Policy Patents (Class 726/1)
  • Patent number: 9871798
    Abstract: A mail server operative to communicate with external recipients via a gateway to external communication network/s; and to communicate with internal recipient/s including pupil end-users via an internal secured network. Associations between individual parents who are nodes in external communication network/s and pupil end-users; and white-lists of authorized communicants for individual pupil end-users, are stored. A whitelist provided to memory for a first pupil end-user includes a second pupil, if and only if the first and second pupils' parents have both, via respective parent user-interfaces, authorized communication between the first and second pupils.
    Type: Grant
    Filed: June 16, 2016
    Date of Patent: January 16, 2018
    Assignee: GOOGALE (2009) LTD.
    Inventor: Nir Michalowitz
  • Patent number: 9871765
    Abstract: Various exemplary embodiments relate to a method performed by a DIAMETER network node, the method including: receiving a first DIAMETER message; determining that the first DIAMETER message is not trusted; and rejecting the first DIAMETER message.
    Type: Grant
    Filed: September 4, 2012
    Date of Patent: January 16, 2018
    Assignee: Alcatel Lucent
    Inventors: Robert A. Mann, Eric Colaviti
  • Patent number: 9870477
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: January 16, 2018
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 9871802
    Abstract: A social networking system maintains a limited user profile associated with a user of the social networking system who does not satisfy one or more criteria for the social networking system to maintain a user profile. The limited user profile includes information describing the user and allows the user to be associated with limited types of interactions with the social networking system. An administrator is associated with the limited user profile and may modify information associated with the limited user profile as well as authorize or deny interactions involving the limited user profile. When the user satisfies criteria for the social networking system maintaining a user profile, the social networking system generates a user profile based on information in the limited user profile and prior interactions involving the limited user profile.
    Type: Grant
    Filed: September 27, 2016
    Date of Patent: January 16, 2018
    Assignee: Facebook, Inc.
    Inventors: Benjamin Michael Holson, Dan Barak
  • Patent number: 9871888
    Abstract: A mobile device includes a processor and a non-transitory computer-readable medium storing instructions. The instructions include, in response to a state of a first application being instantiated from a first state template of the first application, selecting a first function module identifier from a plurality of predetermined function module identifiers. Each predetermined function module identifier corresponds to a first function offered by the first state template. The instructions include transmitting a function module request to a developer exchange system using a wireless transceiver. The function module request includes the first function module identifier, which uniquely identifies a first function module. The instructions include receiving the first function module from the developer exchange system, storing and executing the first function module, and presenting display data generated by execution of the first function module.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: January 16, 2018
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Manikandan Sankaranarasimhan, Kalyan Desineni
  • Patent number: 9866603
    Abstract: In an example, a processing device is provided. The processing device may be configured to determine whether to send a first version of a stream manifest corresponding to a received a selection of one of a plurality of stream variants of a video content asset. The processing device may be configured to, in response to determining to not send the first version, send a second different version of the stream manifest. In an example, the first version includes only a subset of a plurality of entries included in the second version and/or a bootstrap current media time that is different than an actual current media time.
    Type: Grant
    Filed: March 24, 2014
    Date of Patent: January 9, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Gary Thomas Hertel, Greg Kenneth Truax, Michael Vidyadhar Kale
  • Patent number: 9858608
    Abstract: Query suggestions are provided using a query log including a number of user sessions that comprise training data. The training data includes a sequence of a plurality of sets of queries, some of the sets of queries including query transitions followed by a purchase related event. From a cleaned and normalized query log stationary scores and transition scores of at least some of the plurality of sets are generated. A set of query suggestions is built and similarity scores are computed for at least some of the set of query suggestions to determine whether individual ones of the at least some of the set of query suggestions meet a predetermined assurance level. Those that meet the assurance level are included as elements of the set of query suggestions. The set of query suggestions is mixed and ranked according to a user behavior that is sought to be influenced.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: January 2, 2018
    Assignee: eBay Inc.
