Prevention Of Unauthorized Use Of Data Including Prevention Of Piracy, Privacy Violations, Or Unauthorized Data Modification Patents (Class 726/26)
  • Patent number: 10289869
    Abstract: A personal information anonymization method is disclosed. Each of a plurality of data including personal information is classified into any one of a plurality of groups based on a degree of commonality of the personal information. An anonymization process, that standardizes the personal information of each of data belonging to each of the groups, is performed for each of the groups. A total number of the data belonging to each of the groups is calculated for each of the groups. The plurality of the groups are classified based on the total number of the sets of the data. A classification result is output.
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: May 14, 2019
    Assignee: FUJITSU LIMITED
    Inventors: Masahiro Hamamoto, Shinji Matsune, Takao Yoshida
  • Patent number: 10282734
    Abstract: An authentication system configured to identify counterfeit articles. The authentication system configured to capture and scan an optical code engraved on an artifact, decode the optical code to determine a unique code associated with an article, transmitting the unique code to the authentication server and receiving a result of authentication from the authentication server to verify the authenticity of the article being scanned.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: May 7, 2019
    Assignee: Aintu Inc.
    Inventor: Arthur Vaysman
  • Patent number: 10277615
    Abstract: Systems, methods, and non-transitory computer readable media providing build and deploy a known file and identify unknown files found on the system. The method provides, deploying a file, creating a unique hash tag identifier and metadata associated with the file. A database entry is created for the hash tag identifier and metadata associated with the file. An unknown file is discovered on the system, a unique hash code identifier is generated and searched for in the database. If the unique hash code identifier is found the metadata is retrieved and returned for display, however if the hash code identifier is not found the unknown file is marked as a candidate for removal and deleted from the system.
    Type: Grant
    Filed: September 7, 2016
    Date of Patent: April 30, 2019
    Assignee: Walmart Apollo, LLC
    Inventors: Jimmie Russell Clark, Christopher Soames Johnson, Jeffrey Stone
  • Patent number: 10275510
    Abstract: A system and method for seamless access to remotely manage documents using synchronization of locally stored documents are provided. In some embodiments, a content management server stores documents in a cache on the user's computer. Documents can thus be accessed and edited using the document in the local file system of the user and synchronized with the content management server asynchronously to access the documents on the local files system. Advantageously, the teachings of embodiments as described can be used in conjunction with content management systems for providing faster access to documents in conjunction with editing and for enabling offline work on such documents.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: April 30, 2019
    Assignee: Open Text SA ULC
    Inventors: Raja Elias Hawa, Matthew David George Timmermans
  • Patent number: 10268839
    Abstract: In an example embodiment, confidential data submitted by a user and one or more attributes of the user are obtained from one or more submission tables in a confidential information database. It is then determined that the one or more attributes of the user correspond to a first slice. In response to the determining, a count associated with the first slice is incremented. The count associated with the first slice is compared with a first threshold. In response to a determination that the count associated with the first slice transgresses the first threshold, the confidential data and the one or more attributes are added to a backend queue. Then, extraction, transformation, and loading (ETL) of the confidential data in the backend queue is performed and the confidential data is placed in an ETL table, in the confidential information database corresponding to the first slice.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: April 23, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Krishnaram Kenthapadi, Ahsan Chudhary, Joseph Florencio, Anthony Duane Duerr, Cory Scott
  • Patent number: 10257284
    Abstract: Techniques include broadcasting, via a local wireless network (e.g., Wi-Fi, Bluetooth, or NFC), a uniform resource locator (URL) template (e.g., an alphanumeric string) that references a software application (app) and indicates one or more operations (e.g., a function) for the app to perform based on one or more parameters (e.g., alphabetic, numeric, and/or symbolic characters). In this example, the URL template includes one or more fields (e.g., placeholders) configured to indicate the parameters. The techniques further include, in response to broadcasting the URL template, receiving, from a mobile user device (e.g., a smartphone) via the network, a URL including (e.g., generated based on) the template, where the fields include one or more user-specified parameters specified by a user of the device. The techniques also include causing the software app to perform the operations (e.g., the function) based on the user-specified parameters included in the fields of the received URL.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: April 9, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Jonathan Ben-Tzur
  • Patent number: 10257157
    Abstract: An apparatus prevents communication by a client device to a domain that cannot be uniquely identified by relocating the DNS mapping of the domain to a destination IP Address that is uniquely identifiable and that represents a location of an apparatus that provides a data path to the domain.
