Access Control Or Authentication Patents (Class 726/2)
  • Patent number: 9948645
    Abstract: Techniques for call-based user verification are described. In one embodiment, for example, an apparatus may comprise a processor circuit and a storage component. The apparatus may further comprise a session component, an identification (ID) component, a mapping component, and a verification component. The session component may be operative on the processor circuit and configured to receive session data from a client device and store the session data in the storage component. The ID component may be operative on the processor circuit and configured to request ID data from a server, receive ID data from the server, and send the ID data to the client device. The mapping component may be operative on the processor circuit and configured to map the session data with the ID data.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: April 17, 2018
    Assignee: FACEBOOK, INC.
    Inventors: Bradley Edward Hettervik, Surendra Gadodia, Xiao Liang, Antony T. Fu, Molly Jane Fowler
  • Patent number: 9946303
    Abstract: Provided herein are a multi smartphone and a method of controlling the same. The multi smartphone includes a display part configured to output a screen when an input signal is sensed; a memory part configured to store a plurality of operating systems (OSs) which are operated differently based on a time at which the input signal is sensed, a place at which the input signal is input, or a user who inputs the input signal; and a control part configured to perform control such that at least one OS of the plurality of OSs is selected and operated based on any one of a time at which the input signal is sensed, the place at which the input signal is input, and the user who inputs the input signal when the input signal is sensed.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: April 17, 2018
    Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATION
    Inventor: Jongseong Kim
  • Patent number: 9942933
    Abstract: At least one processor and at least one memory coupled thereto associated with a first user terminal (UT) perform processes of previously storing pre-configuration information not derived from a base station, designating an area of resources for transmitting control information, determining a plurality of first radio resources within the area of resources for transmitting control information from the first UT to a second UT in a case that the first UT is out of coverage of the base station, and directly transmitting to the second UT the control information in each of the plurality of first radio resources by Device-to-Device (D2D) communication, each resource indicating a same at least one subframe of second radio resources to be used for transmitting data by the D2D communication. A second UT includes least one processor and at least one memory coupled thereto receives the control information from the first UT via D2D communication.
    Type: Grant
    Filed: October 13, 2017
    Date of Patent: April 10, 2018
    Assignee: KYOCERA Corporation
    Inventors: Naohisa Matsumoto, Kugo Morita, Masato Fujishiro, Takahiro Saiwai
  • Patent number: 9940121
    Abstract: An electronic apparatus includes a control portion (1) including: an installation portion (11) that associates the user who performs installation with the installed program; and a program use control portion (17) that permits all users to use a first installed program associated with a first user and permit a second user and a third user who attempts to install a second installed program associated with the second user to use the second installed program. When the third user who is a user other than an administrator attempts to install an application program that the third user is not permitted to use, if the application program is the second installed program, the installation portion (11) does not perform installation and causes the program use control portion (17) to permit the third user to use the second installed program.
    Type: Grant
    Filed: May 2, 2016
    Date of Patent: April 10, 2018
    Assignee: KYOCERA Document Solutions Inc.
    Inventors: Kentaro Okamoto, Kyota Mitsuyama, Koji Ikawa
  • Patent number: 9942937
    Abstract: A method, a device, and a non-transitory storage medium provide storing context information pertaining to an end device and previous attachments of the end device to the network; receiving an indication that the end device requests an attachment to the network subsequent to the storing and subsequent to previously occurring detachments of the end device; authenticating the end device using the context information during the attachment; and causing a creation of a bearer connection between the end device and the network using the context information and during the attachment.
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: April 10, 2018
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Paul H. Siedelhofer, Abdul Subhan, Gregory L. Miceli
  • Patent number: 9935891
    Abstract: A computing resource policy specification (CRPRS) applies to a set of computing resources that share at least a portion of a first domain. The CRPRS comprises a plurality of rules describing a set of requirements with which a given computing resource in the set must comply. A determination is made, based at least in part on information received from a job scheduler, that an assessment of a particular computing resource for compliance with a first subset of rules included in the CRPRS should be initiated at a first time. A different subset of rules for compliance assessment is selected at a different time. A pre-scan associated with the particular computing resource is performed to assess functionality provided by the particular computing resource. A test set, of a subset of the tests associated with the assessment, is selected, and an assessment that uses the test set is dispatched and results of the assessment are delivered.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: April 3, 2018
    Assignee: Artemis Internet Inc.
