Access Control Patents (Class 726/27)
  • Patent number: 9641489
    Abstract: Disclosed herein are techniques for use in fraud detection. In one embodiment, the techniques comprise a method. The method comprises receiving an encrypted current location associated with a user. The method also comprises obtaining an encrypted historical location associated with the user and an encrypted location sensitivity metric that relates to a distance within which locations are considered to be the same. The method further comprises performing an authentication operation based on the encrypted current location, the encrypted historical location and the encrypted location sensitivity metric.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: May 2, 2017
    Assignee: EMC IP Holding Company
    Inventors: Alon Kaufman, Philip Derbeko, Yan Belinky
  • Patent number: 9633215
    Abstract: In a method (300) for applying differential policies on at least one digital document (120a-120n) having a plurality of atomic units (122a-122n) among a plurality of workflow participants (110a-110n), in which the atomic units are assigned with at least one of a plurality of the differential policies, the at least one digital document is tessellated (304) to identify the atomic units and the at least one of the differential policies assigned to the atomic units. In addition, the atomic units are aggregated (306) according to the at least one of the differential policies assigned to the atomic units and respective sets of keys are associated (308) to the aggregated atomic units, in which common sets of keys are associated with the aggregated atomic units assigned with the same policies.
    Type: Grant
    Filed: September 21, 2010
    Date of Patent: April 25, 2017
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Steven J. Simske, Helen Balinsky
  • Patent number: 9621522
    Abstract: Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: April 11, 2017
    Assignee: Sonic IP, Inc.
    Inventors: Michael George Kiefer, Eric William Grab, Jason Braness
  • Patent number: 9621680
    Abstract: According to one embodiment of the present invention, a system masks data objects across a plurality of different data resources. The system comprises a processor configured to include a plurality of service providers to mask the data objects, wherein each service provider corresponds to a different type of data masking for the data objects. An interface provides access to the plurality of service providers from different data-consumers to mask the data objects according to the corresponding types of data masking, wherein resulting masked data maintains relational integrity across the different data resources. Embodiments of the present invention further include a method and computer program product for masking data objects across a plurality of different data resources in substantially the same manners described above.
    Type: Grant
    Filed: October 21, 2013
    Date of Patent: April 11, 2017
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Noel H. E. D'Costa, Peter Hagelund, David J. Henderson, Robert J. Oakley, Ritesh Tandon
  • Patent number: 9594898
    Abstract: To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process.
    Type: Grant
    Filed: October 23, 2014
    Date of Patent: March 14, 2017
    Assignee: BeyondTrust Software, Inc.
    Inventors: Peter David Beauregard, Andrey Kolishchak, Shannon E. Jennings, Robert F. Hogan
  • Patent number: 9588828
    Abstract: A system and method for enabling the interchange of enterprise data through an open platform is disclosed. This open platform can be based on a standardized interface that enables parties to easily connect to and use the network. Services operating as senders, recipients, and in-transit parties can therefore leverage a framework that overlays a public network.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: March 7, 2017
    Assignee: salesforce.com, inc.
    Inventors: Lev Brouk, Kenneth Norton, Jason Douglas, Peter Panec
  • Patent number: 9590959
    Abstract: A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The cryptography service is configured to receive and respond to requests to perform cryptographic operations, such as encryption and decryption. The requests may originate from entities using the distributed computing environment and/or subsystems of the distributed computing environment.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: March 7, 2017
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Gregory Branchek Roth, Matthew James Wren, Eric Jason Brandwine, Brian Irl Pratt
  • Patent number: 9588726
    Abstract: A method for routing object data that defines a 3-dimensional (3D) object to a 3D printer includes receiving the object data at a server and determining, by the server, object attributes associated with the object defined by the object data. The server searches a database that stores 3D printer attributes for one or more 3D printers capable of printing objects that possess the determined object attributes. If one or more capable printers are identified, the server communicates a list that identifies the one or more capable printers to a user.
    Type: Grant
    Filed: January 23, 2014
    Date of Patent: March 7, 2017
    Assignee: ACCENTURE GLOBAL SERVICES LIMITED
    Inventors: Sunny Webb, Kelly L. Dempski, Matthew Short, Michael Balint
  • Patent number: 9588776
    Abstract: Disclosed herein is a processing device comprising a secured execution environment comprising means for bringing the processing device into a predetermined operational state; and a timer; a communication interface for data communication between the processing device and a remote device management system external to the processing device; wherein the secured execution environment is configured, responsive to an expiry of the timer, to bring the processing device into said predetermined operational state; and responsive to a receipt, from the remote device management system via said communications interface, of a predetermined signal, to restart the timer.