    Type: Grant
    Filed: May 17, 2018
    Date of Patent: April 9, 2019
    Assignee: iboss, Inc.
    Inventor: Paul Michael Martini
  • Patent number: 10255342
    Abstract: A method of processing and validating transactions on a multi-chain network including receiving first and second pluralities of transactions, recording the first and second pluralities of transactions to first and second blocks on a first blockchain in a multi-chain network, publishing the first and second plurality of transactions to a first managed topic associated with the multi-chain network on a first messaging server, defining a first published transactions, and transmitting the first published transactions to a first subscriber, defining a first transmitted transaction. Receipt of the first transmitted transaction initiates generation of a first merged block comprising the first published transactions and recording of the first merged block to a second blockchain on the multi-chain network.
    Type: Grant
    Filed: September 19, 2018
    Date of Patent: April 9, 2019
    Inventors: Vijay K. Madisetti, Arshdeep Bahga
  • Patent number: 10255446
    Abstract: Embodiments provide methods, devices and computer program arranged to control access to clipboards by applications. In one embodiment a user device comprises: at least one processor; and at least one memory comprising computer program code and an application that has been provisioned by an application provisioning entity, the application having access to a first clipboard of a first type, to which data can be transferred and/or from which data can be retrieved by a further, different, application on the user device, wherein the application is configured with an encryption key for the transfer of data to and/or retrieval of data from a second clipboard of a second, type, clipboard, the encryption key being associated with the application provisioning entity. The user device can control the transfer of data to and/or retrieval of data from the second clipboard by the application via the encryption key.
    Type: Grant
    Filed: July 7, 2015
    Date of Patent: April 9, 2019
    Assignee: BlackBerry Limited
    Inventors: Simon Brooks, Siavash James Joorabchian Hawkins, Christopher Rankin
  • Patent number: 10257703
    Abstract: An improved technique for identifying a user's mobile device is discussed. A persistent and unified identifier that bridges mobile app to mobile web and to other web browser-compatible mediums is utilized. Using a unique verification identifier, the unified identifier is consistently verified, revived and distributed across application and browser mediums.
    Type: Grant
    Filed: March 5, 2018
    Date of Patent: April 9, 2019
    Assignee: ACK Ventures Holdings, LLC
    Inventors: David Ulrich, Harry Kargman, Steve Anson, Jeremy Sadwith, Bernhard Valenti, Ryan McConville
  • Patent number: 10250588
    Abstract: The disclosed computer-implemented method for determining reputations of digital certificate signers may include (i) identifying a group of endpoint devices that have accessed files to which a digital certificate signer has attached digital certificates that assert the files are legitimate, (ii) determining, for each endpoint device, whether a security state of the endpoint device is compromised or uncompromised based on a security analysis of computing events detected on the endpoint device, (iii) classifying the digital certificate signer as potentially malicious by determining that the files were accessed more frequently by endpoint devices with compromised security states than by endpoint devices with uncompromised security states, and (iv) protecting a security state of an additional endpoint device by preventing the additional endpoint device from accessing a file with a digital certificate signed by the digital certificate signer.
    Type: Grant
    Filed: March 7, 2017
    Date of Patent: April 2, 2019
    Assignee: Symantec Corporation
    Inventors: Shayak Tarafdar, Sunil Kumar, Pratik Vagyani
  • Patent number: 10242213
    Abstract: System and method to produce an anonymized cohort, members of the cohort having less than a predetermined risk of re-identification. The system includes a user-facing communication interface to receive an anonymized cohort request comprising traits to include in members of the cohort; a data source-facing communication channel to query a data source, to find anonymized records that possess at least some of the requested traits; and a processor programmed to carry out the instructions of: forming a dataset from at least some of the anonymized records; calculating a risk of re-identification of the anonymized records in the dataset based upon the data query; perturbing anonymized records in the dataset that exceed a predetermined risk of re-identification, until the risk of re-identification is not greater than the pre-determined threshold, to produce the anonymized cohort; and providing, via a user-facing communication channel, the anonymized cohort.