    Inventor: Alexander Charles Stamos
  • Patent number: 9934504
    Abstract: A transaction is authorized using an authentication process that prompts the user to perform an action in view of a camera or sensor. The process identifies the user and verifies that the user requesting the transaction is a living human being. The user is identified using image information which is processed utilizing facial recognition. The device verifies that the image information corresponds to a living human using one or more human-verification processes. The device prompts the user to perform an action to confirm the transaction, and causes the transaction to be performed after verifying performance of the action by the identified user.
    Type: Grant
    Filed: October 19, 2015
    Date of Patent: April 3, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Yicong Wang, Haizhi Xu
  • Patent number: 9930034
    Abstract: A mobile device can receive, from an application installed on a wearable device, an authentication query. Based upon the authentication query, an application installed on the mobile device can be determined to have been authenticated. In response to determining that the application installed on the mobile device has been authenticated, a temporary password can be generated at the mobile device and converted into a vibration pattern. The vibration pattern can be vibrated at the mobile device. The temporary password sent from the mobile device can be compared with user input received via a tap interface on the wearable device. In response to determining that the user input corresponds to the temporary password, the application installed on the wearable device can be authenticated based on authentication parameters of the corresponding application on the mobile device.
    Type: Grant
    Filed: July 29, 2015
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Vijay Ekambaram, Ashish K. Mathur, Ashok Pon Kumar Sree Prakash
  • Patent number: 9924319
    Abstract: A tracking system is disclosed that enables the tracking of a beacon device and a credential device being held by the beacon device. The beacon device may communicate with readers of an access control system using a first communication protocol whereas the credential device being held by the beacon device may communicate with readers of the access control system using a second communication protocol. As the beacon device and the credential device being held by the beacon device may also communicate with readers at different times, a beacon device may be associated with a credential device being held thereby such that tracking of one device enables inferred tracking of the other device.
    Type: Grant
    Filed: July 14, 2016
    Date of Patent: March 20, 2018
    Assignee: ASSA ABLOY AB
    Inventors: Philip Hoyer, Julian Eric Lovelock, Mark Robinton
  • Patent number: 9922183
    Abstract: An electronic device and an information processing method are disclosed in the disclosure. The electronic device comprises: a wearable apparatus capable of forming a ring or an approximate ring, which is able to surround a first cylinder; a first sensor arranged at least partly in the wearable apparatus and towards an interior of the ring or the approximate ring, and configured to detect first biometric information of at least part of a wearer's body surrounded by the wearable apparatus if the wearable apparatus is worn on the part of the wearer's body; a first processor arranged in the wearable apparatus, and configured to determine whether the first biometric information matches first preset biometric information to obtain a determination result and to perform security processing corresponding to the determination result based on the determination result.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: March 20, 2018
    Assignees: BEIJING LENOVO SOFTWARE LTD., LENOVO (BEIJING) LIMITED
    Inventor: Yiqiang Yan
  • Patent number: 9917831
    Abstract: A method of authenticating a user of an image forming apparatus is provided that includes receiving, at the image forming apparatus, a one-time password (OTP) generating request, generating, at the image forming apparatus, an OTP according to the OTP generating request, receiving, at the image forming apparatus, an authentication request, from the host apparatus, including the OTP, and when the OTP received from the host apparatus matches the OTP generated according to the OTP generating request and absent a condition, approving an access to the image forming apparatus.
    Type: Grant
    Filed: July 29, 2014
    Date of Patent: March 13, 2018
    Assignee: S-PRINTING SOLUTION CO., LTD.
    Inventor: Kwang-woo Lee
  • Patent number: 9917834
    Abstract: A digital verified identification system and method are presented for verifying and/or authenticating the identification of an entity associated with an electronic file, such as, for example the digital signatory thereof. In particular, the system and method include a module generating assembly structured to receive at least one verification data element, and at least one digital identification module structured to be associated with at least one entity. The digital identification module is capable of being disposed or embedded within at least one electronic file. Further, the digital Identification module with the entity, and one or more metadata identification module includes at least one primary components identification module includes at least one primary component structured to at least partially associate the digital.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: March 13, 2018
    Inventor: Leigh M. Rothschild
  • Patent number: 9912670
    Abstract: Resource feature transfer is described. In one or more embodiments, information is collected about interaction of an unauthenticated user of a computing device with a resource, such as content (e.g., a web page) or an application. The information may identify the user, a device or application used to interact with the resource, and so on. This information is communicated to an identity management service (IMS) to determine features to make accessible to the unauthenticated user when interacting with the resource. During the interaction, the user initiates authentication to a corresponding user profile. To achieve a consistent user experience, the features made accessible to the user when unauthenticated are transferred so they are also accessible when authenticated. To do this, authentication information is communicated to the IMS with a token indicating the features determined for the unauthenticated user. The IMS then merges these features with features indicated by the user profile.
