Authorization Patents (Class 726/21)
-
Patent number: 11232086Abstract: A software application may have access to: (i) an identification condition that indicates a first subset of configuration-element attributes that can be used to identify configuration elements, and (ii) an exception indicating a second subset of the attributes that a module does not support. The software application may be configured to: based on the identification condition and the exception, search representations of configuration elements in a persistent storage in attempt to find a matching representation that characterizes information from the module, where the matching representation is found when one of the representations and the information from the module contain identical values for all of the attributes in the first subset excluding those also in the second subset; based on the search, determine that the matching representation is not found; and write, to the persistent storage, a new representation specifying values for attribute(s) according to the information from the module.Type: GrantFiled: May 2, 2019Date of Patent: January 25, 2022Assignee: ServiceNow, Inc.Inventors: Leonid Suslov, Arik Sityon, Rotem Steuer, Shlomo Sividya
-
Patent number: 11233805Abstract: Disclosed embodiments relate to systems and methods for centrally analyzing and managing scripts. Techniques include identifying, at a centralized script execution resource in a network environment, a first script; identifying, at the centralized script execution resource, a security risk indication for the first script; determining, at the centralized script execution resource, a security context for the first script; and performing, based on the security risk indication and the security context, at least one of: determining whether to execute the first script at the centralized script execution resource on behalf of the at least one of the endpoint resources, executing the first script at the centralized script execution resource on behalf of the at least one of the endpoint resources, or determining execution conditions for execution of the first script at the centralized script execution resource on behalf of the at least one of the endpoint resources.Type: GrantFiled: January 28, 2020Date of Patent: January 25, 2022Assignee: CyberArk Software Ltd.Inventor: Asaf Hecht
-
Patent number: 11218491Abstract: The concepts and technologies disclosed herein are directed to security de-escalation for data access. A user device can define a security de-escalation rule. The user device can define a multi-tiered security zone within a user device file system utilized by a memory of the user device. The multi-tiered security zone can include a plurality of security tiers. The user device can identify data for de-escalation in accordance with the security de-escalation rule. The user device can de-escalate the data to generate de-escalated data by storing the data identified for de-escalation in a less secure security tier of the plurality of security tiers of the multi-tiered security zone. The user device can receive a data access request from an external user device. The user device can verify a data access credential contained in the data access request. The user device can provide the de-escalated data to the external user device.Type: GrantFiled: December 12, 2019Date of Patent: January 4, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Joseph Soryal, Naila Jaoude, Dylan C. Reid
-
Patent number: 11216475Abstract: The disclosure provides a method and a system for automatically discovering an inference rule, a medical knowledge database and a retrieval method. The method includes: acquiring a relation matrix for each medical relation, the relation matrix representing a relationship between vectors of the medical entities having the medical relation; and acquiring the inference rules based on the relation matrices for the plurality of medical relations, each inference rule including a first medical relation, a second medical relation and a third medical relation, the inference rule representing that the third medical relation is inferred from the first medical relation and the second medical relation.Type: GrantFiled: January 17, 2018Date of Patent: January 4, 2022Assignee: BOE TECHNOLOGY GROUP CO., LTD.Inventor: Zhenzhong Zhang
-
Patent number: 11212229Abstract: A system and method for dynamically altering static parameters on a live network device is disclosed. The system includes a live network device having a plurality of parameters configured thereon that control the application of services to subscriber packet flows and a machine learning device operable to monitor the subscriber packet flows and apply a machine learned model to identify patterns in the monitored subscriber pack flows. The machine learning device is further operable to dynamically alter at least one of the plurality of parameters on the network device based upon the patterns in the monitored subscriber packet flows.Type: GrantFiled: October 11, 2019Date of Patent: December 28, 2021Assignee: Juniper Networks, Inc.Inventors: Nithyananda Vishnu K S, Sasikumar Sekar, Jeevan Madhu Chakravarthy Dandangi, Ramasubramaniam Ganesan
-