    Inventors: Mohammad Al Hasan, Nishith Parikh, Gyanit Singh, Neelakantan Sundaresan, Brian Scott Johnson, Udayan Khurana
  • Patent number: 9858409
    Abstract: A mobile device includes a pre-authentication mechanism that allows a user to define a pre-authentication sequence that includes actions such as movement of the device, taps on the screen, key presses, etc., or any suitable combination of these. Correctly entering the pre-authentication sequence gives the user access to the main authentication screen for the device, while a failure to enter the pre-authentication sequence correctly keeps the device locked. Multiple pre-authentication sequences can be defined, each having a corresponding sleep time threshold. This requires the user to enter the appropriate authentication information corresponding to the time the device has been asleep. Multiple pre-authentication sequences can also be defined, each having corresponding authentication information. Thus, the authentication information the user needs to enter can be a function of the corresponding pre-authentication sequence.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Gregory J. Boss, Andrea del Pilar Macias Garcia, Diego Xirinachs Jimenez, Stephen J. McConnell, Piotr Pierga, Stacey Ramos
  • Patent number: 9858431
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include defining, for a data masking engine executing in a platform as a service (PaaS) based software environment, one or more data masking rules. Upon detecting, by the data masking engine, data processed by a software application executing within the PaaS based software environment and in accordance with a given data masking rule, the data masking engine can perform a data masking operation on the data.
    Type: Grant
    Filed: November 1, 2015
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Coporation
    Inventors: Ariel Farkash, Igor Gokhman, Abigail Goldsteen, Micha Moffie
  • Patent number: 9860137
    Abstract: A method and corresponding system to help facilitate the application of service policy rules for client devices while reducing the amount of signaling between network entities is disclosed. In accordance with one example, the wireless network may evaluate the extent to which the service policy rules defined by the UE's service profile have been applied by the wireless network. Based on this evaluating, the network may identify a subset of service policy rules that have been applied to greater than a threshold extent by the network for the given UE. And in response to this identifying, the network may cause the PDP to provision the PEP, with the subset of service policy rules, rather than provision the PEP with every possible service policy rule. As a result, the PDP and PEP may refrain from engaging in excess signaling, and the wireless network, in turn, may enjoy reduced congestion.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: January 2, 2018
    Assignee: Sprint Spectrum L.P.
    Inventors: Lyle T. Bertz, Mark Bales
  • Patent number: 9851984
    Abstract: Example methods, apparatus and articles of manufacture to update virtual machine templates are disclosed. A disclosed example method to update a virtual machine template (105) includes updating a management policy (110), starting a virtual machine (116) based on the virtual machine template (105) in a network cordoned sandbox (170), triggering the virtual machine (116) to update per the updated management policy (110), and saving the virtual machine (116) as an updated virtual machine template (106).
    Type: Grant
    Filed: May 12, 2010
    Date of Patent: December 26, 2017
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventor: Paul Kennedy
  • Patent number: 9852304
    Abstract: A method for controlling copyright permissions when assembling multiple copyrighted works into a compiled file. The copyright permission level of each file is analyzed, either based on the copyright permission information present in metadata associated with the file or based on the digital file format of the file which reflects the permission level. The compiled file is assigned a permission level which is the same as or more restrictive than all of the permission level of the files in the compilation, and is generated in a format that enforces the assigned permission level. A notification may be displayed to the user to notify the use of the permission level assigned to the compiled file.
    Type: Grant
    Filed: May 7, 2015
    Date of Patent: December 26, 2017
    Assignee: KONICA MINOLTA LABORATORY U.S.A., INC.
    Inventor: Toshiro Fujimori
  • Patent number: 9842206
    Abstract: Detecting computer anomalies by determining probabilities of encountering call stack configurations at various depths, the call stacks being associated with software application instances on computers having the same operating system, where snapshots of the call stacks are recorded on the computers responsive to detecting predefined software application events, determining entropies of call stack configurations at various call stack depths using their associated probabilities, determining stack frame rarity scores of call stack configurations at various depths based on their associated stack frame entropies in accordance with a predefined rarity function, determining a call stack rarity score of any given call stack configuration as the maximum stack frame rarity score of the given configuration, and detecting an anomaly associated with any given one of the computers where any of the snapshots recorded on the given computer is of a call stack whose call stack rarity score meets a predefined anomaly condition.
