Access Control Patents (Class 726/27)
  • Patent number: 10637915
    Abstract: The subject technology provides for receiving, via an application programming interface (API), a request from a client, the request including software configuration data for configuring data storage for supporting a workload of an application. A set of hardware performance characteristics for supporting the workload of the application is determined based at least in part on the software configuration data that includes a name of a respective software application and/or version of the software application. The subject technology determines a current set of available hardware resources that match the set of hardware performance characteristics. Using the current set of available hardware resources, a set of data stores are provisioned. The subject technology then provides, to the client, information related to a virtual mount point for provisioning the set of data stores to the application.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: April 28, 2020
    Assignee: Amazon Technologies, Inc.
    Inventor: Miles Julian Ward
  • Patent number: 10630490
    Abstract: A secure element (SE) with a notion of time useful for checking secure items is disclosed herein. Methods of obtaining time information by the SE include push, pull, opportunistic, local interface, and multi-check methods. Time information can be obtained from a root certification authority (CA) and one or more subordinate CAs, which are associated with and subordinate to the root CA. The SE uses the time information for time management of time values stored in the SE. The SE also uses the time information in cooperation with certificate revocation lists (CRLs) and/or online certificate status protocol (OCSP) stapling procedures.
    Type: Grant
    Filed: March 9, 2018
    Date of Patent: April 21, 2020
    Assignee: Apple Inc.
    Inventor: Xiangying Yang
  • Patent number: 10623185
    Abstract: Granting an aligned secured access to a resource for a client system. A first authentication token and a first validity time period value are received from a first server. The first authentication token includes an authorization for accessing the system resource and the predefined session time. The first authentication token including the predefined session time is sent from the client system to a second server. A second validity period value of a second validity period of a second authentication token for a service provided by the second server to the client system is set equal to the received predefined session time. The second authentication token for the second validity period is sent from the second server to the client system such that an aligned secured access is granted for the client system to the resource.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: April 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sascha Schefenacker, Stefan Schmitt
  • Patent number: 10616759
    Abstract: Some embodiments relate to a device that transmits/receives encrypted communications with another device. A first device, such as a smart phone or smart watch, may generate a message associated with a certain data class, which may determine the security procedure used in the communication of the message. The first device may establish an encryption session for the purpose of communicating the message to a second device. Prior to sending the message, the first device may wait until encryption credentials are accessible according to certain conditions, which may be determined at least in part by the data class of the message. Similarly, after receiving the message, the second device may not be able to decrypt the message until encryption credentials are accessible according to certain conditions, which may be determined at least in part by the message data class.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: April 7, 2020
    Assignee: Apple Inc.
    Inventors: Berkat S. Tung, Daniel B. Pollack, Hyeonkuk Jeong, Joe S. Abuan, Pierre J. De Filippis, Yan Yang
  • Patent number: 10609075
    Abstract: An apparatus for computer-network security includes a network interface and a processor. The network interface is configured for communicating over a communication network. The processor is configured to detect a request from a first computer to access a non-existent shared resource of a second computer, to send to the first computer, responsively to the request, a response that imitates a genuine grant of access to the non-existent shared resource, so as to initiate an interaction between the first computer and the shared resource, and to process the interaction so as to identify a malicious activity attempted by the first computer.
    Type: Grant
    Filed: April 20, 2017
    Date of Patent: March 31, 2020
    Assignee: GUARDICORE LTD.
    Inventors: Yoni Rozenshein, Ofri Ziv
  • Patent number: 10607263
    Abstract: Disclosed are systems and methods for improving interactions with and between computers in an authentication system supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data across platforms, which data can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide advanced, computerized security features that dynamically, in real-time, determine parameters that must be entered in order for a user to login to a system or platform, as well as the quantity and order such parameters must be entered. The disclosed systems and methods involve computerized mechanisms for authenticating a user or device for which access to a web-based resource is desired. Requested credentials in accordance with the dynamically determined manner in which such credentials are automatically determined and requested must be appropriately entered.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: March 31, 2020
    Assignee: OATH INC.