    Type: Grant
    Filed: April 19, 2016
    Date of Patent: March 6, 2018
    Assignee: ADOBE SYSTEMS INCORPORATED
    Inventors: Sanjeev Kumar Biswas, Mayank Goyal, John A. Trammel
  • Patent number: 9906544
    Abstract: Methods and systems for malicious non-human user detection on computing devices are described. The method includes collecting, by a processing device, raw data corresponding to a user action, converting, by the processing device, the raw data to features, wherein the features represent characteristics of a human user or a malicious code acting as if it were the human user, and comparing, by the processing device, at least one of the features against a corresponding portion of a characteristic model to differentiate the human user from the malicious code acting as if it were the human user.
    Type: Grant
    Filed: December 2, 2015
    Date of Patent: February 27, 2018
    Assignee: Akamai Technologies, Inc.
    Inventor: Sreenath Kurupati
  • Patent number: 9906469
    Abstract: The invention relates to an aircraft control system, situated in the avionics bay, including a computer, a remote equipment, such as an actuator of control surfaces, and an AFDX network. The computer includes a first module and a second module, respectively connected to a corresponding first module and a second module of the equipment, by a first and a second virtual link sharing a common path through the network, the first and second virtual links being segregated by a separate encoding at the applicative level. A replication and/or frame switching device is connected, on the one hand, to the common port and, on the other hand, to the ports of the first and second modules of the equipment.
    Type: Grant
    Filed: December 11, 2013
    Date of Patent: February 27, 2018
    Assignee: Airbus Operations (S.A.S.)
    Inventors: Marc Fervel, Antoine Maussion, Arnaud Lecanu, Sylvain Sauvant
  • Patent number: 9900344
    Abstract: Embodiments can identify requests that may be tied to a DDOS attack. For example, the primary identifiers (e.g., a source address) of requests for a network resource (e.g., an entire website or a particular element of the website) can be tracked. In one embodiment, a statistical analysis of how often a particular source address (or other primary identifier) normally makes a request can be used to identify source addresses that make substantially more requests. A normal amount can correspond to an average number of request that a source address makes. According to some embodiments, a system can use statistical analysis methods on various request data in web server logs to identify potential attacks and send data concerned potential attacks to an HBA system for further analysis.
    Type: Grant
    Filed: November 3, 2015
    Date of Patent: February 20, 2018
    Assignee: Level 3 Communications, LLC
    Inventors: Robert Smith, Shawn Marck
  • Patent number: 9898120
    Abstract: Disclosed is a watch type mobile terminal wearable on a wrist. The watch type mobile terminal includes a main body, a band unit, a sensing unit and a controller. The main body has a display unit. The band unit is connected to the main body so that the mobile terminal is worn on the wrist, and surrounds the wrist. The sensing unit senses at least one tap applied to at least one of the main body and the band unit. The controller configured performs a function corresponding to a pattern to which the tap is applied.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: February 20, 2018
    Assignee: LG ELECTRONICS INC.
    Inventors: Jeongyoon Rhee, Taeseong Kim, Yujune Jang
  • Patent number: 9900318
    Abstract: There is provided a method of authenticating a user in a network. The method can be executed on a server. The method comprises: acquiring a non-authorized user-behavior model associated with a non-authorized access to a network resource by an unauthorized entity, the non-authorized user-behavior model having been generated during blocking the non-authorized access to the network resource by the unauthorized entity; retrieving from a log stored on the network server, an indication of a plurality of users, each respective user associated with a respective user-behavior model; responsive to one of the respective user-behavior model matching the non-authorized user-behavior model, associating a user account associated with the respective user associated with the one of the respective user-behavior model with a security-violation parameter; responsive to the security-violation parameter, restricting user activity within the user account.