    Type: Grant
    Filed: November 22, 2015
    Date of Patent: December 12, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ron Peleg, Amir Ronen, Tamer Salman, Shmuel Regev, Ehud Aharoni
  • Patent number: 9842220
    Abstract: In one embodiment, a method is performed by a computer system. The method includes receiving a request from a user to access particular content. The method further includes determining a trust measure of the user, wherein the trust measure is based, at least in part, on an analysis of logged user-initiated communication events of the user on a plurality of communications platforms. In addition, the method includes accessing a self-service access policy applicable to the particular content. Further, the method includes ascertaining, from the self-service access policy, a trust threshold applicable to the particular content. Moreover, the method includes, responsive to a determination that the trust measure fails to satisfy the trust threshold, automatically denying access by the user to the particular content.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: December 12, 2017
    Assignee: Dell Software Inc.
    Inventors: Michel Albert Brisebois, Curtis T. Johnstone, Olivier Le Rudulier
  • Patent number: 9842218
    Abstract: In one embodiment, a method includes receiving a request from a user to access particular content. The method also includes determining at least one topic of the particular content. In addition, the method includes determining one or more need-to-access values for the user in relation to the particular content, wherein the one or more need-to-access values are based, at least on in part, on a comparison of the least one topic to one or more topics associated with logged user-initiated communication events of the user. Further, the method includes accessing a self-service access policy applicable to the particular content. Also, the method includes ascertaining, from the self-service access policy, need-to-access criteria applicable to the particular content. Additionally, the method includes, responsive to a determination that the one or more need-to-access values fail to satisfy the need-to-know criteria, denying access by the user to the particular content.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: December 12, 2017
    Assignee: Dell Software Inc.
    Inventors: Michel Albert Brisebois, Curtis T. Johnstone, Olivier Le Rudulier
  • Patent number: 9836608
    Abstract: Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: December 5, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paolina Centonze, Yinnon Avraham Haviv, Roee Hay, Marco Pistoia, Adi Sharabani, Omer Tripp
  • Patent number: 9838431
    Abstract: A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., “high security”) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.
    Type: Grant
    Filed: November 28, 2014
    Date of Patent: December 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Nataraj Nagaratnam, Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi
  • Patent number: 9838957
    Abstract: Some demonstrative embodiments include devices, systems and methods of selecting a mobility mode of a User Equipment (UE). For example, a UE may include a Wireless Local Area Network (WLAN) transceiver; a cellular transceiver to communicate with a cellular node; an Access Network Discovery and Selection Function (ANDSF) client module to communicate with an ANDSF server; and a controller to select a WLAN mobility mode from a cellular/WLAN aggregation mode and an ANDSF mode.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: December 5, 2017
    Assignee: INTEL CORPORATION
    Inventors: Alexander Sirotkin, Jing Zhu, Nageen Himayat
  • Patent number: 9830228
    Abstract: A discovery is made of an object to be backed up on a storage array of a client. An object mapping is generated that maps the object to a LUN of the storage array where the object is located. The object mapping is stored at a backup server. A snapshot of the storage array is obtained. The object mapping is reviewed to identify on the snapshot the object to be backed up and the object is backed up to a backup storage unit.
    Type: Grant
    Filed: October 1, 2015
    Date of Patent: November 28, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Shelesh Chopra, John Rokicki, Vladimir Mandic
  • Patent number: 9830437
    Abstract: Technologies are generally described for an automatic log-in function control scheme. In some examples, a method performed under control of an end device may include detecting, from the end device, input of one or more passcodes to access the end device; determining that a user of the end device is not an authorized user based at least in part on a detected behavioral pattern in connection with the input of the one or more passcodes; and disabling an automatic log-in function of at least one application that is hosted on the end device.
    Type: Grant
    Filed: August 8, 2013
    Date of Patent: November 28, 2017
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Seungil Kim
  • Patent number: 9832283
    Abstract: Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device. The method also includes initiating, by the first device to a controller within the network, a transmission of second information for association of third information indicative of the functional classification of the function of the second device with fourth information generated by the second device. The functional classification of the function of the second device is associated with potential impact of failure of the second device.
    Type: Grant
    Filed: November 23, 2016
    Date of Patent: November 28, 2017
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Jason Godfrey, Jennifer Morovitz, Toby Bearden
  • Patent number: 9832186
    Abstract: A method may include sending, by a client device, an access request to an authentication server device. The access request may include a request to access an administered resource. The method may include in response to the client device not complying with an administrative policy associated with the administered resource, receiving, from the authentication server device, one or more instructions regarding installation of a client application, receiving, by the client device, a client application in accordance with the instructions, and installing the client application on the client device.