    Type: Grant
    Filed: September 21, 2016
    Date of Patent: March 26, 2019
    Assignee: PRIVACY ANALYTICS INC.
    Inventors: Martin Scaiano, Andrew Baker, Stephen Korte, Khaled El Emam
  • Patent number: 10235528
    Abstract: A mechanism is provided for automatically determining an importance of vulnerabilities identified in an application. An identified application is scanned for a set of vulnerabilities with uncertain importance. For each vulnerability with uncertain importance in the set of vulnerabilities with uncertain importance, a set of characteristics is identified, a level of importance for the vulnerability with uncertain importance is determined utilizing the set of characteristics, and the level of importance is assigned to the vulnerability with uncertain importance thereby forming an identified vulnerability.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: March 19, 2019
    Assignee: International Business Machines Corporation
    Inventor: Wayne Diu
  • Patent number: 10230526
    Abstract: An out-of-band Domain Name System (DNS) security technique uses a cryptographic blockchain for securing and validating DNS data in a chain of custody that exists outside the DNS namespace, allowing validated access to cached DNS information without requiring real-time access to root servers.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: March 12, 2019
    Inventor: William Manning
  • Patent number: 10229276
    Abstract: Method, apparatus, computer programs and data structures are provided, according to at least one embodiment, wherein an author of digital content identifies at least some trusted code that the author trusts to be used to read digital content, and stores information in the unit of digital content that is capable of identifying the trusted code. In at least some embodiments, the unit of digital content is an electronic document. In other embodiments, a publisher of the trusted code, or an author of the digital content, signs the trusted code with a private key, and a certificate associated with the private key is embedded in the unit of digital content. The certificate may provide public key information associated with the private key. The public key may be used to verify that code is trusted before it is allowed access to the unit of digital content.
    Type: Grant
    Filed: June 12, 2006
    Date of Patent: March 12, 2019
    Assignee: ADOBE INC.
    Inventor: James Lester
  • Patent number: 10229068
    Abstract: An approach to implementing or configuring an Oblivious RAM (ORAM), which in addition to behaving as a RAM, provides a way to meet a specified degree of privacy in a manner that avoids applying unnecessary computation resources (computation time and/or storages space and/or data transfer) to achieve the specified degree of privacy. In this way, a tradeoff between privacy and computation resources may be tuned to address requirements of a particular application. This ability to tune this tradeoff is not found in other ORAM implementations, which in general aim to achieve complete privacy. In some implementations, the ORAM provides a constant bandwidth overhead compared to conventional RAMs, while achieving a statistical privacy as desired by the user.
    Type: Grant
    Filed: December 29, 2016
    Date of Patent: March 12, 2019
    Assignee: The Trustees of Princeton University
    Inventors: Sameer Wagh, Paul Cuff, Prateek Mittal
  • Patent number: 10225257
    Abstract: A modular, expandable, and flexible computer system device is provided. The computer system device comprising a multiple number of individual modules interconnected physically via ‘back plane’ means with each module independently processing and executing specified computer functions utilizing internal or shared resources. Electrical power distribution and data communications are positioned between modules with the electrical power distribution and data communications internal to the base unit module.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: March 5, 2019
    Inventors: Danilo E. Fonseca, Manny A. Fonseca
  • Patent number: 10217379
    Abstract: A vision-assist device may include one or more sensors configured to generate data corresponding to one or more objects present in an environment, and a processor communicatively coupled to the one or more sensors. The processor is programmed to identify one or more objects present in the environment based on the data generated by the one or more sensors, classify the environment based on the one or more identified objects, and modify at least one parameter of the vision-assist device based on the classification of the environment.
    Type: Grant
    Filed: January 30, 2015
    Date of Patent: February 26, 2019
    Assignee: Toyota Motor Engineering & Manufacturing North America, Inc.
    Inventor: Joseph M. A. Djugash
  • Patent number: 10216803
    Abstract: In one embodiment, a method includes retrieving a plurality of comments associated with a content object on a social-networking system, determining a score for each of the comments, wherein the score is based on one or more signals associated with the comment, and where the signals are related to the identity of an author of the comment or content of the comment, ordering the comments based on the respective scores, and presenting one or more of the ordered comments to a target user. The method may further include excluding one or more of the comments based on a filtering condition. One of the signals may be based on how many times the comment has been (a) liked, (b) hidden, (c) marked as spam, or (d) replied to within a specified period of time. One of the signals may be based on a reputation of the author of the comment.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: February 26, 2019
    Assignee: Facebook, Inc.