    Inventors: Manoj Palki, Alice Gutman, Gabriel Maganis, Francis Hsu
  • Patent number: 10600055
    Abstract: Aspects of the invention relate to a central authentication and interaction tracking system for authenticating an entity making a request related to a financial account. The system facilitates authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity. The system includes an application interface receiving interaction requests over a network, the interaction requests originating from multiple entities and including a plurality of authentication factors. The system further includes a computer processor and computer memory capable of building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes indicators of the authentication factors from each initiated transaction request.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: March 24, 2020
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Stephen Durney, Tracy M. Pletz, Timothy A. Webb
  • Patent number: 10599952
    Abstract: A method includes passing an original text document through distortion filter generators to generate a training dataset that includes distorted text documents. Each distortion filter generator is configured to distort words or letters of words in phrases of text of a facsimile image in a respective unique manner. A neural network model is trained to recognize each respective distortion and match each respective distortion with each respective distortion filter generator based on the training dataset and the original text document. Image data of one facsimile having at least one text distortion is received and inputted to the trained neural network model. The output of the trained neural network model is coupled to an input of an optical character recognition (OCR) engine. The trained neural network model and the OCR engine convert the received image data of the incoming facsimile corrected for the at least one text distortion to machine-encoded text.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: March 24, 2020
    Assignee: Capital One Services, LLC
    Inventors: Reza Farivar, Jeremy Goodsitt, Vincent Pham, Austin Walters, Fardin Abdi Taghi Abad, Anh Truong, Mark Watson
  • Patent number: 10581873
    Abstract: A computing device running a local enforcement agent is configured to instantiate at least one application container at the computing device, where the at least one application container is part of a containerized application. The computing device is also configured to associate the local enforcement agent with the least one application container so that the local enforcement agent operates as an intra-application communication proxy for the least one application container. The local enforcement agent receives an intra-application Application Programming Interface (API) call that is sent to the at least one application container from a second application container that is part of the containerized application. The local enforcement agent is configured to analyze the intra-application API call for compliance with one or more security policies associated with the at least one container.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: March 3, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Andre Surcouf, Jérôme Tollet
  • Patent number: 10579443
    Abstract: The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: March 3, 2020
    Assignee: Dropbox, Inc.
    Inventors: Marcio von Muhlen, Vinod Valloppillil, Nils Bunger
  • Patent number: 10565399
    Abstract: Disclosed herein are system, method, and computer program product embodiments for data anonymization in an in-memory database. An embodiment operates by receiving an indication to perform data anonymization based on one or more quasi attributes of a data set. The data set is sorted based on the one or more quasi attributes. The sorted data set is grouped into a first plurality of groups. A particular group that does not include enough records to satisfy an anonymization threshold is identified from amongst the first plurality of groups. The particular group is combined with another group of the first plurality of groups.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: February 18, 2020
    Assignee: SAP SE
    Inventor: Xinrong Huang
  • Patent number: 10565248
    Abstract: A device may receive multiple versions of content from one or more data streams associated with a content provider. The content may include audio content and/or video content. The one or more data streams may include digital rights management (DRM) protection. The device may cause the multiple versions of the content to be stored via a data structure. The data structure may be organized based on contextual information associated with the multiple versions of the content. The multiple versions of the content may be stored with the DRM protection. The device may receive a request for the content. The device may determine a particular version of the content, of the multiple versions of the content, based on the request for the content and at a determined location of the content. The device may provide the particular version of the content for playback of the audio content and/or the video content.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: February 18, 2020
    Assignee: Verizon Patent And Licensing Inc.