Patent number: 11206251Abstract: A first electronic device is associated with a serviceable item. The first electronic device includes a user input; an output device; and a control circuit. The first electronic device is configured to identify user interaction with the user input; generate a code unique to the user interaction with the user input; and output, via the output device and to a second electronic device associated with the user, a temporary session identifier comprising the code, the temporary session identifier useable by the second device to establish a communication session with a server. The user may communicate information about the serviceable item to the server over the communication session in an attempt to facilitate servicing of the serviceable item.Type: GrantFiled: March 22, 2019Date of Patent: December 21, 2021Assignee: Sony Mobile Communications Inc.Inventor: Peter Ljung
-
Patent number: 11199825Abstract: A standard track smart home system, comprising: a gateway device (1), a power interface of the gateway device (1) being respectively connected to a power supply live line (L) and a power supply zero line (N), the gateway device (1) remotely connecting to at least one user terminal, and the gateway device (1) being also used for connecting to a plurality of first expansion devices (10); and a standard track (T), the gateway device (1) and the plurality of first expansion devices (10) being arranged side by side on the standard track (T) and connected to one another by means of a plurality of wiring terminals, and outgoing interfaces of each of the first expansion devices (10) being respectively connected to one or more smart home devices.Type: GrantFiled: November 30, 2018Date of Patent: December 14, 2021Inventors: Shengpiao Chen, Lei Zhang, Xufeng Zhang, Junquan Lu
-
Patent number: 11188661Abstract: Described herein includes a permission management system that optimizes determination of whether a user has permission to perform an operation using an attribute table. The system may include a permission processor for: determining whether the requesting user has permission to perform the operation, the determining including: generating an attribute table comprising the one or more target users and one or more user attributes, the one or more user attributes comprising metadata associated with the one or more target users; storing the attribute table on the database; generating a reduced attribute table, the generating comprising removing one or more target users from the attribute table; and applying the one or more permission rules to each of the target users remaining in the reduced attribute table.Type: GrantFiled: December 12, 2018Date of Patent: November 30, 2021Assignee: SAP SEInventor: Yang Peng
-
Patent number: 11134087Abstract: A method, system and computer-usable medium for mitigating security breaches associated with dissemination of protected data. In certain embodiments, the method includes receiving information communicated to a secured network from a source external to the secured network and determining whether the received information includes protected data. If the received information includes protected data, a determination is made as to whether the receipt of the protected data is anomalous. If the receipt of the protected data is anomalous, one or more sources of egress of the protected data from the secured network are identified. By identifying the sources of egress, actions may be taken to prevent future egress of the protected data.Type: GrantFiled: August 31, 2018Date of Patent: September 28, 2021Assignee: Forcepoint, LLCInventor: Richard A. Ford
-
Patent number: 11106812Abstract: In a dataset exchange environment in which datasets are available for exchange or transformation, a dataset validation platform may be configured to update a cryptographically signed record based on each dataset that is available via the data exchange environment. The dataset validation platform may be further configured to control access to the datasets based on whether a request to access a particular dataset is compliant with an availability requirement of the particular dataset. The dataset validation platform may be further configured to update the cryptographically signed record based on requests to access the datasets, transformations that are based on the datasets, or modifications to the availability requirement of the datasets, such as a modification to a privacy limitation or other availability requirement indicating a criteria for usage of the requested dataset.Type: GrantFiled: May 9, 2019Date of Patent: August 31, 2021Assignee: AT&T Intellectual Property I, L.P.Inventors: Martin Patrick McEnroe, Eric Zavesky, Joshua Whitney, Rhonda Green
-
Patent number: 11084459Abstract: A driving authorization system for a vehicle includes a connectivity unit for communication at least with a key and a keyless access authorization system. A server has an access lock, which can be activated or deactivated by the key and/or the keyless access authorization system. The keyless access authorization system is an application on a mobile device, further having an immobilizer. The immobilizer is designed in such a way that it is activated when the access lock is activated by the application and is deactivated again in this case only when the access lock is deactivated by the application.Type: GrantFiled: February 12, 2019Date of Patent: August 10, 2021Assignee: DAIMLER AGInventors: Daniel Deparis, Jan-Peter Langer, Jakob Luickhardt, Markus Rossmann, Gabriele Galwas
-