    Inventors: Allison Elaine Ball, Kaushik Mohan Iyer, Ashoat Tevosyan, Mikhail I. Okunev, Erich James Owens
  • Patent number: 10218567
    Abstract: A computer-implemented method for generating an identifier for a device includes identifying one or more applications from a plurality of applications installed on a device; generating an identifier for the device based on the one or more identified applications; and providing the generated identifier as identification for the device. Another computer-implemented method for identifying a device includes: receiving information that indicates one or more applications of a plurality of applications installed on a device; and identifying the device using the received information.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: February 26, 2019
    Assignee: Google LLC
    Inventors: Alexander F. Kuscher, Brian Chu
  • Patent number: 10210021
    Abstract: Disclosed aspects include managing a set of assets for a user in a shared pool of configurable computing resources. The shared pool of configurable computing resources has a set of virtual machines. A set of usage data for the user is established. The set of usage data corresponds to usage of an asset by the user. Based on the set of usage data for the user, an asset action for the asset for the user on a virtual machine is determined. In response to determining the asset action for the asset, the asset action for the asset for the user on the virtual machine is selected.
    Type: Grant
    Filed: December 5, 2017
    Date of Patent: February 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Bin Cao, James E. Carey, Bradley L. Manning
  • Patent number: 10192234
    Abstract: Methods and apparatus are described for enabling actionable content by embedding title materials corresponding to digital bearer instruments in digital media.
    Type: Grant
    Filed: November 15, 2007
    Date of Patent: January 29, 2019
    Assignee: API Market, Inc.
    Inventors: Kevin Collins, Stefan Roever, Kevin Wray, Alex F. Clark, Karl Ginter
  • Patent number: 10192037
    Abstract: A computationally implemented system and method that is designed to, but is not limited to: electronically receiving directive information including verification information to electronically verify issuance of the directive information by at least one authorized entity, living being identification associated with a particular individual living being, and reporting directions for electronically recording occurrence information to indicate at least one occurrence of at least partial preparation of a particular ingestible product designated by the reporting directions to be associated with an electronically inputted identification of the particular individual living being as verified using the living being identification electronically received with the directive information; and electronically transmitting the occurrence information to an electronic receiving device to be accessed by at least one recipient identified by the reporting directions as authorized to access the occurrence information subsequent to v
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: January 29, 2019
    Assignee: Elwah LLC
    Inventors: Paul Holman, Royce A. Levien, Mark A. Malamud, Neal Stephenson, Christopher Charles Young
  • Patent number: 10194321
    Abstract: A forensics analysis is conducted on each of multiple mobile devices in an enterprise system to detect malicious activity. The systems and methods described include storing a single baseline image for the multiple mobile devices at a server. A client-side application on each mobile device scans storage locations to identify changes in data compared to a previous scan. At least a portion of the information about the changes is sent to the server. The server reconstructs snapshot images for each mobile device based on the baseline image and the received information. Malicious activity is detected by comparing the reconstructed snapshot image to a previous snapshot image for each mobile device.
    Type: Grant
    Filed: October 24, 2013
    Date of Patent: January 29, 2019
    Assignee: THE MITRE CORPORATION
    Inventor: Mark D. Guido
  • Patent number: 10192067
    Abstract: Various embodiments provide techniques and devices for implementing a self-described security model for sharing secure resources between secure applications. In some examples, a trustlet can include a self-described policy defining capabilities of the trustlet and/or membership in a scenario group managed by a signing authority. Further, the trustlet can include a code signature signed by the signing authority. Additionally, a proxy kernel can allow the trustlet to share application data with other trustlets in the scenario group based on the policy and the code signature without exposing the application data to compromised system software and/or unauthorized applications.