    Inventor: Alexander Tiraspolsky
  • Patent number: 10558814
    Abstract: Methods for identifying and obtaining a suitable application for interacting with a selected content item by providing secure access to a limited portion of information on the selected content item are provided. In one aspect, a method includes receiving a selection from a user in an initial application running on a device to interact with a content item accessible by the initial application, and generating a hash value from the limited portion of information on the content item. The method further includes requesting a copy of the at least one suitable application when the comparison of the hash value for the content item with the hash value for the suitable application match, executing the suitable application on the device, and providing the limited portion of information on the content item to the suitable application for interaction by the user. Systems and machine-readable media are also provided.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: February 11, 2020
    Assignee: Google LLC
    Inventors: Giles Hogben, Matthew Kulick, Todd Kennedy, Dianne Hackborn
  • Patent number: 10555154
    Abstract: For transmitting a secured data package from a computer system to a short-range communication device, the secured data package is transmitted from the computer system via a mobile radio network to a mobile communication apparatus. The mobile communication apparatus is placed in the communication range of the short-range communication device and receives from the short-range communication device a data read request, which includes device location information. The mobile communication apparatus determines the current location of the mobile communication apparatus. In case of correspondence of the current apparatus location with the received device location information, the mobile communication apparatus determines positive access authorization and transfers the secured data package to the short-range communication device.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: February 4, 2020
    Assignee: LEGIC Identsystems AG
    Inventors: Martin Buck, Peter Plüss, Marcel Plüss
  • Patent number: 10542407
    Abstract: Techniques are described that facilitate analyzing real-time communication sessions between a client device of a client account and a third-party device for the purpose of detecting safety concerns that may impact a client associated with the client device. The real-time communication sessions may include voice or text communications provisioned by a telecommunication service provider. In response to detecting a safety concern, notification data may be sent to a trusted device associated with the client account that alerts a trusted person of the inferred safety concern. In some examples, a safety concern may be inferred based on an irregular performance or non-performance of a regularly conducted real-time communication session. Moreover, communication session modification data may be sent to a client device involved in the real-time communication session for the purpose of terminating the real-time communication session based at least in part on safety concerns.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: January 21, 2020
    Assignee: T-Mobile USA, Inc.
    Inventor: Parag Garg
  • Patent number: 10536479
    Abstract: Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.
    Type: Grant
    Filed: March 19, 2018
    Date of Patent: January 14, 2020
    Assignee: Shape Security, Inc.
    Inventors: Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
  • Patent number: 10536450
    Abstract: A method and system performed by a computing system for signing in using personal identifiers input via a sign-in portal that supports multiple tenants is provided. The system receives a sign-in request for a user that includes a personal identifier. The personal identifier uniquely identifies a person but does not include an identification of a tenant. The system performs a verification based on the personal identifier to authenticate the user. The system identifies, from a mapping, a tenant to which the personal identifier is mapped. The mapping maps personal identifiers of users to tenants. The system retrieves, from a user store for the tenant, user information relating to the user. The system then creates a security token based on the user information. If verification of the user was successful, the system sends the security token to the sign-in portal as evidence that the user has been authenticated.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: January 14, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.
    Inventors: Ariel Gordon, Sarat Chandra Subramaniam, Ben Vincent, Paul Garner
  • Patent number: 10528504
    Abstract: A control unit makes a connection state between a connection device connected to a connection management device and an electronic device when a determination unit determines that identification information of the connection device connected to the connection management device has been registered in a connection work plan and a connection history of a connection order preceding a connection order of the connection device is “connected”, and does not make the connection state between the connection device connected to the connection management device and the electronic device when it is determined that the connection history of the connection order preceding the connection order of the connection device is “unconnected”.
    Type: Grant
    Filed: May 15, 2019
    Date of Patent: January 7, 2020
    Assignee: Hitachi, Ltd.
    Inventors: Tatsuya Okamoto, Takayuki Kameda, Ryuutarou Tomozawa
  • Patent number: 10528689
    Abstract: A system and methods to verify a correctness of data formatted according to an IEEE P1687 (IJTAG) standard, in connection with migration of test patterns from an instrument level to a top level of an integrated circuit design. Data describing an integrated circuit at the instrument level and at the top level is read from Instrument Connectivity Language (ICL) files, Procedural Description Language (PDL) files, and hardware description language (HDL) files. The methods include at least one of verifying structural descriptions of the integrated circuit in the ICL files and verifying an ability to use chip level inputs to access instruments in the integrated circuit. The verification procedure is performed prior to a simulation in which a migrated test pattern is applied to the integrated circuit.
    Type: Grant
    Filed: November 29, 2016
    Date of Patent: January 7, 2020
    Assignee: CADENCE DESIGN SYSTEMS, INC.