Patent number: 11061586Abstract: Various systems and methods are provided for calculating a data criticality score upon ingesting a data object into a data storage system. This data criticality score can be used to control subsequent access requests for the data object. In one embodiment, a computer system receives a data object at a first node comprising a decision engine. The decision engine generates a data criticality score based, at least in part, on one or more inputs related to the data object. After calculating the data criticality score, the system uses the data criticality score to determine whether a given action is allowable for the data object. After determining whether the given action is allowable, the system receives a user request to perform a first action on the data object. The system then determines whether the user request should be granted with respect to the first action, and if allowable, performs the first action.Type: GrantFiled: November 21, 2017Date of Patent: July 13, 2021Assignee: Veritas Technologies LLCInventors: Ruchika Ahuja, Bhushan Pandit
-
Patent number: 11032080Abstract: A method for processing a cryptographic operation request includes receiving, at a hardware security module (HSM), the cryptographic operation request including a cryptographic key and at least one authorization token, determining, by the HSM, whether an access control list (ACL) associated with the cryptographic key of the cryptographic operation request is authorized to govern access to the cryptographic key, and validating, by the HSM, the at least one authorization token. When the at least one authorization token is valid and the ACL is authorized to govern access to the cryptographic key of the cryptographic operation request, the method includes processing, by the HSM, the cryptographic operation request.Type: GrantFiled: January 25, 2018Date of Patent: June 8, 2021Assignee: Google LLCInventors: Patrick Stahlberg, Il-Sung Lee, Tao Tao, Xiaolan Zhang, John Randolph, August Huber, David Elrom
-
Patent number: 11012239Abstract: Trusted client security factor-based authorizations. The techniques allow a server to authorize client requested operations to access a protected resource or service based on trusted client security factors that are obtained at client machines and provided to the server.Type: GrantFiled: March 9, 2020Date of Patent: May 18, 2021Assignee: Oracle International CorporationInventors: Scott Gaetjen, Patrick F. Sack, William Maroulis, Matthew S. Piermarini
-
Patent number: 11000076Abstract: An electronic vaping device may be designed to enhance or facilitate its use. For example, the electronic vaping device may: allow a capability of the electronic vaping device to provide vapor to be altered (e.g., disabled, reduced, enabled, or increased) in some situations (e.g., to prevent unauthorized vaping by a child, teenager or other individual); be able to communicate with an external communication device (e.g., a smartphone, a computer, etc.) to convey a notification of potential unauthorized use of the electronic vaping device (e.g., by a child, teenager or other unauthorized user); implement a physical deterrent to its unauthorized use; be able to visually convey information (e.g., advertisements, notifications, etc.); and/or be able to capture images and/or sounds (e.g., record pictures and/or video, speech, music, etc.).Type: GrantFiled: September 14, 2019Date of Patent: May 11, 2021Inventor: Martin Tremblay
-
Patent number: 10956552Abstract: A shoulder-surfing resistant authentication method and system includes a computing device, such as a smart phone, which includes a display for presenting an interactive virtual environment. During the authentication process, the user enters a passcode by modifying one or more attributes of one or more icons that are presented relative to the interactive environment. Such attributes may include one or more of the type of movement the icons perform, the change in position or visual characteristics of the icons relative to the virtual environment, as well as the removal and/or addition of one or more icons relative to the virtual environment. The entered passcode is then compared with a previously stored or “set” passcode to authenticate the user before granting access to the computing device.Type: GrantFiled: April 3, 2018Date of Patent: March 23, 2021Assignee: Cleveland State UniversityInventor: Ye Zhu
-
Patent number: 10958639Abstract: Systems for providing secure access to systems are provided. A computing device may receive a request to access functionality which may include login credentials of a user. Upon receiving the request to access functionality, the computing device may execute a scan of an area surrounding the computing device to detect any wearable devices within proximity of the computing device that are linked to the computing device. The authenticating information and, in some examples, detected, linked wearable device, may be validated. Based on the validation, authentication response data may be generated and transmitted to an authentication computing platform which may cause the authentication computing platform to validate the authentication response data and cause the computing device to connect to a client interface computing platform.Type: GrantFiled: February 27, 2018Date of Patent: March 23, 2021Assignee: Bank of America CorporationInventors: Michael Toth, Hitesh Shah
-
Patent number: 10958645Abstract: A system and method for sharing electronic data between participants of a phone conference, such as an online presentation, without a need to exchange passwords to link two devices together for data transfer nor go through a login procedure to access the data resource. To achieve this, the participants use a device or software application that samples the audio of the phone conversation and creates a stream of audio fingerprints. The streams of fingerprints are sent to a matching service on the internet. This matching service finds the fingerprints that correspond to the same conversation among the streams of simultaneous users. Once a match is found with a high enough confidence level, the matching service exchanges identifiers such as public IP addresses and sends those back to the fingerprinting units. When instructed by the user, the units can then proceed to setup a secure data connection.Type: GrantFiled: June 20, 2019Date of Patent: March 23, 2021Assignee: BARCO N.V.Inventors: Johannes Brands, Christophe Herreman