    Type: Grant
    Filed: May 26, 2016
    Date of Patent: January 29, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Alain F. Gefflaut, Andrew W. Harper
  • Patent number: 10191908
    Abstract: A method for managing data loss prevention policies for applications may include 1) maintaining, in at least one database, a categorization of at least one application as either a business application or a personal application, 2) assigning, in the database, a data loss prevention policy to the application based on the categorization of the application in the database as either a business application or a personal application, 3) detecting that the application is attempting to access sensitive data, and 4) applying, in response to the detected attempt by the application to access sensitive data, the data loss prevention policy assigned to the application to the detected attempt by the application to access sensitive data. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 8, 2011
    Date of Patent: January 29, 2019
    Assignee: Symantec Corporation
    Inventors: Dhananjay Namdeo Dodke, Sarin Sumit Manmohan
  • Patent number: 10176528
    Abstract: A computer system includes a data storage module which receives, stores, and provides access to determinate data, raw indeterminate data, and extracted indeterminate data captured by an indeterminate data capture module. The computer system also includes a computer processor, a model training component, and a screening module. The model training component generates the predictive model based upon historical determinate and indeterminate data, and continuously adapts the predictive model with new historical data. The screening module categorizes current claims according to whether they are suitable for predictive analysis by the predictive model. The predictive model is applied to the current claims suitable for predictive analysis to determine a value for each claim indicative of whether the current claim transaction is questionable. The system also includes an output device which outputs the determined value for each claim, and a routing modules which routes claim workflow based on the outputted values.
    Type: Grant
    Filed: June 24, 2016
    Date of Patent: January 8, 2019
    Assignee: Hartford Fire Insurance Company
    Inventors: Jonathan Kaleb Adams, John Albert McGoldrick, James Dominic Ruotolo
  • Patent number: 10171505
    Abstract: Embodiments for implementing change control management in computing center environments by a processor. A physical activity of a user performing an action in the computing center environment is monitored. If the monitored activity is determined to be contrary, or predicted to be contrary, to a preferred, predetermined action for the computing center environment, the user is alerted that the action is contrary, and an operation is performed on the computing center environment to secure data in the computing center environment from damage potentially caused by the contrary action.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: January 1, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Emmanuel Barajas Gonzalez, Shawn M. Bramblett, Alan Dash, Shaun E. Harrington
  • Patent number: 10169594
    Abstract: In one embodiment of the present invention, a server is created, and a computer readable storage media is included in the server. An adapter is connected to the server, a set of packets is received by the adapter from a network, and the network and a repository are interfaced by the adapter. A firmware is stored on the adapter, and the adapter is controlled by the firmware. A management component is stored on the computer readable storage media, and the server is managed by the management component. A driver is stored on the management component, and the driver communicates with the adapter. A set of filters that controls transmission of the set of packets is created, and each filter in the set of filters has a set of filter rules. The set of filters is stored on the server.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Zah Barzik, Maxim Kalaev, Alexander Snast
  • Patent number: 10171458
    Abstract: In a first implementation, a host determines to pair with a device and transmits biometric data for a user to the device. The device receives the transmitted biometric data and compares such to device biometric data to determine whether or not to pair with the host and/or what data stored by the device to allow the host to access. The host then accesses data of the device to which the device has allowed access. In another implementation, a device determines to pair with a host and transmits biometric data for a user to the host. The host receives the transmitted biometric data and compares such to device biometric data to determine whether or not to pair with the device and/or what data stored by the host to allow the device to access. The device then accesses data of the host to which the host has allowed access.
    Type: Grant
    Filed: February 25, 2016
    Date of Patent: January 1, 2019
    Assignee: Apple Inc.
    Inventors: Chang Zhang, Qing Liu
  • Patent number: 10165002
    Abstract: A system for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Grant
    Filed: February 23, 2017
    Date of Patent: December 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Patent number: 10165075
    Abstract: A system and method for retrieving shared content by a proxy is provided. The system and method includes a data store comprising a computer readable medium storing a program of instructions for performing the retrieving of the shared content by the proxy; a processor that executes the program of instructions; a data aggregation unit to receive information about an Internet user associated with a web browser from a first data provider and a second data provider, and to aggregate the received information; a vector creation unit to create a vector based on the aggregated received information; a proxy communication unit to transmit the vector to the proxy, and to receive a short term cookie based on the vector from the proxy; and a shared content receiving unit to receive shared content from an online shared content network based on the short term cookie.
