISMO LABS TECHNOLOGY LIMITEDInventors: Ho Ming Chan, Kit Wai Chau
-
Patent number: 9704203Abstract: Methods for providing a privacy setting for a target user in a social network utilizing an electronic computing device are presented, the method including: causing the electronic computing device to retrieve a current privacy setting for a common profile item, where the common profile item corresponds with the target user and each of a number of users, and where the common profile item is one of a number of common profile items; causing the electronic computing device to calculate a common profile item sensitivity value for the common profile item based on the current privacy setting; causing the electronic computing device to calculate a common profile item visibility value for the common profile item based on the a current privacy setting and the sensitivity value for the common profile item; and causing the electronic computing device to calculate the privacy score of the target user.Type: GrantFiled: July 31, 2009Date of Patent: July 11, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tyrone W. A. Grandison, Sherry Guo, Kun Liu, Michael Maxmilien, Dwayne L. Richardson, Tony Sun
-
Patent number: 9699194Abstract: A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules.Type: GrantFiled: December 23, 2016Date of Patent: July 4, 2017Assignee: Numecent Holdings, Inc.Inventors: Arthur S. Hitomi, Robert Tran, Peter J. Kammer, Doug Pfiffner, Huy Nguyen
-
Patent number: 9699173Abstract: The management of credentials subject to a lockout policy can include dynamically determining appropriate lockout thresholds and other such values appropriate for a current situation. For example, the number of incorrect password attempts allowed before an account lockout can be based at least in part upon the amount of time that has passed since a most recent password change. There might be an unlimited number of attempts allowed for a short period after a password change, followed by a decreasing number of permissible attempts over a subsequent period of time. In some embodiments the number of correct attempts received after a password change can affect the number of incorrect attempts allowed. Further, if an incorrect attempt matches a previously correct password then that attempt might not count toward the number of incorrect attempts compared against the threshold, at least for a determined period of time after a password change.Type: GrantFiled: May 22, 2015Date of Patent: July 4, 2017Assignee: AMAZON TECHNOLOGIES, INC.Inventor: Gregory Branchek Roth
-
Patent number: 9697035Abstract: A virtual basic input output system can be selected from different virtual basic input output systems. The selection of the virtual basic input output system is by a controller and the selection can be based on information about a software stack.Type: GrantFiled: February 3, 2016Date of Patent: July 4, 2017Assignee: Hewlett-Packard Development Company, L.P.Inventor: James M. Mann
-
Patent number: 9690923Abstract: The present invention relates to the technical field of computer technologies. Disclosed are a verification method, apparatus and system. The method comprises: responding to a verification request sent by a terminal, and randomly selecting an image combination from pre-generated multiple image combinations; merging images in the image combination according to a preset merging mode, processing a merged image according to a second processing mode, and generating a verification code; sending the verification code and a verification question associated with the image combination to the terminal; and receiving a verification result returned by the terminal, and performing verification according to the verification result, the terminal performing image cutting on the verification code, the verification result being generated by the terminal according to a received verification answer, and the verification answer being selected from the cut verification code. The present invention improves the security.Type: GrantFiled: October 24, 2014Date of Patent: June 27, 2017Assignee: Tencent Technology (Shenzhen) Company LimitedInventor: Liang Huang
-
Patent number: 9693097Abstract: A system that incorporates the subject disclosure may perform, for example, generating parental control information for each of a plurality of users according to options selected from a plurality of media program tags retrieved from a library, detecting a first user of the plurality of users according to biometric information of the first user, identifying the parental control information associated with the first user, tuning to a first media channel responsive to receiving a first request, receiving in the first media channel a first media program tag associated with a first media program, and enabling presentation of the first media program at a presentation device responsive to detecting from the parental control information associated with the first user that the first media program tag is included in a first list of unrestricted media program presentations. Other embodiments are disclosed.Type: GrantFiled: March 7, 2016Date of Patent: June 27, 2017Assignee: AT&T Mobility II LLCInventors: Sheldon Kent Meredith, Jeremy Fix, Mario Kosseifi
-
Patent number: 9691062Abstract: Systems and methods are disclosed which may allow a merchant to wirelessly transmit accepted forms of payment using a beacon installed in the merchant location or near the merchant location. A consumer having a device capable of receiving the wireless transmission may receive the accepted forms of payment and have them displayed on a screen of the device. The device may also send the accepted forms of payment to a remote server that has issued the consumer a programmable credit card such that the remote server can program the credit card based on the forms of payment accepted by the merchant.Type: GrantFiled: April 8, 2014Date of Patent: June 27, 2017Assignee: PAYPAL, INC.Inventor: John Hastings Granbery
-
Patent number: 9692879Abstract: An apparatus includes a memory of a mobile compute device, and a hardware processor of the mobile compute device. The hardware processor is configured to implement an operating system and an authentication module. The operating system is configured to receive a first authentication identifier, and is also configured to authorize use of the mobile compute device based on the first authentication identifier meeting a first criterion. The authentication module is configured to, in response to the operating system authorizing use of the mobile compute device, disable at least one function of the mobile compute device and request a second authentication identifier. The authentication module is also configured to receive the second authentication identifier. The authentication module is also configured to enable the at least one function in response to the second authentication identifier meeting a second criterion.Type: GrantFiled: May 20, 2015Date of Patent: June 27, 2017Assignee: Invincea, Inc.Inventor: Michael Nathan Lack
-
Patent number: 9674205Abstract: Methods and systems for verifying the identity and trustworthiness of a user of an online system are disclosed. In one embodiment, the method comprises receiving online and offline identity information for a user and comparing them to a user profile information provided by the user. Furthermore, the user's online activity in a third party online system and the user's offline activity are received. Based on the online activity and the offline activity a trustworthiness score may be calculated.Type: GrantFiled: February 15, 2016Date of Patent: June 6, 2017Assignee: Airbnb, Inc.Inventors: Stephen Kirkham, Michael Lewis
-
Patent number: 9665441Abstract: A method/system for removing redundancy in packets is disclosed. In one embodiment, for each of the sets of one or more consecutive bytes within the packet, the method divides the one or more consecutive bytes into a plurality of non-overlapping, consecutive segments; generates a segment feature for each of the plurality of non-overlapping, consecutive segments through application of a plurality of cryptographic hash functions with different random seeds; generates a single duplication feature based on a combination of the segment features for the plurality of non-overlapping, consecutive segments; and generates a single compressed string when a predetermined condition is met, based on a comparison of the single duplication feature and a set of stored duplication features. The method continues with sending the resulting strings in place of the packet toward the packet's destination.Type: GrantFiled: December 22, 2014Date of Patent: May 30, 2017Assignee: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Ritesh Kolte, Himanshu Asnani, Mustafa Arisoylu