-
Patent number: 10955912Abstract: Techniques for data sharing between two computing devices are described. In an example, a computer system determines a first presence of a first user relative to a first computing device. The computer system also determines a first identifier of the first user. The first identifier is associated with operating the first computing device. The operating comprises sharing data with a second computing device. The computer system also determines a second presence of a second user relative to the second computing device. The computer system also determines a second identifier of the second user. The second identifier associated with operating the second computing device. The computer system cause the data to be shared with the second computing device based on the first presence, the first identifier, the second presence, and the second identifier.Type: GrantFiled: November 9, 2018Date of Patent: March 23, 2021Assignee: Tobii ABInventors: Daniel Ricknäs, Erland George-Svahn, Rebecka Lannsjö, Regimantas Vegele, Andrew Ratcliff, Guido Hermans, Mattias Hanqvist, Simon Hugosson, Dmitrios Koufos, Morgan Viktorsson, Jonas Alexanderson, Siavash Moghaddam, Jimmy Carlsten, Martin Chrzan
-
Patent number: 10942728Abstract: Disclosed are various embodiments for updating IoT endpoints. A software update package can be deployed to a IoT gateway. The software package can have lifecycle scripts and software executable for installation on IoT endpoints. The lifecycle scripts represent different lifecycle phases of the update process.Type: GrantFiled: July 15, 2019Date of Patent: March 9, 2021Assignee: VMware, Inc.Inventors: Sabo Rusev, Dobromir Ivanov, Ivo Petkov, Ilya Mayorski, Militsa Borisova
-
Patent number: 10942833Abstract: A computer system, computer program product and computer-implemented method for performing a task. The computer system includes a sensor and a processor. The sensor is attachable to an article and is sensitive to a parameter indicative of a pattern of use of the article. The processor is configured to: determine a standard pattern of use of the article from a measurement of the parameter obtained during a training period, determine a tracked pattern of use of the article from a measurement of the parameter obtained during a tracking period, and generate a reminder to perform the task when the tracked pattern of use deviates from the standard pattern of use. A device receives the reminder in order to presenting the reminder to a user.Type: GrantFiled: January 11, 2019Date of Patent: March 9, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Adam Eberbach, Josh Andres, Lenin Mehedy
-
Patent number: 10936751Abstract: A data anonymization computer system selectively anonymizes data items from data structures prior to forwarding the data structures to a third-party network service. The data anonymization computer system identifies at least a respective data item of the data structure that meets a set of conditions, including at least a first condition in which at least a portion of the respective data item has a format that coincides with the predetermined format and replaces a set of characters of the respective data item having the format with a string of characters of a respective token of a pool of tokens. The data anonymization computer system forwards the data structures to the third-party network service with each of the respective data items having the string of characters of the respective token in place of the replaced set of characters.Type: GrantFiled: December 14, 2018Date of Patent: March 2, 2021Inventors: Anthony Scotney, Sabyasachi Routray
-
Patent number: 10922430Abstract: Systems and methods are provided for data security grading. An exemplary method for data security grading, implementable by a computer, may comprise receiving a request to access a query data field, searching for the query data field from a security level table, in response to finding the query data field from the security level table, obtaining from the security level table a security level corresponding to the query data field, and in response to not finding the query data field from the security level table, determining a security level corresponding to the query data field based at least on a lineage tree and the security level table. The lineage tree may trace the query data field to one or more source data fields, and the security data level table may comprise one or more security levels corresponding to the one or more source data fields.Type: GrantFiled: July 16, 2018Date of Patent: February 16, 2021Assignee: Beijing DiDi Infinity Technology and Development Co., Ltd.Inventors: Dong Li, Huaiyu Zhu, Jing Chen
-