    Type: Grant
    Filed: April 20, 2017
    Date of Patent: November 28, 2017
    Assignee: Google LLC
    Inventors: Li Yin, Param Reddappagari, Mayur Kamat, Zhengping Zuo, Hong Zhang
  • Patent number: 9824210
    Abstract: A method involves measuring and monitoring usage of data stored on a user device by software applications installed on the user device, the data being generated by resources of the user device. The method includes for each resource, assigning a resource sensitivity value, the resource sensitivity values of different resources being adapted to enable discrimination among resources based on sensitivity of the data they generate; for each application, calculating a respective application access level to the data by combining through a first predetermined function the resource sensitivity values of the resources that generate data accessed by the application; calculating a device access level to the data by the applications, the device access level being calculated by combining through a second predetermined function the calculated application access levels of the applications installed on the device; and associating with each application a respective indication of the calculated device access level.
    Type: Grant
    Filed: March 3, 2014
    Date of Patent: November 21, 2017
    Assignee: Telecom Italia S.p.A.
    Inventors: Fabrizio Antonelli, Andrea Cappellotto, Michele Caraviello
  • Patent number: 9817391
    Abstract: An industrial control system providing security against tampering or modification generates periodic state thumbprints defining a state of control elements that may be forwarded to a security or safety appliance for comparison to a benchmark thumbprint indicating no tampering. The transmitted state thumbprint may capture not only programs but also configuration and environmental states of the control element.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: November 14, 2017
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Sujeet Chand, David A. Vasko, Timothy Patrick Boppre, David A. Snyder, Alex Laurence Nicoll, Brian J. McMullen, Daniel B. Seger, John B. Dart, Timothy F. Roback, Paul G. Kucharski, Kevin Colloton
  • Patent number: 9819482
    Abstract: A Reconfigurable Key Search Engine (RKSE) in a mobile unit is adapted to efficiently search a memory system storing a plurality of security keys potentially related to multiple networks. The memory system may be a hierarchical memory system including at least one associative memory.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: November 14, 2017
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Tae Gon Park
  • Patent number: 9819690
    Abstract: Technologies are generally described for methods and systems effective to generate an alert in a data center. In some examples, a device may detect an execution of a virtual machine in the data center. The device may also analyze traffic data at a port that may be in the data center. The traffic data may be associated with a communication from the virtual machine to a destination address through the port. The device may also compare the destination address with a data center address of the data center. The device may also generate the alert based on the comparison.
    Type: Grant
    Filed: October 30, 2014
    Date of Patent: November 14, 2017
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventors: Guang Yao, Shijie Xu, Qi Li, Xuefeng Song
  • Patent number: 9817679
    Abstract: A technique for collecting financial information is described. During this technique, a customer request to a financial institution to access a financial-software application is used to initiate an exchange of financial information between the financial institution and a provider of the financial-software application. In particular, in response to the forwarded customer request, the provider of the financial-software application may request, and then receive, financial information associated with the customer's account from the financial institution. Subsequently, the provider of the financial-software application may provide a document that facilitates access to the financial-software application to the customer. This document may include at least some of the received financial information.
    Type: Grant
    Filed: August 10, 2009
    Date of Patent: November 14, 2017
    Assignee: INTUIT INC.