    Type: Grant
    Filed: February 11, 2015
    Date of Patent: February 20, 2018
    Assignee: YANDEX EUROPE AG
    Inventors: Ekaterina Aleksandrovna Andreeva, Yury Alekseyevich Leonychev, Egor Vladimirovich Ganin, Sergey Aleksandrovich Lavrinenko
  • Patent number: 9898874
    Abstract: A method of controlling the use of a custom image by a user in a value dispensing system, such as a mail processing system, that enables the system provider to account and charge for the use of the custom image without ever actually receiving the data representing custom image. The method includes steps of receiving a hash generated from at least the custom image at a provider location, such as a data center, generating a digital signature from data including at least the received hash, and transmitting the digital signature and data used to generate the digital signature to the user at a user location. The method may further include additional steps of determining whether the digital signature can be successfully verified, and allowing the custom image to be printed by the user only if it is determined that the digital signature can be successfully verified.
    Type: Grant
    Filed: May 31, 2005
    Date of Patent: February 20, 2018
    Assignee: Pitney Bowes Inc.
    Inventors: Andrei Obrea, Frederick W. Ryan, Jr.
  • Patent number: 9888755
    Abstract: Luggage as well as systems, devices, methodologies, and software for use with such luggage are disclosed. The luggage may include one or more compartments and lids that can be locked. The luggage may also include an identification device for obtaining information identifying a user and a computing device, such as a microcontroller or processor. The computing device may be configured to compare identification information with reference identification information to determine whether a user is authorized to access an interior of the luggage. Based on results of the comparison, the computing device may control a locking mechanism to unlock one or more of lids of the luggage to allow a user access to the interior of the luggage. The luggage may also include a GPS transceiver for tracking the luggage, a sensor for weighing the luggage, or a coupling mechanism to couple the luggage to another piece of luggage.
    Type: Grant
    Filed: January 4, 2016
    Date of Patent: February 13, 2018
    Assignee: Matte-Veede FZE
    Inventor: Jonathan Jacob
  • Patent number: 9891803
    Abstract: In one general aspect, a method can include displaying, on a display device included in a computing device, content in an application executing on the computing device, and determining that the computing device is proximate to a videoconferencing system. The method can further include displaying, in a user interface on the display device, at least one identifier associated with a videoconference, receiving a selection of the at least one identifier, and initiating the videoconference on the videoconferencing system in response to receiving the selection of the at least one identifier. The videoconference on the videoconferencing system can be initiated such that the content is provided for display on a display device included in the videoconferencing system.
    Type: Grant
    Filed: November 13, 2014
    Date of Patent: February 13, 2018
    Assignee: Google LLC
    Inventors: Mark David Scott, Mark Alan Foltz, Kurt Mauro Dresner, Adam Parker
  • Patent number: 9886334
    Abstract: The embodiments relate to processing a guest event in a hypervisor-controlled system. A guest event triggers a first firmware service for the guest event in firmware. The guest event is associated with a guest, a guest key, and with a guest state and protected guest memory accessible only by the guest and the firmware. The firmware processes information associated with the guest event. The processed information includes information of the guest state and the protected guest memory. A subset of the processed information is received by a hypervisor to process the guest event, and a non-received portion of the information is retained by the firmware. The hypervisor processes the guest event based on the received subset and sends a process result to the firmware triggering a second firmware service for the guest event. The firmware processes the process result together with the retained information to generate modification associated with the guest event.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Utz Bacher, Reinhard T. Buendgen
  • Patent number: 9886726
    Abstract: Social networking spam is detected using usage profiles for social networking groups. A mapping module maps a social networking group with a number of members. A pattern module determines a pattern of publishing activity of the members in posting information on blogs of other of the members. A profiling module defines a group usage profile for the social networking group based on the pattern. Global usage profiles can also be created for the social networking environment. An identification module identifies when a new entry has been posted on a blog of a members of a social networking group. An analysis module analyzes the new entry in comparison to a group usage profile (or other profiles). A determination module determines whether the new entry deviates from the pattern of activity of the members based on the analysis. If the new entry deviates, a spam detection module detects that the new entry is spam.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: February 6, 2018
    Assignee: SYMANTEC CORPORATION
    Inventor: William Gauvin
  • Patent number: 9882911
    Abstract: A trust rating is computed for a data requester across one or more dimensions by identifying the data requester, collecting information regarding the data requester from one or more sources, and generating the trust rating for the data requester across the one or more dimensions based on the collected information. The trust rating is utilized to either grant or deny a request by the data requester to access data associated with one or more data providers.