    Inventors: Rajesh Khurana, Vivek Chickermane, Dhruv Dua, Krishna Vijaya Chakravadhanula
  • Patent number: 10509919
    Abstract: A target transaction initiated by a member node device in a blockchain is received, where the target transaction include a reference time parameter, and where the reference time parameter is used to determine whether the target transaction is a valid transaction within a transaction validity period. Based on the reference time parameter, a determination is performed as to whether the target transaction is a valid transaction within a transaction validity period. In response to determining that the target transaction is a valid transaction within the transaction validity period, the target transaction is recorded to a generated candidate block.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: December 17, 2019
    Assignee: Alibaba Group Holding Limited
    Inventors: Jiyuan Wang, Huabing Du, Xuebing Yan
  • Patent number: 10498534
    Abstract: An example method includes receiving a media identifier and a first impression identifier from a media device, the media identifier being indicative of media presented at the media device, receiving the first impression identifier in association with first user information from a first database proprietor as a result of the first database proprietor obtaining a first identifier encrypted with a first encryption key by the media device, and receiving a second impression identifier in association with second user information from a second database proprietor as a result of the second database proprietor obtaining a second identifier encrypted with a second encryption key. The example method further includes identifying the first user information as associated with a user based on the first impression identifier, identifying the second user information as not associated with the user based on the second impression identifier and discarding the second user information.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: December 3, 2019
    Assignee: The Nielsen Company (US), LLC
    Inventors: Alan N. Bosworth, Madhusudhan Reddy Alla, Steven J. Splaine, Brahmanand Reddy Shivampet, Kevin K. Gaynor
  • Patent number: 10489759
    Abstract: A system and method for mobile peer authentication and asset control. The system and method may be configured to authenticate peer users across any digital network and platform and may allow users to independently control access to content they share with others across the same platforms from their computing devices. Senders may anonymously verify other mobile users according to device, location, behavior, and knowledge contexts, and may independently control or monetize shares with one or more of those peers in real-time across any social, messaging, or electronic communication network, either by value or by reference.
    Type: Grant
    Filed: October 12, 2018
    Date of Patent: November 26, 2019
    Assignee: Liveensure, Inc.
    Inventor: Christian J. Hessler
  • Patent number: 10492030
    Abstract: In one aspect, the present disclosure relates to a method that includes presenting a first user interface (UI) and a second UI on a mobile device. The first UI may include a map display and a control to compose a note. The method may include, in response to a user of the mobile device activating the control to compose the note, presenting a second UI including: an input to receive text for the note, one or more controls to select a picture for the note, and a control to save the note. The method may include, in response to the user activating the control to save the note: determining a location for the note using a geo-location sensor within the mobile device, sending the received text, the selected picture, and the location for the note to a server device, and displaying an indication of the note on the map display based on the location determined for the note.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: November 26, 2019
    Assignee: Capital One Services, LLC
    Inventors: Arunkumar Natarajan, Venkata Mandali
  • Patent number: 10489137
    Abstract: A method for detecting a confirmation of a properly installed software product on a computing device, determining the software product installation properties of the properly installed software product, and storing information relating to at least one or more software product installation properties of the properly installed software product.
    Type: Grant
    Filed: December 31, 2017
    Date of Patent: November 26, 2019
    Assignee: ALLSCRIPTS SOFTWARE, LLC
    Inventor: George Frank Squires Davis
  • Patent number: 10482252
    Abstract: A method is provided for secure firmware provisioning of a device. In the method, an integrated circuit (IC) is manufactured by a first entity for use in the device. The IC is provided to a second entity for manufacturing the device using the IC. The IC has a unique identifier (UID) and secret key derivation data (KDD). A secure memory is provided to a third entity. The secure memory has a first key pair, and the secure memory is used with a firmware provisioning toolchain of the second entity. During manufacturing of the device by the second entity, the secure memory is enabled to verify the IC by verifying the UID. The secure memory stores a firmware decryption key, and is enabled to encrypt the firmware decryption key. The encrypted firmware decryption key is then provided to the IC, and the IC decrypts the encrypted firmware decryption key for use by the IC in decrypting the firmware.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: November 19, 2019
    Assignee: NXP B.V.
    Inventor: Peter Doliwa
  • Patent number: 10484172
    Abstract: Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. In some embodiments, the secure circuit is configured to generate a public key and a private key for an application, and receive, from the application via an API, a request to perform a cryptographic operation using the private key. The secure circuit is further configured to perform the cryptographic operation in response to the request.
    Type: Grant
    Filed: June 4, 2016
    Date of Patent: November 19, 2019
    Assignee: Apple Inc.