    Inventors: Yogish Pai, Thirugnanam Subbiah, Sunil Bannur Vittal, Richard M. Ng, Raghunath N. Battula, John P. Motz
  • Patent number: 9817971
    Abstract: Detecting computer anomalies by determining probabilities of encountering call stack configurations at various depths, the call stacks being associated with software application instances on computers having the same operating system, where snapshots of the call stacks are recorded on the computers responsive to detecting predefined software application events, determining entropies of call stack configurations at various call stack depths using their associated probabilities, determining stack frame rarity scores of call stack configurations at various depths based on their associated stack frame entropies in accordance with a predefined rarity function, determining a call stack rarity score of any given call stack configuration as the maximum stack frame rarity score of the given configuration, and detecting an anomaly associated with any given one of the computers where any of the snapshots recorded on the given computer is of a call stack whose call stack rarity score meets a predefined anomaly condition.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: November 14, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ron Peleg, Amir Ronen, Tamer Salman, Shmuel Regev, Ehud Aharoni
  • Patent number: 9813238
    Abstract: Examples of methods, systems, products, devices, and/or apparatus generally related to mobile security are described. An example method may include capturing a context pattern of a user device. The context pattern may be based, at least in part, on data from one or more sensors of the user device. The data may be acquired at multiple different times. The example method may further include generating at least one public-private key pair based, at least in part, on the context pattern.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: November 7, 2017
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Soma Biswas
  • Patent number: 9811278
    Abstract: A method, a system and an apparatus for predicting abnormalities are provided. A controller analyzes a plurality of command logs to obtain a predictive rule for accessing a storage device. The controller performs an anomaly detection for the command logs based on the predictive rule so as to obtain at least one command cluster. The controller establishes policy data corresponding to the predictive rule based on the command logs included in each command cluster, and sends the policy data to a data transmission interface coupled to the storage device. The data transmission interface obtains a processing action for a received data access command according to the policy data.
    Type: Grant
    Filed: October 27, 2015
    Date of Patent: November 7, 2017
    Assignee: Wistron Corporation
    Inventors: Chih-Ming Chen, Hsiao-Wen Tin
  • Patent number: 9811658
    Abstract: One example method includes executing a software application within the virtual machine environment; during execution of the software application, detecting one or more actions specified by a malicious application policy being performed by the software application within the virtual machine environment, the malicious application policy specifying one or more actions that will trigger video capture in the virtual machine environment executing the software application; and initiating capture of a video signal of the virtual machine environment in response to detecting the one or more actions specified by the malicious application policy.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: November 7, 2017
    Assignee: iboss, Inc.
    Inventors: Paul Michael Martini, Peter Anthony Martini
  • Patent number: 9811646
    Abstract: A method, a secure device and a computer program product for securely managing files. The method includes providing a secure device, where the secure device is protected by design against malicious software or malware and adapted to establish a connection to a server via a host, the host connected to the server through a telecommunication network, upon receiving a request for using a file stored on the secure device, processing the request at the secure device according to an updated use permission associated to the file, where the updated use permission is obtained by instructing at the secure device to establish a connection between the secure device and the server via the host and updating at the device the use permission associated to the file, according to permission data sent from the server through the established connection.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: November 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Michael Baentsch, Peter Buhler, Harold D Dykeman, Reto J Hermann, Frank Hoering, Michael P Kuyper-Hammond, Diego Alejandro Ortiz-Yepes, Thomas D Weigold
  • Patent number: 9813421
    Abstract: Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy comprising a respective resource and a respective permission for a respective action that can be performed by a user of the client device in regards to the resource. A first application, which is configured to store data in an encrypted repository on the client device, receives a request to open a resource. The first application determines that one of the policies prohibits access by the resource to the encrypted repository and, based thereon, selects a different second application to open the resource that does not have access to the encrypted repository. The second application then opens the resource.
    Type: Grant
    Filed: May 20, 2014
    Date of Patent: November 7, 2017
    Assignee: Box, Inc.
    Inventors: Benjamin J. Kus, Jeremy S. Spiegel, Jonathan S. Fan, Peter B. Loer
  • Patent number: 9811572
    Abstract: This disclosure describes systems, methods, and apparatus for expanding a row or column in an existing report, sourced from a relational database, where a column or row, respectively, of an opposite axis has already been expanded. Such a need often arises in reports sourced from a SQL database, and overcomes the storage-draining need to precompute all possible arrangements of data from the database prior to displaying the report. In some embodiments, a client can make a request for a multi-axis expansion, and a server can create filters for use in sub queries, one for each level of expansion in an axis of the report opposite to the axis where expansion is requested, the sub queries can be executed, results sets can be combined/formatted to form a new report, and the new report can be returned to the client for stitching into the existing report.
    Type: Grant
    Filed: March 21, 2017
    Date of Patent: November 7, 2017
    Assignee: INSIGHTSOFTWARE.COM INTERNATIONAL
    Inventors: Paul Duffy, Amir Kashani
  • Patent number: 9807061
    Abstract: A privacy server protects private information by substituting a token or an identifier for the private information. The privacy server recognizes that a communication includes private information and intercepts the communication. The privacy server replaces the private information with a random or pseudo-random token or identifier. The privacy server maintains the private information in a local database and associates the private information for a particular person with the token or identifier for that person.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: October 31, 2017
    Assignee: PEARSON EDUCATION, INC.