    Type: Grant
    Filed: April 1, 2016
    Date of Patent: December 25, 2018
    Assignee: Google LLC
    Inventor: Andrew Gildfind
  • Patent number: 10165003
    Abstract: A method for identifying an imposter account in a social network includes a monitoring engine to monitor user accounts of a social network, an identifying engine to identify attributes associated with each of the user accounts of the social network, a matching engine to match the attributes associated with each of the user accounts of the social network, a determining engine to determine when one of the user accounts is an imposter account associated with identity theft of a victim account, a calculating engine to calculate a threshold, and an executing engine to execute an action against the identity theft of the victim account by the imposter account.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: December 25, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: A. Julie Kadashevich, Jane B. Marcus, Jessica L. Piziak, Purvi K. Trivedi
  • Patent number: 10162492
    Abstract: A link selection area may be provided. When rendering a document comprising a plurality of selectable elements, a selection area may be defined around each of the plurality of selectable elements, such as links. Upon receiving a selection of one of these selection areas, an action associated with the respective selectable element associated with the at least one selection area may be performed.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: December 25, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Chin-Nan Lee, Yun-Huan Lee, Hsiang-Fu Liu, Ta-Chung Tsai, Shu-Fong Huang
  • Patent number: 10164987
    Abstract: Embodiments of a system and method for controlling access to personal information are generally described herein. In an example, a method may include receiving, at an internal server, data including personal information from a third party website, the personal information including a member identification to a social networking service, adding a time to live envelope to the data, receiving a request for the data, determining whether the time to live envelope indicates that the data is accessible, in response to determining that the time to live envelope indicates that the data is accessible, releasing the data according to the request, and aggregating the data with other information.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: December 25, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sheng Zhao, Lutz Thomas Finger, Rezaur Rahman
  • Patent number: 10152686
    Abstract: A shipping system and method for managing shipping of electronic devices with customer personal information. One or more electronic devices are scanned prior to shipping to a destination. A determination is made whether the one or more electronic devices include customer personal information in response to the scanning. An identification and metadata of the one or more electronic devices are recorded in response to determining the customer personal information is included on the one or more electronic devices. The one or more electronic devices are prevented from shipping by stopping generation of a shipping label for the one or more electronic devices.
    Type: Grant
    Filed: November 8, 2013
    Date of Patent: December 11, 2018
    Assignee: FedEx Supply Chain Logistics & Electronics, Inc.
    Inventors: Brian Gventer, Ken Nguyen, Kevin Asbury, Joel McCarty, Mike Lowry
  • Patent number: 10148388
    Abstract: With the proliferation of digital tool and content, it is becoming easier for adversaries to copy and modify digital content without detection or control by a content owner. Computing systems are provided to detects client-side data mutations. Responsive to a request to access the content data from a client device, a server compiles data that includes the content data, a mark and executable instructions for detecting data mutations, and sends this data to the client device. The client device then, based on the received instructions, stores the local environment properties relating to playing or viewing the content data, incorporates the mark with the content data, and allows the content data to be played or viewed or accessed. The client device also conducts checks in relation to the content data, the marker, and the local environment properties. If a data mutation is detected, the client device initiates an alert protocol.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: December 4, 2018
    Assignee: BitCine Technologies Incorporated
    Inventor: Tyson G. E. Louth
  • Patent number: 10142684
    Abstract: In one embodiment, a method, comprising obtaining a first uniform resource identifier for a segment of a content item, obtaining encryption metadata indicative of encryption information to be used for encrypting the segment when the segment is requested by a client device or a content delivery network, generating a data combination based on the first uniform resource identifier and the encryption metadata, generating an authentication code or a signature by applying a secret to the data combination, the secret being unknown to the client device or the content delivery network, generating a second uniform resource identifier for the segment based on the authentication code or the signature, the encryption metadata and the first uniform resource identifier, inserting the second uniform resource identifier in an adaptive bitrate media playlist for the content item, and sending the adaptive bitrate media playlist to the client device or the content delivery network.