    Inventors: Libor Sykora, Wade Benson, Vratislav Kuzela, Michael Brouwer, Andrew R. Whalley, Jerrold V. Hauck, David Finkelstein, Thomas Mensch
  • Patent number: 10482223
    Abstract: The disclosed computer-implemented method for selecting questions for knowledge-based authentication based on social entropy may include (1) identifying a potential question to ask a user of a computing system during a KBA process in an attempt to verify the user's identity, (2) determining whether any information suggestive of a correct answer to the potential question is available to anyone other than the user of the computing system, (3) calculating a social entropy of the potential question based at least in part on the determination of whether any information suggestive of the correct answer is available to anyone other than the user, and then (4) selecting the potential question to be asked to the user during the KBA process based at least in part on the social entropy of the potential question. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 18, 2016
    Date of Patent: November 19, 2019
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Kevin Jiang, Bruce McCorkendale
  • Patent number: 10482293
    Abstract: The present invention is directed to an interrogator, method of discerning metal and radio frequency identification (RFID) objects, and an interrogation system employing the same. In one embodiment, the interrogator includes a metal sensing subsystem configured to provide a first signal having a signature representing a presence of a metal object, and a RFID sensing subsystem configured to provide a second signal having a signature representing a presence of a RFID object. The interrogator also includes a control and processing subsystem configured to discern a presence of at least one of the metal and RFID objects from one of the first and second signals.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: November 19, 2019
    Assignee: MEDICAL IP HOLDINGS, LP
    Inventors: John P. Volpi, Jimmy D. Laferney, William C. Montgomery
  • Patent number: 10476662
    Abstract: A method for operating a distributed key-value store includes processing a data set comprised of data records each associated with a unique identifier and having one or more values associated with one or more attributes using a private key provided at a client device, thereby partitioning each of the data records based on the identifier and forming a plurality of encrypted identifier-value pairs for distributed storage across a plurality of server nodes operably connectable to the client device. The method also includes building, at the client device, encrypted indexes based on the type of query; and executing a query protocol in response to receiving a query from the client device so as to identify, using the built encrypted indexes, data distributively stored in the server nodes which matches the query. The invention also provides a related system for operating a distributed key-value store.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: November 12, 2019
    Assignee: CITY UNIVERSITY OF HONG KONG
    Inventors: Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang
  • Patent number: 10474696
    Abstract: A distributed computer system and method for synchronizing content libraries in replication groups uses a synchronization control signal that is transmitted to a subscribed content library management module of each subscribed content library in a replication group from a content library management module of the master content library in the replication group to initiate a synchronization procedure. Using metadata of at least one consumable software item from the master content library, contents of a subscribed content library in the replication group are modified to synchronize its contents to the contents of the master content library.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: November 12, 2019
    Assignee: VMware, Inc.
    Inventors: Preeti Kota, James Chang
  • Patent number: 10459986
    Abstract: Systems and methods for profiling a user include providing a user account to a user and, in response, storing a user account identifier in association with the user account in a database. First user data is then received that is associated with the user account identifier and that includes activity associated with the user account, and the first user data is association with the user account in the database. Subsequent user data is then received that includes information about the user and that is associated with additional user identifiers and the user account identifier and, in response, the additional user identifiers are association with the user account identifier and each other in the database, and the additional user data is associated with the user account in the database. A user profile may then be creating using the first user data, the second user data, and the third user data.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: October 29, 2019
    Assignee: PAYPAL, INC.
    Inventors: Ben Kneen, Ajay Gupta
  • Patent number: 10459732
    Abstract: A method for operating a system on chip (SoC) comprising a bootable processor, wherein the method includes executing a bootloader and measuring electrical power consumed by the processor during booting to derive a unique power characteristic data, verifying the unique power characteristic data, and reconstructing an device key from the unique power characteristic data and helper dater derived during an enrollment of the system on chip, where the measured power trace of the processor constitutes a unique signature of the SoC device executing specified software such that the solution secures the running software by itself.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: October 29, 2019
    Assignee: Siemens Aktiengesellschaft
    Inventor: Ciprian-Leonard Pitu
  • Patent number: 10454976
    Abstract: Various embodiments provide confidentiality-based file hosting by automatically directing assets in a shared workspace to appropriate storage locations. The storage location can be determined by comparing a security level that is associated with an asset to security levels of multiple possible storage locations. If a security level of the asset is changed in the shared workspace, the asset is automatically directed to an appropriate storage location based on the changed security level. This can include directing the asset to either a more secure or a less secure storage location.