    Inventors: Richard Paul Hughes, Hong-Yu Chiang, Gregory Dean McFall, Perry Michael Spagnola
  • Patent number: 9798865
    Abstract: Systems and methods for binding content to pairing of a playback device and removable memory storage device are disclosed. In one embodiment, a method for requesting authorization to play content using a playback device and a removable memory storage device includes retrieving a coupon identifier from a removable memory storage device while it is attached to the playback device, generating a coupon code using the coupon identifier, sending a request for storefront token that includes a device match data token and an application identifier, receiving a storefront token associated with a storefront identifier where the storefront identifier identifies a storefront application, sending a request for ticket token that includes the coupon code, the storefront identifier, and a content identifier that identifies the content, sending a request for license file that includes the ticket token, and receiving a license file that grants playback rights to the piece of content.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: October 24, 2017
    Assignee: Sonic IP, Inc.
    Inventors: Hans Andreas Baumgartner, Mayur Srinivasan, Jason Braness
  • Patent number: 9796391
    Abstract: A user device may be used to prevent a user from driving a vehicle while distracted by the user device. The user device may create a user profile, determine whether the user is driving, and collect usage data while the user is driving. The user profile may include information regarding the driver's propensity to be distracted while driving and the usage data may include information on whether the user is actually distracted by the user device. The user device may determine whether the driver is distracted based on the user profile and the usage data, and may respond in one or more ways, such as by alerting the driver with an audio signal, disabling a feature of the user device, logging instances of user distraction with a diagnostics device, activating a braking system of the vehicle, warning nearby drivers about the driver being distracted, and more.
    Type: Grant
    Filed: October 13, 2014
    Date of Patent: October 24, 2017
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Brian Olson, Steven R. Rados, Kent W. Hughes, Kumar Sanjeev, Donna L. Polehn, David Chiang, Nithya Krishnaswamy
  • Patent number: 9798529
    Abstract: A computer readable medium including computer readable code for causing a computer system to perform a method. The method includes receiving an application, receiving application information for the application, and determining an access privilege for the application based, in part, on the application information. The method also includes generating a deployment package for the application using the application and the access privilege, and publishing the application.
    Type: Grant
    Filed: May 24, 2010
    Date of Patent: October 24, 2017
    Assignee: ORACLE AMERICA, INC.
    Inventors: Bernard A. Traversat, James A. Gosling, Michael J. Duigou, Henry Jen, Mohamed M. Abdelaziz, Brian Goetz
  • Patent number: 9800586
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application.
    Type: Grant
    Filed: September 16, 2016
    Date of Patent: October 24, 2017
    Assignee: salesforce.com, inc.
    Inventors: Thomas Nabiel Boulos, Prasanta Kumar Behera
  • Patent number: 9800692
    Abstract: Expression based declarative data service execution chaining is disclosed. In various embodiments, an indication is received that a first data service has returned a result indicating the first data service has been invoked successfully. An expression is evaluated, based at least in part on the result. A second data service is invoked based at least in part on an outcome of the evaluation of the expression.
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: October 24, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Roshan Prakash Salvi, Ramkumar Ganesan, Sachin G. Totale, Swati Bhatia
  • Patent number: 9800574
    Abstract: Methods, apparatus, and systems for generating and verifying one time passwords in connection with a risk assessment are disclosed. The risk assessment may comprise a client-side risk assessment. The risk assessment may also comprise a server-side risk assessment.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: October 24, 2017
    Assignee: VASCO Data Security, Inc.
    Inventors: Guillaume Teixeron, Sebastien Lavigne
  • Patent number: 9792458
    Abstract: System and method to provide access to protected data for a communication terminal, the system including: a publisher database configured to store protected data in encrypted form; a first server coupled to the publisher database; a second server coupled to the first server, the second server configured to provide a cryptographically strong authentication of access to the protected data; an interface to a first secure channel, between the first server and the communication terminal; and an interface to a second secure channel, between the first server and a customer application, wherein the first server is configured to exchange protected data with the communication terminal via the first secure channel, and to exchange protected data with the customer application via the second secure channel.