    Type: Grant
    Filed: March 21, 2017
    Date of Patent: November 27, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Paul Rutland, John Allen
  • Patent number: 10142106
    Abstract: An approach is provided for securing data in a technical environment. In one embodiment, a processor obtains a first file, which when executed installs a first portion of a second file and an assembly key to assemble the second file. The processor executes this first file and then obtains the second portion of the second file. The processor assembles the second file using the first portion, the second portion, and the assembly key.
    Type: Grant
    Filed: October 20, 2017
    Date of Patent: November 27, 2018
    Assignee: Hand Held Products, Inc.
    Inventors: Erik Todeschini, Stephen Patrick Deloge, Donald Anderson
  • Patent number: 10135805
    Abstract: Systems and methods for device-based authentication are disclosed. In some implementations, a device receives a Single Sign On PIN from a backend server. The device transmits, to a token server, the Single Sign On PIN and credentials of a subscriber identity module (SIM) to request a token for accessing a network resource via a computer different from the device. The token is associated with a user account. The device receives the token from the token server. The device stores the token at a local memory of the device.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: November 20, 2018
    Assignee: Cellco Partnership
    Inventors: Mohammad Raheel Khalid, Ji Hoon Kim, Cory Michael Bruno, Paul Berman, Mauricio Pati Caldeira De Andrada, Samir Vaidya
  • Patent number: 10133880
    Abstract: Disclosed are systems and methods for blocking access to interface elements of a page of an application in an applications store. The computing device executes executing a restrictive application that restricts use of the computing device. The restrictive application can determine that a page of the application in the application store is being presented on a display of the computing device and block access to interface elements of the application page, thereby preventing punitive evaluations of the restrictive application. To restore access to the application store page, the restrictive application may obtain authentication data associated with an authorized user, and responsive to determining that the obtained authentication data satisfies one or more conditions for unblocking, provide access to the interface elements of the page of the application in the applications store.
    Type: Grant
    Filed: June 20, 2017
    Date of Patent: November 20, 2018
    Assignee: AO KASPERSKY LAB
    Inventor: Victor V. Yablokov
  • Patent number: 10127621
    Abstract: A server system for distributing information securely includes a network interface for receiving, over a network, an information object accompanied by metadata. A repository stores the information object. Metadata is mapped to electronic addresses of trusted recipients. A processor is configured to generate a link for accessing the information object in the repository, acquire an electronic address of a trusted recipient based on the metadata accompanying the information object, insert the link into an electronic message addressed to the electronic address of the trusted recipient, and send the electronic message with the link to the trusted recipient. The processor is further configured to receive, over a second network, a request for the information object sent from a user device in response to an activation of the link, retrieve the information object from the repository, and transmit the information object to a browser of the user device over the second network.
    Type: Grant
    Filed: January 11, 2017
    Date of Patent: November 13, 2018
    Assignee: AWARE, INC.
    Inventors: James Giulio Cialdea, Alexis Tzannes, Adrian Gropper
  • Patent number: 10129207
    Abstract: A network device having multiple service units receives an outbound packet of a communication session, where the service units can perform network address translation (NAT) on the outbound packet. The outbound packet includes a private source network address and source port. The network device applies a service unit selection function to a header of the outbound packet to produce a first result, and selects, based on the first result, a service unit to perform NAT for packets of the communication session. The network device determines a port for network address translation that produces a second result equal to the first result when the service unit selection function is applied to the portion of the header when the portion includes a selected public network address and determined port. The service unit can thereby perform session-aware services on packets of the communication session without redirecting the packets between the service units.
    Type: Grant
    Filed: July 20, 2015
    Date of Patent: November 13, 2018
    Assignee: Juniper Networks, Inc.
    Inventors: Wei Wan, Zengqiang Yuan, Qiong Wang
  • Patent number: 10116609
    Abstract: Technologies are described related to third party email signature generation and authentication. A DKIM signature may be stamped in a way such that the “From” address is encoded in the selector. The domain may be extracted from the DKIM signature based upon being from a known sender in the d=field, which signs on behalf of another domain. The reconstructed domain may be aligned from the selector against the actual domain in the “From” address to pass DMARC.