Patent number: 10909230Abstract: Methods and systems for authenticating a user include presenting a list of themes on a user interface of a client device for user selection. Images of a plurality of objects and query prompts are presented on a client device for a theme selected from the list. Images of objects selected in response to the query prompts are received and verified to determine that the objects that are selected are theme-based objects and correspond to the query prompts. The selected objects are stored as answers to the query prompts identified for the theme and are used for authenticating the user during subsequent requests received from an application that is used to access a sensitive, digital asset.Type: GrantFiled: June 13, 2017Date of Patent: February 2, 2021Inventor: Stephen D Vilke
-
Patent number: 10871955Abstract: A system and method for updating firmware data on a computing platform in response to a firmware update request received in the form of a signed capsule file received via a runtime service is discussed. The firmware update request may be a request to update UEFI firmware and be received using the UpdateCapsule runtime service. The firmware data may include data associated with UEFI protected variables, SMBIOS data, logo data, microcode update data and pre-operating system security policy data.Type: GrantFiled: February 8, 2019Date of Patent: December 22, 2020Assignee: Insyde Software Corp.Inventor: Timothy Andrew Lewis
-
Patent number: 10841083Abstract: Subject matter disclosed herein may relate to at least one processor to establish a communication connection between a portable computing device and a particular external device, the at least one processor to initiate transmission of one or more signal packets representative of one or more communication, security, and/or cryptographic parameters to the particular external device responsive at least in part to the establishing the communication connection.Type: GrantFiled: March 15, 2018Date of Patent: November 17, 2020Assignee: ARM Ltd.Inventors: Renee Marie St Amant, Peter James Samuel Ferguson, Gary Dale Carpenter, Brian Tracy Cline
-
Patent number: 10795990Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.Type: GrantFiled: August 13, 2018Date of Patent: October 6, 2020Assignee: ABB Schweiz AGInventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
-
Patent number: 10796085Abstract: The present invention provides systems and methods for providing cross-device native functionality for a native app. More specifically, the invention is directed to a JavaScript Object Notation (JSON) data exchange format for use with a native app running on a user's mobile device, wherein the exchange format is configured to improve user experience and interaction with the app. The present invention may be particularly useful in a mobile-based crowdsourcing platform in which data is continually exchanged between remote user devices and a cloud-based service for collecting and managing user-driven data based on user interaction with native apps on their devices.Type: GrantFiled: July 7, 2016Date of Patent: October 6, 2020Assignee: CrowdComfort, Inc.Inventors: Abdullah Daoud, B. Eric Graham, Chris Fuentes
-
Patent number: 10779041Abstract: Described herein are systems and methods for displaying screenshot-proof content. In one embodiment, a method of protecting a digital content from capture by a screen capture operation of a user device comprises: receiving, by the user device, the digital content; converting a format of the digital content into a content-protected format; streaming the digital content from a local content server implemented on the user device to a local content client implemented on the user device; and causing the user device to display the digital content.Type: GrantFiled: December 6, 2018Date of Patent: September 15, 2020Assignee: Confide, Inc.Inventors: Jeffrey Grossman, Chi-Hsiu Rich Hong, Jonathan Brod
-
Patent number: 10778683Abstract: Devices, systems, and methods are provided to provide cloud-based coordination of customer premise service appliances. A system can include a computing device comprising a communication module, a policy module, an appliance selection module, and a coordination module. The communication module receives a document request from a first client over a network connection, establishes a session with the first client in response to the document request, and receives metadata representing collected signatures at after completion of the electronic signature operation portion of the document request. The policy module manages a policy associate with a first account corresponding to the document request. The appliance selection module selects one of a plurality of document appliances.Type: GrantFiled: July 12, 2016Date of Patent: September 15, 2020Assignee: DocuSign, Inc.Inventors: Donald Grant Peterson, Eric Fleischman
-
Patent number: 10757106Abstract: Embodiments of the present disclosure provide a resource access control method performed by a computing device. The computing device pre-stores an association relationship between tag information and a group resource and an association relationship between the tag information and access permission, respectively. After receiving a group resource access instruction, the group resource access instruction indicating a group resource to which a user requests access, the computing device obtains tag information granted to the user from the tag information associated with the group resource and then obtains access permission associated with the tag information based on the tag information granted to the user. Finally, the computing device compares the access permission with resource permission of the group resource, and permitting or rejecting, based on a comparison result, a group resource access requested by the user.Type: GrantFiled: March 11, 2019Date of Patent: August 25, 2020Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Zhe Yuan, Ying Xiao