    Type: Grant
    Filed: December 1, 2015
    Date of Patent: January 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Alexandre de Queiroz Baltar, Silvia Cristina Sardela Bianchi, Marcio da Ros Gomes, Marcos Vinicius Landivar Paraiso, Sergio Varga
  • Patent number: 9880833
    Abstract: Initialization status of a register to be used as a pointer to a reference data structure is used to determine how a stub is to be generated to access the reference data structure. The register is one type of pointer configuration to be used to access the reference data structure, which is used to resolve a symbol associated with a function of a program. An indication is obtained as to whether the register has been initialized with a reference data structure pointer. Based on obtaining the indication, a stub is generated that is to be used to access the function. The generating depends on whether the register has been initialized. If the register has not been initialized, then the stub is generated to include another type of pointer configuration to be used to access the reference data structure.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: January 30, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Michael K. Gschwind
  • Patent number: 9880835
    Abstract: Initialization status of a register to be used as a pointer to a reference data structure is used to determine how a stub is to be generated to access the reference data structure. The register is one type of pointer configuration to be used to access the reference data structure, which is used to resolve a symbol associated with a function of a program. An indication is obtained as to whether the register has been initialized with a reference data structure pointer. Based on obtaining the indication, a stub is generated that is to be used to access the function. The generating depends on whether the register has been initialized. If the register has not been initialized, then the stub is generated to include another type of pointer configuration to be used to access the reference data structure.
    Type: Grant
    Filed: November 14, 2015
    Date of Patent: January 30, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Michael K. Gschwind
  • Patent number: 9876784
    Abstract: A method for authenticating a user of a computing device. The method includes a computer processor receiving an indication that a user of a computing device is accessing an object that utilizes an authentication process. The method further includes a computer processor selecting a first multi-media file that is associated with a user profile of the user and the object of the authentication process, wherein the first multi-media file is associated with a baseline user input authentication sequence. The method further includes creating a first temporal manipulation vector based on the user profile and a security requirement of the object of the authentication process, wherein the temporal manipulation vector modifies a presentation of a multi-media file and a corresponding time sequence of a user input authentication sequence in the multi-media file. The method further includes transmitting the first temporal manipulation vector and the first multi-media file to the computing device.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: January 23, 2018
    Assignee: International Business Machines Corporation
    Inventors: Saritha Arunkumar, Stephen D. Pipes
  • Patent number: 9870431
    Abstract: The invention relates to an efficient system for user rights in a semantic digital network, whereby users are arranged in the same semantic network as the information objects. The rights are thus derived from the semantic relations between users and information objects in a common semantic network.
    Type: Grant
    Filed: June 10, 2008
    Date of Patent: January 16, 2018
    Assignee: INTELLIGENT VIEWS GMBH
    Inventors: Clara Hammen, Jan Schümmer, Ralf Rath, Hans Scholz, Christian Schuckmann, Elke Siemon, Patrick Closhen
  • Patent number: 9870461
    Abstract: Techniques are disclosed for generating, utilizing, and validating traceable image CAPTCHAs. In certain embodiments, a traceable image is displayed, and a trace of the image is analyzed to determine whether a user providing the trace is human. In certain embodiments, a computing device receives a request for an image, and in response, creates a traceable image based upon a plurality of image elements. The computing device transmits data representing the traceable image to cause a second computing device to display the traceable image via a touch-enabled display. The computing device receives a user trace input data generated responsive to a trace made at the second computing device, and determines whether the trace is within an error tolerance range of the set of coordinates associated with the traceable image. The computing device then sends a result of the determination.
    Type: Grant
    Filed: October 6, 2016
    Date of Patent: January 16, 2018
    Assignee: Oracle International Corporation
    Inventors: Nagasravani Akula, Rachit Raj, Mohamad Raja Gani Mohamad Abdul
  • Patent number: 9864625
    Abstract: Methods, systems, and techniques for facilitating access to content stored remotely, for example, as part of a virtual machine infrastructure or elsewhere in a networked environment, using a uniform mechanism are provided. Example embodiments provide an Enhanced Virtual Desktop Management Server/System with a Content Abstraction Layer which enables users to access their data stored as part of a virtual machine environment, or replicated otherwise on a network, using a generic API. The API can be incorporated into a web browser or other third party interface to provide access to the users' data without needing to remote a bitmap representation of a virtual desktop display. Accordingly, users can access their data, applications, and settings regardless of the type of access device and regardless of whether the corresponding virtual desktop is running in the data center, provisioned in the datacenter but running on a client device, or not running at all.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: January 9, 2018
    Assignee: VMware, Inc.