    Type: Grant
    Filed: October 3, 2018
    Date of Patent: October 22, 2019
    Assignee: Prysm, Inc.
    Inventors: Brandon Fischer, Adam P. Cuzzort
  • Patent number: 10445785
    Abstract: A social networking system associates identification information with combinations of values used to generate a dynamically-created advertisement. Interactions with the dynamically-created advertisement by social networking system users are also associated with the dynamically-created advertisement. The social networking system uses the identification information to present the same combination of values used to generate the dynamically-created advertisement to additional social networking system users. Additionally, information describing interactions with the dynamically-created advertisement is determined from the interactions associated with the identification information, allowing the dynamically-created advertisement to be included in a personalized feed of content items presented to an additional user along with information describing interactions by various users presented with the same combination of values of components in the dynamically-created advertisement.
    Type: Grant
    Filed: November 21, 2013
    Date of Patent: October 15, 2019
    Assignee: Facebook, Inc.
    Inventors: Scott Aaron Shapiro, Shreehari Manikarnika, Brian M. Wrightson, Saket Jalan, Gang Wu
  • Patent number: 10445073
    Abstract: A single presentation logic that is independent of a user interface framework is provided. Also provided is a protocol to interface the single presentation logic to the user interface framework. A plurality of user interfaces is configured to be plugged to the single presentation logic.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: October 15, 2019
    Assignee: International Business Machines Corporation
    Inventors: Stas Margolis, Nadav Parag, Vladimir Shalikashvili, Moshe Weiss
  • Patent number: 10440721
    Abstract: Mechanisms for determining a cluster set of mobile devices are disclosed. A controller node identifies a primary mobile device that has a scheduled transmission for the controller node at a first time. The controller node identifies, from a plurality of mobile devices, a set of eligible assistant (EA) mobile devices. Each EA mobile device in the set is directed to determine a corresponding mobile device-to-mobile device (MD-MD) channel indicator that identifies a quality of a channel between the each EA mobile device and the primary mobile device. The controller node receives from at least one EA mobile device in the set the corresponding MD-MD channel indicator. The controller node then determines a cluster set that includes the primary mobile device and the at least one EA mobile device.
    Type: Grant
    Filed: January 17, 2017
    Date of Patent: October 8, 2019
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Seyed Hossein Seyedmehdi, Gary D. Boudreau
  • Patent number: 10430610
    Abstract: The method for obfuscating a string includes selecting, by a processor, a first string of a first portion of input plain text that does not match a predefined text signature from a set of two or more text signatures. In addition, the method may include identifying, by the processor, a historical string that is similar to the first string from a set of two or more historical strings stored. Further, the method may include generating a first text signature, by the processor, by updating a text signature in the set of two or more text signatures that matches the identified historical string. The first text signature defines a pattern that matches the first string and the identified historical string. The first text signature, by the processor, may be saved to the set of text signatures in the memory.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: October 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Gregory A. Davis, Jason D. Keirstead, Hong Yen Ong, Hui Lam Ong
  • Patent number: 10430091
    Abstract: An apparatus and method for storing security information are provided. The apparatus is generally an electronic device that includes a memory configured to include a secured region to store security information and a processor configured to electrically connect with the memory. The processor is further configured to execute an application program configured to store the security information in a first secured region, to receive a request to store the security information from the application program, and to store the security information in a second secured region different from the first secured region in response to the request.
    Type: Grant
    Filed: August 3, 2016
    Date of Patent: October 1, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Won Suk Seo, Sung Whan Moon, Chang Wook Lee, Sung Oh Hwang, Singh Bhupinder, Chongyang Xie, Geng Chen, Muralidhar Kattimani, Naman Patel, Sambit Kumar Shukla, Sia Jeffry Saputra, Victor Havin, Sung Gyu Kim, Min Woo Park, Jae Hoon Ryu, Seung Hoon Lee, Dong Ho Jang
  • Patent number: 10432469
    Abstract: Techniques for implementing a node-based access control system are described herein. In an embodiment, a server computer stores a node based policy system wherein each node identifies a resource and a policy for the resource. The server computer identifies a policy for a first node and an identifier of a second node wherein the second node is a parent node to the first node. The server computer maps an effective policy identifier to the policy for the first node and the identifier of the second node. The server computer stores data associating the effective policy identifier with the first node. The server computer identifies a policy for a third node and an identifier of the second node, wherein the second node is a parent node to the third node and wherein the policy for the third node is equivalent to the policy for the first node. The server computer then stores data associating the effective policy identifier with the third node.