-
Patent number: 10733407Abstract: There is provided a method for obtaining a user authentication image using pressure sensing. The method includes dividing a pressure sensing area corresponding to a fingerprint input window, with which a biometric feature of a user is brought into contact, into a plurality of partial areas, acquiring a plurality of image frames captured through the fingerprint input window and obtaining, for the partial areas, respective pressure sensing values synchronized with a capturing time of each of the image frames. The method further includes generating the user authentication image from the image frames based on comparison results between the pressure sensing values respectively obtained for the partial areas and one or more predetermined thresholds.Type: GrantFiled: August 31, 2018Date of Patent: August 4, 2020Assignee: SUPREMA INCInventors: Jong Man Lee, Kideok Lee, Hochul Shin, Bong Seop Song, Jae Won Lee
-
Patent number: 10735497Abstract: Identifying users is disclosed including, in response to receiving an account operating request of an account sent by a user device, obtaining a personal question from a personal questions database and sending the personal question to the user device, receiving, from the user device, a verification response to the personal question, and determining whether a current user is a user associated with the account based at least in part on the verification response and a corresponding standard response in the personal questions database, where the personal question obtained from the personal questions database and the corresponding standard response were generated based at least in part on account operating information of the user associated with the account.Type: GrantFiled: June 19, 2015Date of Patent: August 4, 2020Assignee: Alibaba Group Holding LimitedInventor: Guanghui Yin
-
Patent number: 10693999Abstract: Embodiments of the present application relate to the technical field of computers, and in particular, to a method and a server for displaying access content, which are used to resolve the problem existing in the prior art that because information is inaccurately transmitted, a user may interrupt access or perform repeated access, causing a resource waste for a computer system or an Internet system.Type: GrantFiled: November 27, 2015Date of Patent: June 23, 2020Assignee: ALIBABA GROUP HOLDING LIMITEDInventor: Meiyue Zheng
-
Patent number: 10664606Abstract: A method of controlling access to a document file includes creating the document file, which is a mutable computer-readable file that includes content that is presentable to a user on an electronic display device. The document file is encrypted and provided to a user, including storing the encrypted document file on a content storage device associated with a unique global identifier. Encrypting the document file includes applying an encryption algorithm to the document file to reversibly cipher the document file. Applying the encryption algorithm to the document file includes providing an encryption key and the unique global identifier and actuating the encryption algorithm with the encryption key and the unique global identifier. The encrypted document file can be decrypted and the content presented to the user on an electronic display device through the use of a user interface application.Type: GrantFiled: May 10, 2019Date of Patent: May 26, 2020Inventor: Leonard L. Drey
-
Patent number: 10657319Abstract: Systems and methods are disclosed herein for combining a first annotation and a second annotation in an electronic document. The first annotation is received and corresponds to a first portion of the electronic document. The second annotation is received and corresponds to a second portion of the electronic document. A first position of a layout rendering of the first annotation is determined, and a second position of a layout rendering of the second annotation is determined. The first position of the layout rendering of the first annotation is compared to the second position of the layout rendering of the second annotation. When the first position conflicts with the second position, the first annotation and the second annotation are combined to form a stacked annotation.Type: GrantFiled: August 6, 2018Date of Patent: May 19, 2020Assignee: Google LLCInventor: Vance Julius Vagell
-
Patent number: 10650167Abstract: A trusted computing device (TCD) includes an isolated environment, host interface, secure interface, and program instructions. The environment includes an isolated environment processor (IEP), memory (secure and non-secure partition), and an auxiliary processor (AP). Memory and AP are connected for data communication with the IEP, and communicate with a host only through the IEP. The host interface and each secure interface are connected for data communication with the IEP.Type: GrantFiled: April 23, 2018Date of Patent: May 12, 2020Assignee: Google LLCInventors: Dominic Rizzo, Peiter Charles Zatko
-
Patent number: 10645069Abstract: A method and apparatus for location authentication of the user are disclosed. In the method and apparatus, the location of the user is authenticated if one or more conditions for geographic proximity associated with two or more devices of the user are satisfied. Upon the location of the user being authenticated, the user may be granted access to a service.Type: GrantFiled: February 12, 2018Date of Patent: May 5, 2020Assignee: Amazon Technologies, Inc.Inventor: Ahmed Fuad Siddiqui
-