    Inventors: Puneet Chawla, Jad Chamcham
  • Patent number: 9866551
    Abstract: Disclosed are a one time password generation device and an authentication method. The one time password generation device includes: a reference information generator that generates reference information; a virtual input means generator that generates a virtual input means in which a blank is provided; and a password generator that generates a one time password using an initial value, reference information and a blank.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: January 9, 2018
    Inventors: Young Man Hwang, Sung Min Joo
  • Patent number: 9860265
    Abstract: The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.
    Type: Grant
    Filed: April 17, 2015
    Date of Patent: January 2, 2018
    Assignee: Tenable Network Security, Inc.
    Inventors: Ron Gula, Renaud Deraison
  • Patent number: 9860223
    Abstract: Users on a client system access files served by a web application through the Network File System (NFS) protocol using common web authentication mechanisms while still honoring constraints imposed by the application's authorization rules. To this end, the client system is modified to include an NFS server. Following authentication of the NFS server with the web application, NFS-based requests (from a local NFS client) directed to the application are received at the NFS server instead of being sent to the application directly. The NFS server, in turn, maps those requests to the web application preferably using standard HTTP. Because the web application's normal security model is enforced as intended at the web application, the approach enables individual users of the client system to operate under different visibility constraints dictated by the web application. Thus, fine-grained permissions may be enforced at the web application for different users.
    Type: Grant
    Filed: March 27, 2013
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sheehan Anderson, Richard Lee Kulp, Gili Mendel
  • Patent number: 9854618
    Abstract: A first user terminal according to an embodiment comprises: at least one processor and at least one memory coupled to the processor. The processor is configured to perform processes of: determining first radio resources to be used for transmitting control information, the control information indicating location of second radio resources to be used for transmitting data by direct Device-to-Device communication; and directly transmitting the same control information repeatedly to a second user terminal in each resource block included in the first control resources.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: December 26, 2017
    Assignee: KYOCERA Corporation
    Inventors: Naohisa Matsumoto, Kugo Morita, Masato Fujishiro, Takahiro Saiwai
  • Patent number: 9846892
    Abstract: A location-based information system and method therefor, which is responsive to the user's selection of geographic zone and parameters. A proprietary app (application) is installed in a mobile device of the user, which insures that a connection to the user from a caller is based on the user's defined zone and other parameters without the disclosing the exact location of the user. Various embodiments of the invention provide an option for user-to-user location-based connection without depending on a remote server.
    Type: Grant
    Filed: September 16, 2016
    Date of Patent: December 19, 2017
    Inventor: Boaz Hyman
  • Patent number: 9843578
    Abstract: A computer-implemented method comprising: receiving, from a primary factor authentication device by one or more computer systems, a request to enroll a mobile device as a secondary factor authentication device; and enrolling by the one or more computer systems the mobile device as a first, secondary factor authentication device.
    Type: Grant
    Filed: August 26, 2015
    Date of Patent: December 12, 2017
    Assignee: FMR LLC
    Inventors: Boris Kalinichenko, Joseph G. Ferra
  • Patent number: 9842224
    Abstract: An electronic device includes a housing. One or more processors are operable with a plurality of proximity sensor components that can be disposed behind a grille defining a plurality of reception beams having a cumulative beam reception angle. The cumulative beam reception angle of any one proximity sensor component overlaps the cumulative beam reception angle of at least one other proximity sensor component. The one or more processors can detect whether a single person or a plurality of people are within a thermal reception radius of the electronic device. Where the single person is within the thermal reception radius, the one or more processors can operate the electronic device in a first mode of operation, and where the plurality of people are within the thermal reception radius, operate the electronic device in a second mode of operation.
    Type: Grant
    Filed: May 26, 2015
    Date of Patent: December 12, 2017
    Assignee: Motorola Mobility LLC
    Inventors: Rachid M Alameh, Roger W Ady, Paul Steuer
  • Patent number: 9838383
    Abstract: A method includes receiving a target credential object having administrative rights over a first user account located on a target system. The first user account includes a log-in permission for the target system. The method also includes receiving data indicative of a second user account corresponding to the first user account, wherein the second user account is located on a local system. The method further includes sending a first request to remove the log-in permission from the first user account to the target system using the target credential object. The method still further includes receiving a log-in request corresponding to the second user account on the local system. The method additionally includes, in response to receiving the log-in request for the second user account, sending a second request to add the log-in permission on the first user account to the target system using the target credential object.
    Type: Grant
    Filed: July 9, 2013
    Date of Patent: December 5, 2017
    Assignee: CA, Inc.