    Type: Grant
    Filed: June 14, 2018
    Date of Patent: October 1, 2019
    Assignee: Palantir Technologies, Inc.
    Inventors: Neil Rickards, James Baker, Marco Gelmi, Radu-Cosmin Balan, Savino Sguera
  • Patent number: 10417020
    Abstract: According to some aspects disclosed herein, a system for remote assistance and control of user devices subject to one or more remote assistance policies may be provided. In some embodiments, an administrator may request remote control of a managed user device. A managed application launcher may be provided by the user device and may be modified by the user device to remove managed applications or otherwise prevent access to applications that have a policy indicating that remote assistance is not allowed. The administrator may open a managed application included in the launcher and remotely control that application. In other embodiments, a user of the managed user device may initiate a request for remote assistance from within a managed application and/or the managed application launcher. The administrator's control of the user device and access to other applications on the user device may be limited based on the remote assistance policies.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: September 17, 2019
    Assignee: Citrix Systems, Inc.
    Inventors: Nitin Desai, Jaspreet Singh
  • Patent number: 10409688
    Abstract: A system and method is disclosed for using encryption algorithms in peer-to-peer encryption mode to restore the integrity of data. An example method is provided for generating a new derivative for a file that has a plurality of existing derivatives that have been stored on servers using an (n,k) algorithm, where the (n,k) algorithm provides that a minimum number k of the derivatives required to restore the file. The method includes accessing, on a server, a first derivative of the existing derivatives and forming a blob for the new derivative based on a modification operation that uses the first derivative. Moreover, the method includes determining a number of times the modification operation has been performed, and if the number of times the modification operation has been performed is equal to the minimum number k, uploading the blob to a server for storage thereon.
    Type: Grant
    Filed: February 10, 2017
    Date of Patent: September 10, 2019
    Assignee: Acronis International GmbH
    Inventor: Alexander G. Tormasov
  • Patent number: 10404716
    Abstract: A data protection policy can specify which applications are allowed and/or dis-allowed from accessing cloud data that is subject to a data protection policy (i.e., data that has been assigned a classification and/or an owner.) To enforce that policy, the operating system (or other trusted entity) that stores or caches access credentials only provides these credentials to applications that are allowed by the policy. In this manner, because they are not provided with the credentials required to access the network resource, the dis-allowed applications cannot access the ‘protected’ data thereby helping prevent these dis-allowed (or noncompliant) applications from leaking data.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: September 3, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Christopher Leonard Walstad, Vishal Agarwal, Narendra S. Acharya, Octavian T. Ureche, Preston Derek Adam
  • Patent number: 10390373
    Abstract: A method for establishing a connection between a detection device and another device, wherein the detection device is coupled with a remote-sensing motion detection apparatus, the method including acquiring a first motion signature information of a motion object through the remote-sensing motion detection apparatus; and establishing a connection with the other device when the first motion signature information matches with a second motion signature information of the motion object acquired by the other device.
    Type: Grant
    Filed: May 5, 2014
    Date of Patent: August 20, 2019
    Assignee: Hangzhou Zhileng Technology Co. Ltd.
    Inventor: Dongge Li
  • Patent number: 10389733
    Abstract: A content request communication, e.g., generated using a first processor of a device, can be transmitted to a web server. A response communication including content identifying a first value can be received from the web server. The first processor can facilitate presentation of the content on a first display of the device. A communication can be received at a second processor of the device from a remote server. The communication can include data representing a second value and can be generated at the remote server using information received from the web server. Further, the second processor can produce a secure verification output that can be presented on a separate, second display, representing at least the second value. The presentation on first display can at least partially overlap in time with the presentation on the second display.
    Type: Grant
    Filed: September 6, 2016
    Date of Patent: August 20, 2019
    Assignee: Apple Inc.