Patent number: 10637871Abstract: Location-based authentication may be provided by an access management system on a server. The location-based authentication may determine whether a device should be granted access to a resource. The resource may either be located on or remote from the server. The location-based authentication may provide an additional authentication factor that is based on a past location of a user and/or device associated with the user requesting authentication. The past location may be associated with a user-configured question. The user-configured question may be provided to the device for an additional level of security. An answer received in response to a user-configured question may be compared to a user-configured answer that is associated with the user-configured question. In other examples, the answer may be compared to one or more possible answers that are determined by the access management system.Type: GrantFiled: July 25, 2017Date of Patent: April 28, 2020Assignee: Oracle International CorporationInventors: Aarathi Balakrishnan, Vipin Koottayi, Vikas Pooven Chathoth
-
Patent number: 10635370Abstract: An image forming apparatus includes a reading unit that reads data stored in an activity amount meter, at least one of an image forming unit that forms an image on a recording medium and an image reading unit that reads the image, a display unit that displays an option to be selected such that the display unit receives a use instruction of a function that is selected, and a sending unit that sends the data stored in the activity amount meter and read by the reading unit. The display unit receives the use instruction even when the sending unit is sending the data stored in the activity amount meter and read by the reading unit.Type: GrantFiled: March 29, 2017Date of Patent: April 28, 2020Assignees: TANITA CORPORATION, FUJI XEROX CO., LTD.Inventors: Senri Tanida, Sotaro Sakashita, Toshio Fuji, Hiroki Iida, Satoshi Yamamoto
-
Patent number: 10635704Abstract: A method comprises collecting, by a computing device located at an edge of a network, data items corresponding to information transmitted by endpoints using the network, generating, by the computing device, a probabilistic hierarchy using the data items, generating, by the computing device using the probabilistic hierarchy and natural language data, a similarity metric, generating, by the computing device using the probabilistic hierarchy, the natural language data, and the similarity metric, an ontology, detecting, by the computing device using the ontology, an anomaly, and in response to detecting the anomaly, sending a notification.Type: GrantFiled: July 15, 2016Date of Patent: April 28, 2020Assignee: Cisco Technology, Inc.Inventors: Hugo Latapie, Enzo Fenoglio, Andre Surcouf, Joseph T. Friel, Pete Rai
-
Patent number: 10628563Abstract: On-demand application permissions is described, including obtaining one or more consents associated with one or more functions of an application, where the application does not allow using the functions without associated consents; receiving, from a user, a consent associated with a function; activating to allow that function to be executed; when a request from the user to use another function is received, determining that the another function requires an associated consent to activate; determining that there is no consent from the user associated with the another function; prompting for a consent associated with the another function; receiving the consent associated with another function; and activating to allow the another function to be executed.Type: GrantFiled: March 12, 2018Date of Patent: April 21, 2020Assignee: Google LLCInventor: Alejo Grigera
-
Patent number: 10630773Abstract: Embodiments of the claimed subject matter provide systems and methods for configuring and connecting a controller to a game streaming service. The system includes a plurality of input controls and a network controller configured for communicating with a game streaming service. The system further includes a processor coupled to the plurality of input controls and the network controller. The processor is configured communicate with the game streaming service to login to a game streaming service account and communicate input from the plurality of controls to the game streaming service. The system further includes a power source configured to provide power to the plurality of input controls, the network controller, and the processor.Type: GrantFiled: November 12, 2015Date of Patent: April 21, 2020Assignee: Nvidia CorporationInventor: Stephen Holmes
-
Patent number: 10621374Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a row level security. One of the methods includes receiving, by a computer device executing at least part of a functional logic tier of an application, a request from a user for one or more objects present in the functional logic tier. The method includes determining that a type of the requested objects is associated with an object representative of instance level security. The method includes in response to determining that the type is associated with the object, determining access is authorized to at least some of the objects, determining access comprising accessing, by a computer device executing at least part of a data tier of the application, a link data structure that links the user with at least some of the objects. The method also includes providing the at least some of the objects to the user.Type: GrantFiled: May 22, 2018Date of Patent: April 14, 2020Assignee: Vinyl Development LLCInventor: Thomas R. Kennedy, Jr.