    Inventors: Ron Perlmuter, Amir Jerbi, Nir Barak, Miron Gross
  • Patent number: 9830208
    Abstract: The embodiments relate to a method for processing a guest event in a hypervisor-controlled system. A guest event triggers a first firmware service for the guest event in firmware. The guest event is associated with a guest, a guest key, and with a guest state and protected guest memory accessible only by the guest and the firmware. The firmware processes information associated with the guest event. The processed information includes information of the guest state and the protected guest memory. A subset of the processed information is received by a hypervisor to process the guest event, and a non-received portion of the information is retained by the firmware. The hypervisor processes the guest event based on the received subset and sends a process result to the firmware triggering a second firmware service for the guest event. The firmware processes the process result together with the retained information to generate modification associated with the guest event.
    Type: Grant
    Filed: November 19, 2015
    Date of Patent: November 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Utz Bacher, Reinhard T. Buendgen
  • Patent number: 9832184
    Abstract: Apparatus and methods for enhancing group access accountability are provided. The method may include receiving a request from a user to access a system and user-identifying information associated with the user. The method may also include querying a database to retrieve a group ID number associated with at least a portion of the user-identifying information and access permissions associated with the group ID number. The method may further include querying a database to retrieve a user ID and password associated with the group ID number. The user ID and password may be selected from a group of usernames and passwords associated with the group ID number. The method may additionally include flagging the user ID and password with a flag, the flag indicating that the user ID and password are in use, and transmitting the user ID and password to the user.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: November 28, 2017
    Assignee: Bank of America Corporation
    Inventors: Sasidhar Purushothaman, Ramakrishna Gaddam, Rajamanimaran Krishnamoorthy, Surya Kiran Koduru, Santosh Kothuru, Santhosh Kurimilla
  • Patent number: 9832232
    Abstract: Providing streaming of applications from streaming servers onto clients. The applications are contained within isolated environments, and the isolated environments are streamed from the servers onto clients. The system may include the option of running both in on-line and off-line. When on-line, the system may include authentication of the streaming servers and authentication of clients and credentialing of the isolated environments and applications the clients are configured to run. The system may further include encrypted communication between the streaming servers and the clients. When off-line, the system may include the ability to run already installed isolated environments without requiring credentialing. The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: November 28, 2017
    Assignee: Open Invention Network LLC
    Inventor: Allan Havemose
  • Patent number: 9818092
    Abstract: A system for implementing at least one cryptocurrency transaction at a point-of-sale by using a mobile terminal is provided. The system is operable to provide authentication for implementing the one or more cryptocurrency transactions, wherein the system is operable to send at least one authentication request for the at least one cryptocurrency transaction from a payment terminal to a payment service hosted via one or more virtual computing machines, wherein the payment service is operable to provide a request for a PIN code at the mobile terminal; to send the PIN code from the mobile terminal via a secure channel to open a vault in the one or more virtual machines, wherein the vault contains one or more private keys (PKI) which are useable for authenticating the at least one cryptocurrency transaction; and to confirm execution of the at least one cryptocurrency transaction to at least the payment terminal.
    Type: Grant
    Filed: June 4, 2014
    Date of Patent: November 14, 2017
    Inventor: Antti Pennanen
  • Patent number: 9811839
    Abstract: A system and method for providing a customer loyalty framework for a customer relationship management (CRM) system. The framework includes an internal CRM system, an internal loyalty system and an internal enterprise resource planning (ERP) system. The internal CRM system has a CRM repository storing CRM data and the internal loyalty system has a loyalty repository storing loyalty data for one or more customers enrolled in a company loyalty program. The internal CRM system stores business logic that is executable by the internal loyalty system, the internal CRM system, and/or the internal ERP system to execute the company loyalty program. The system further includes an external CRM system connected with the internal network by an external communication network.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: November 7, 2017
    Assignee: SAP SE
    Inventor: Meenakshi Sundaram P
  • Patent number: 9813422
    Abstract: A privileged account management system can maintain a database that defines a normal amount of time that it takes to perform a task associated with a reason code. When an administrator requests admin credentials for accessing a server, the administrator can provide a reason code which defines a task that the administrator intends to accomplish. A PAM system can maintain a database that defines, for each reason code, a normal amount of time that is required to accomplish the task associated with the reason code. The PAM system can then monitor an elapsed time over which the admin credentials are checked out to an administrator to determine whether the elapsed time exceeds the corresponding normal amount of time. If the elapsed time exceeds the normal amount, the PAM system can take appropriate action to mitigate any potential harm to the server.