    Type: Grant
    Filed: May 5, 2014
    Date of Patent: October 17, 2017
    Assignee: IMS HEALTH INCORPORATED
    Inventors: Elkin Florez, Ryan Fung, Charles Blair, David Annan, Hussam Mahgoub
  • Patent number: 9791998
    Abstract: A system, method and computer program product are provided for managing a plurality of applications via a single interface. It is initially identified as to which of a plurality of applications are installed on a computer. A status of each of the applications is then presented via a single graphical user interface.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: October 17, 2017
    Assignee: McAfee, Inc.
    Inventors: Brent J. Lymer, Atri Chatterjee
  • Patent number: 9792457
    Abstract: Systems, methods, and non-transitory computer-readable media can identify a post to be published via a social networking system. A privacy schedule for modifying a privacy setting associated with the post can be determined. A trigger to modify the privacy setting associated with the post can be detected. The privacy setting can be modified based on the privacy schedule when the trigger is detected.
    Type: Grant
    Filed: September 14, 2015
    Date of Patent: October 17, 2017
    Assignee: Facebook, Inc.
    Inventor: Yen-Ting Tung
  • Patent number: 9792264
    Abstract: Rules, such as condition-action rules, are configured at different levels of a hierarchy. Rules created at a higher hierarchical level are automatically inherited by lower hierarchical levels in the same branch of the hierarchy. The source of the inherited rule is indicated with its display such that the hierarchical level of creation can readily be determined. The inherited rule(s) may be toggled on/off at the lower hierarchical levels but edits to inherited rule(s) are restricted. Instead, a copy of any inherited rule may be made to create a local copy of the rule that is editable. Rules may be ordered and when a lower hierarchical level inherits the rules, the ordering is preserved. While the ordering of any rules remains constant when inherited at the lower levels, the lower level may toggle on/off the execution of each rule within the ordering.
    Type: Grant
    Filed: October 8, 2015
    Date of Patent: October 17, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Pedro Dantas DeRose, Puneet Narula, Viktoriya Taranov
  • Patent number: 9794245
    Abstract: In one implementation, a server system receives, from a device of a user, a request to add a credential issued by an organization and authentication information that has been authorized, independently of the server system, by the organization that issued the credential. The server system identifies the organization related to the request to add the credential and identifies communication information established for the organization. The server system provides, using the communication information and to a system operated by the organization, the authentication information and receives, using the communication information and from the system operated by the organization, credential information for the user. The server system adds one or more credentials to an account of the user based on the received credential information.
    Type: Grant
    Filed: May 9, 2016
    Date of Patent: October 17, 2017
    Assignee: MicroStrategy Incorporated
    Inventors: Hector Vazquez, Gang Chen, Sergey Mironenko, Gary Gabriel
  • Patent number: 9794268
    Abstract: An arrangement for enabling users to set and modify privacy policies is described. User attributes and existing privacy policies are used to determine the similarity between users. On this basis, the nearest-neighbors to a particular user are determined. When a user is required or wishes to provide or modify a policy, the policies of those nearest neighbors are used to recommend a privacy policy to the user.
    Type: Grant
    Filed: October 16, 2009
    Date of Patent: October 17, 2017
    Assignee: NOKIA SOLUTIONS AND NETWORKS OY
    Inventors: Miklos Tamas Bodi, Gabor Marton
  • Patent number: 9784976
    Abstract: A head mounted display which enables a user to visually recognize a virtual image includes: an image display unit that causes the user to visually recognize the virtual image; a processing unit that processes display information, which is information displayed to the user as the virtual image, in the image display unit; and a transmission unit that transmits the processed display information to an image display apparatus which is connected to the head mounted display.
    Type: Grant
    Filed: January 20, 2016
    Date of Patent: October 10, 2017
    Assignee: Seiko Epson Corporation
    Inventor: Kazuo Nishizawa
  • Patent number: 9785670
    Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Steven Buschman, Sean C. Foley, Minhui Yang
  • Patent number: 9785669
    Abstract: A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: October 10, 2017
    Assignee: International Business Machines Corporation
    Inventors: Steven Buschman, Sean C. Foley, Minhui Yang