    Inventors: Gianpaolo Fasoli, Matthew C. Byington, Christopher Sharp, Anton K. Diederich, Nicholas J. Shearer, Roberto G. Yepez, Petr Kostka, Gianluca Barbieri, Abhinav Gupta
  • Patent number: 10380702
    Abstract: Systems and methods for managing media, such as digital content, using block chain technology are described. In some embodiments, the systems and methods perform multiple digital currency transfers between address nodes to register a collection of rights to a digital content item to a block chain, and perform a digital currency transfer transaction between address nodes to register the collection of rights to the block chain.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: August 13, 2019
    Assignee: Monegraph, Inc.
    Inventors: Kevin McCoy, Christopher Tse, Hassan Abdel-Rahaman
  • Patent number: 10382426
    Abstract: Techniques are disclosed for accessing computing resources using secure single sign on authentication with a single use access token, including website-to-desktop application delivery and secure transfer of context information from the website to the desktop application once valid security credentials are provided from the same end-user computing device. A user signs onto a web application once using the security credentials. A web-based single use token generator generates a single use access token based on the user-supplied security credentials. A web-based context embedder service dynamically generates a context carrier and transfer application including the single use access token. The context carrier and transfer application is provided to an end-user computing device, which, when executed locally, installs a desktop application onto the end-user computing device. The desktop application utilizes the single use access token to access a secure, cloud-based computing resource.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: August 13, 2019
    Assignee: Adobe Inc.
    Inventor: Aditya Falodiya
  • Patent number: 10382836
    Abstract: This disclosure relates generally to audio-video processing, and more particularly to system and method for dynamically generating and rendering highlights of a video content. In one embodiment, the method may include receiving a start trigger and a stop trigger to generate and render the highlights of a portion of the video content playing on a first device for a registered user, recording at least one sub-portion of the portion of the video content upon receiving the start trigger and until receiving the stop trigger, monitoring the at least one sub-portion of the video content to detect one or more critical events, dynamically generating the highlights of the at least one sub-portion of the video content for each of the one or more critical events, and dynamically rendering the highlights of the at-least one sub-portion of the video content on a second device in possession of the registered user.
    Type: Grant
    Filed: August 22, 2017
    Date of Patent: August 13, 2019
    Assignee: Wipro Limited
    Inventor: Darshan Havinal
  • Patent number: 10365868
    Abstract: An image processing apparatus includes circuitry to verify validity of an access token of a web application that is provided by a web server communicably connected to the image processing apparatus via a network. The circuitry determines whether one of a plurality of functions of the image processing apparatus is available to the web application based on the access token verified and determined as being valid in response to a request to use one of the plurality of functions from the web application. The plurality of functions of the image processing apparatus includes at least one of a print function and a scan function.
    Type: Grant
    Filed: August 17, 2018
    Date of Patent: July 30, 2019
    Assignee: Ricoh Company, Ltd.
    Inventor: Hiroyuki Inoue
  • Patent number: 10356039
    Abstract: An apparatus, computer program, and method are provided for utilizing a data structure to access fully qualified domain name information. A data structure is stored including a plurality of pairs. Each pair has a first element including information associated with a fully qualified domain name, and a second element including a result of a hash function performed on the information associated with the fully qualified domain name. In use, the data structure is utilized to access the information associated with the fully qualified domain name of at least one of the pairs, based on the result of the hash function performed on the information associated with the fully qualified domain name.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: July 16, 2019
    Assignee: AMDOCS DEVELOPMENT LIMITED
    Inventors: Omer Shani, Gregory Vortman
  • Patent number: 10354243
    Abstract: Disclosed are authentication methods, systems and servers. Aspect processes include receiving an authentication request sent by a first terminal; determining at least a first sub authentication request and a second sub authentication request with both corresponding to the authentication request; sending the first sub authentication request to a second terminal and the second sub authentication request to a third terminal; when receiving the first verification information sent by the second terminal and the second verification information sent by the third terminal, authenticating the first verification information and the second verification information; and sending the authentication result to the first terminal; wherein the second terminal or the third terminal is the same terminal as the first terminal or is a different terminal from the first terminal.
    Type: Grant
    Filed: March 29, 2016
    Date of Patent: July 16, 2019
    Assignee: LENOVO (BEIJING) LIMITED
    Inventors: Dongliang Yue, Jiao Wang