    Type: Grant
    Filed: April 30, 2015
    Date of Patent: November 7, 2017
    Assignee: Quest Software Inc.
    Inventors: Matthew T. Peterson, Daniel F. Peterson, Jordan S. Jones
  • Patent number: 9811131
    Abstract: An apparatus determines, when receiving a packet transited via a network in a power saving mode, whether or not the packet is a packet according to a predetermined protocol. If the packet is determined to be the packet according to a predetermined protocol, the apparatus analyzes the data of a succeeding packet described in a data description language, and instructs the apparatus to return from the power saving mode to a normal power mode depending on an analysis result.
    Type: Grant
    Filed: November 28, 2012
    Date of Patent: November 7, 2017
    Assignee: Canon Kabushiki Kaisha
    Inventor: Tadahiro Nakamura
  • Patent number: 9806978
    Abstract: Replicated instances in a database environment provide for automatic failover and recovery. A monitoring component can obtain a lease enabling the component to periodically communicate with, and monitor, one or more data instances in the data environment, where the data instance can be a replicated instance including a primary and a secondary replica. For a large number of instances, the data environment can be partitioned such that each monitoring component can be assigned a partition of the workload. In the event of a failure of a monitoring component, the instances can be repartitioned and the remaining monitoring components can be assigned to the new partitions to substantially evenly distribute the workload.
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: October 31, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Grant Alexander MacDonald McAlister, Swaminathan Sivasubramanian, Barry B. Hunter, Jr., Silas M. Brazil
  • Patent number: 9800319
    Abstract: A relay apparatus provided to a vehicle, performing first data communication with a first communication apparatus arranged outside the vehicle, and performing at least second data communication with multiple second communication apparatuses provided to the vehicle is provided. The relay apparatus includes a permission determination portion and an initiation switch portion. The permission determination portion determines whether first data communication between the first communication apparatus and a target second communication apparatus is permitted. The permission determination portion receives the first communication frame from the first communication apparatus through a connection switch portion determining a connection destination according to a control signal. The initiation switch portion outputs to the connection switch portion, the control signal designating the target second communication apparatus as the connection destination of the first communication apparatus.
    Type: Grant
    Filed: August 10, 2015
    Date of Patent: October 24, 2017
    Assignee: DENSO CORPORATION
    Inventors: Tetsuo Nakagawa, Tomohisa Kishigami
  • Patent number: 9797115
    Abstract: A power transmission device includes an input shaft, an output shaft, a gear mechanism, an energy-generating motor, a first clutch, and a locking device. The energy storage unit is configured to store the energy generated by the energy-generating motor. The gear mechanism includes a planetary gear mechanism, which includes a first rotation element, a second rotation element, and a third rotation element, which are mutually different. The first clutch is provided in the power transmission route between the engine and the first rotation element. The locking device locks or releases the second rotation element. The energy-generating motor is connected to the third rotation element. A controller locks the second rotation element, converges the rotation speeds of two rotation shafts in the first clutch to cause the first clutch to engage, and rotates the energy-generating motor using drive power from the engine to thereby accumulate energy in the energy storage unit.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: October 24, 2017
    Assignee: KOMATSU LTD.
    Inventors: Yasuki Kishimoto, Hiroshi Monden, Yasunori Ohkura
  • Patent number: 9792423
    Abstract: Methods and systems are provided for electronic authentication. A modified electronic image is generated by altering at least a pixel of an electronic image. The electronic image is an image that has been previously viewed by a user during a setup process. In response to receiving an authentication request from the user, the modified electronic image is displayed to the user via an electronic display along with one or more other electronic images. A determination is made as to whether the user is able to recognize the modified electronic image. In response to determination that the user is able to recognize the modified electronic image, the authenticating request is granted.
    Type: Grant
    Filed: August 13, 2015
    Date of Patent: October 17, 2017
    Assignee: PAYPAL, INC.
    Inventor: William Joseph Leddy
  • Patent number: 9794782
    Abstract: Described herein are systems and methods for connecting devices to secured networks, such as secured wireless networks, by storing credentials for the network and passing the credentials to a new device, such as, for example, when the new device is attempting to connect to the secured network for the first time.
    Type: Grant
    Filed: October 15, 2014
    Date of Patent: October 17, 2017
    Assignee: BELKIN INTERNATIONAL INC.
    Inventor: Venkata Subba Rao Pathuri