    Type: Grant
    Filed: November 8, 2015
    Date of Patent: October 30, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Terry Zink, Mauktik Gandhi, Robert Herbst, Shashank Kavishwar
  • Patent number: 10115099
    Abstract: Systems, apparatus, and methods for managing an application installed on a mobile device, such as a mobile phone are provided, so as to prevent or limit unauthorized use of the application, for example, when the mobile device is lost, stolen, or otherwise subject to unauthorized use. A request to enable or disable user access to a function of the application can be received by a server computer. A command message responsive to the request can be generated by the server computer, the command message comprising control data for enabling or disabling user access to the function of the application. The generated command message can be transmitted to the mobile device over a wireless network.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: October 30, 2018
    Assignee: Visa International Service Association
    Inventors: Christian Aabye, Olivier Brand, Michael Lindelsee, Joseph J. Mirizzi, Hao Ngo, Lauren White, David William Wilson
  • Patent number: 10114975
    Abstract: An apparatus has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to store a semi-structured document database including a collection of documents having semi-structured data formats. Data redaction rules are defined. Each data redaction rule includes a redaction type and a path expression to a redaction location within a semi-structured data format of a document within the collection of documents. The data redaction rules are applied to form redacted documents. The redacted documents are supplied.
    Type: Grant
    Filed: January 13, 2017
    Date of Patent: October 30, 2018
    Assignee: MarkLogic Corporation
    Inventors: Junfeng Sun, Caio Vinicius B. Milani
  • Patent number: 10115100
    Abstract: Systems, apparatus, and methods for managing an application installed on a mobile device, such as a mobile phone are provided, so as to prevent or limit unauthorized use of the application, for example, when the mobile device is lost, stolen, or otherwise subject to unauthorized use. An input indicative of a password to access the application can be received. It may be determined that a predetermined number of password entry attempts has been reached based on the input. A request message to disable access to the application can be transmitted from the mobile device to a remote computer. One or more lock instructions for disabling access to the application can be received by the mobile device from the remote computer. The one or more lock instructions can be executed by the mobile device by modifying control data within a secure memory of the mobile device.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: October 30, 2018
    Assignee: Visa International Service Association
    Inventors: Christian Aabye, Olivier Brand, Michael Lindelsee, Joseph J. Mirizzi, Hao Ngo, Lauren White, David William Wilson
  • Patent number: 10116635
    Abstract: A mobile-based equipment service system includes a remote server, a mobile device, and at least one equipment controller. The mobile device includes a user interface, and is configured to send a user authentication message, initiated by a user via the user interface, to the remote server. The remote server is configured to verify the user via the user authentication message and once verified, send an encrypted blob to the mobile device in response to the user authentication message. At least one equipment controller is configured to receive and decrypt the encrypted blob from the mobile device.
    Type: Grant
    Filed: April 27, 2017
    Date of Patent: October 30, 2018
    Assignee: OTIS ELEVATOR COMPANY
    Inventors: Devu Manikantan Shila, Arthur T. Grondine, Michael Garfinkel, Teems E. Lovett
  • Patent number: 10110771
    Abstract: A printed document manager manages printed documents associated with respective electronic documents. When a document is printed, a graphical symbol referred to as a “postmark” is generated and inserted into the print stream so the postmark is printed on the hard copy of the document. The printed document is logged in a printed document store along with metadata associated with the printed document. The postmark on the printed document can be used for one or more purposes, such as to determine whether the printed document is current, to locate the corresponding print image in the printed document store, to locate the corresponding electronic document in the document management system, to automatically file a hand-notated version of the printed document, and to determine whether the printed document can be shredded after use. The printed document manager thus provides a way to effectively manage printed documents.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: October 23, 2018
    Assignee: DocSolid LLC
    Inventors: Steven W. Irons, David R. Guilbault, Eric R. Lynn, Simon Okunev, Ian M. Miller
  • Patent number: 10108742
    Abstract: An apparatus has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to store a semi-structured document database including a collection of documents having semi-structured data formats. Data redaction rules are defined. Each data redaction rule includes a redaction type and a path expression to a redaction location within a semi-structured data format of a document within the collection of documents. At least one data redaction rule includes a configurable range of redaction values and a configurable format for the redaction values. The data redaction rules are applied to form redacted documents. The redacted documents are supplied.
    Type: Grant
    Filed: January 23, 2018
    Date of Patent: October 23, 2018
    Assignee: MarkLogic Corporation
    Inventors: Junfeng Sun, Caio Vinicius B. Milani