-
Patent number: 10599832Abstract: A proposed password is decomposed into basic components to determine and score transitions between the basic components and create a password score that measures the strength of the proposed password based on rules, such as concatenation, insertion, and replacement. The proposed password is scored against all known words, such as when a user is first asked to create a password for an account or access. The proposed password can also be scored against one or more previous passwords for the user, such as when the user is asked to change the user's previous password, to determine similarity between the two passwords.Type: GrantFiled: December 11, 2018Date of Patent: March 24, 2020Assignee: PayPal, Inc.Inventor: Bjorn Markus Jakobsson
-
Patent number: 10601800Abstract: A computer-implemented method is provided for authenticating an identity of a user requesting access to a computerized resource via a client computing device. The method includes receiving, by the client computing device, a request to authenticate the identity of the user, determining, by the client computing device, a time period of the request, determining, by the client computing device, an approximate geolocation of the user, and determining, by the client computing device, one or more network characteristics associated with a current network of the client computing device. The method further includes transmitting, by the client computing device to an authentication device, authentication data including the request, the time period of the request, the approximate geolocation of the user and the one or network characteristics.Type: GrantFiled: February 24, 2017Date of Patent: March 24, 2020Assignee: FMR LLCInventors: Jason Kao, Erkang Zheng
-
Patent number: 10601960Abstract: Methods, systems, and apparatus are described providing networking engines. Specifically, a method for implementing software containers implementing network engines that may be configured to act in a zero-knowledge environment is described. All information pertaining to the network engine associated with a user that is stored in the container is solely that of a user unless explicitly shared by the user. The containers may be configured to participate in a publish-and-subscribe network in order to share information. In addition, the containers may be provisioned with controls so that global operators may comply with local privacy rules.Type: GrantFiled: February 14, 2018Date of Patent: March 24, 2020Assignee: eIngot LLCInventors: William J. Raduchel, Art Spivy
-
Patent number: 10582082Abstract: Registration in an address book from a transmission history which may lead to erroneous transmission is prohibited, and other address book registration and the like are enabled, so that erroneous transmission can be prevented without impairing convenience.Type: GrantFiled: September 20, 2018Date of Patent: March 3, 2020Assignee: Canon Kabushiki KaishaInventor: Hikaru Sugita
-
Patent number: 10572648Abstract: A method for user passcode authentication. The method includes accessing a user information database with predefined user input option parameters and generating a random arrangement of input options from the predefined user input option parameters. The method includes manifesting the random arrangement of input options on an interactive display interface and receiving a selection of the interactive display interface input options. The method also includes comparing the received selection of interactive display interface options to the predefined user input option parameters.Type: GrantFiled: September 13, 2018Date of Patent: February 25, 2020Assignee: Arcanum Technology LLCInventors: Brian G. Finnan, Frank P. Brice, William Brooks Brown
-
Patent number: 10564943Abstract: In one approach, a method comprises: a virtual machine receiving an invocation instruction from a caller that invokes a callee, wherein the caller represents a first set of instructions and the callee represents a second set of instructions, wherein the invocation instruction is associated with a first set of arguments; in response to receiving the invocation instruction and determining that the callee requires one or more additional parameters to be supplied by the virtual machine, the virtual machine causing the one or more additional parameters to be appended to the first set of arguments to create a second set of arguments; wherein the virtual machine prevents the caller from providing the one or more additional arguments that are to be supplied by the virtual machine; the virtual machine invoking the callee using the second set of arguments.Type: GrantFiled: April 4, 2016Date of Patent: February 18, 2020Assignee: Oracle International CorporationInventor: John Robert Rose