    Type: Grant
    Filed: May 23, 2011
    Date of Patent: March 7, 2017
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Bernard Smeets, Patrik Ekdahl
  • Patent number: 9582641
    Abstract: A system and method distributing healthcare database access is disclosed. The system and method interpose a data mapping server (DMS) between a data request user server (DRS) and data service user server (DSS) to manage data transfers between the DSS and the DRS such that disparate database characteristics of the DRS/DSS are accommodated in real-time and permit asynchronous healthcare activity to be triggered. The DMS operates with a data access matrix (DAM) having each referenced DRS/DSS intersection pair associated with read/write control processes (RWP) that include read data (RDD) and write data (WRD) processes to permit data access across the disparate DRS/DSS database boundaries. The DAM may have multiple dimensions to accommodate asynchronously activated process threads within an overall patient healthcare plan (PHP) that operate to trigger healthcare provider alarms and other activity associated with the transfer/update of data between the DSS and the DRS.
    Type: Grant
    Filed: March 25, 2014
    Date of Patent: February 28, 2017
    Inventor: Eric Rock
  • Patent number: 9576144
    Abstract: Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of interest (COI) key obtained from a security appliance matches a COI key associated with a file structure managed by the file system manager that is the subject of a file system request issued by a caller. The method further includes identifying an entry included in a key bank associated with the COI key and the file structure that is the subject of the file system request, the key bank storing encrypted versions of a metadata key. The method also includes decrypting the metadata key using the COI key, decrypting at least one block encryption key using the metadata key, and decrypting a block of data associated with the at least one block encryption key.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: February 21, 2017
    Assignee: Unisys Corporation
    Inventors: Kelsey L Bruso, Uday Datta Shet
  • Patent number: 9563445
    Abstract: According to some aspects disclosed herein, a system for remote assistance and control of user devices subject to one or more remote assistance policies may be provided. In some embodiments, an administrator may request remote control of a managed user device. A managed application launcher may be provided by the user device and may be modified by the user device to remove managed applications or otherwise prevent access to applications that have a policy indicating that remote assistance is not allowed. The administrator may open a managed application included in the launcher and remotely control that application. In other embodiments, a user of the managed user device may initiate a request for remote assistance from within a managed application and/or the managed application launcher. The administrator's control of the user device and access to other applications on the user device may be limited based on the remote assistance policies.
    Type: Grant
    Filed: May 4, 2015
    Date of Patent: February 7, 2017
    Assignee: Citrix Systems, Inc.
    Inventors: Nitin Desai, Jaspreet Singh
  • Patent number: 9558343
    Abstract: To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: January 31, 2017
    Assignee: BeyondTrust Software, Inc.
    Inventors: Peter David Beauregard, Andrey Kolishchak, Shannon E. Jennings, Robert F. Hogan
  • Patent number: 9553854
    Abstract: A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The cryptography service is configured to receive and respond to requests to perform cryptographic operations, such as encryption and decryption. The requests may originate from entities using the distributed computing environment and/or subsystems of the distributed computing environment.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: January 24, 2017
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Gregory Branchek Roth, Matthew James Wren, Eric Jason Brandwine, Brian Irl Pratt
  • Patent number: 9547756
    Abstract: Methods and structure for Digital Rights Management (DRM) are provided. An exemplary system includes a Digital Rights Management (DRM) licensing server. The DRM licensing server is able to receive authentication information generated by a DRM module of a client device, and to receive a device identifier that uniquely distinguishes the client device from other client devices, wherein the device identifier has been generated by the DRM module. The DRM licensing server is further able to authenticate the DRM module based on the authentication information, to create a signed identifier based on the device identifier responsive to authenticating the DRM module, and to transmit the signed identifier to the client device. The system also includes an application server able to register the client device with an account at the application server, based on the signed identifier.
    Type: Grant
    Filed: February 19, 2016
    Date of Patent: January 17, 2017
    Assignee: Cable Television Laboratories, inc.
    Inventors: Seetharama Rao Durbha, Clarke Stevens
  • Patent number: 9536176
    Abstract: Aspects of the present disclosure are directed towards environmental based location monitoring. Environmental based location monitoring can include collecting, a first set of image data that corresponds to a first set of environmental characteristics existing within a bounded area encompassing a hardware element of the computer and determining an environmental difference based on a difference between a first location corresponding to a geographic position of the hardware element relative to the first set of environmental characteristics and a second location corresponding to an approved geographic position of the hardware element. Environmental based location monitoring can include determining that the environmental difference does not satisfy a threshold and executing a reaction sequence in the computer, in response to determining that the environmental difference does not satisfy the threshold.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: January 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Gerald K. Bartley, Darryl J. Becker, Matthew S. Doyle, Mark O. Maxson
  • Patent number: 9536098
    Abstract: A retrieving system for retrieving information concealed within a sequence of symbols. The system includes a decoder configurable using rule information and operable when so configured to retrieve the information concealed within the sequence of symbols by applying to the sequence of symbols at least one decoder rule determined by the configuration of the encoder.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: January 3, 2017
    Inventors: Dilipsinhji Jadeja, Anita Jadeja
  • Patent number: 9536073
    Abstract: Disclosed are techniques and apparatuses for implementing device-based application security. These techniques enable a computing device to assign a security level from a hierarchy of security levels to an application. Once the security level is assigned to the application, authentication techniques associated with the security level can be initiated in response to a request to launch the application. When an indication is received that the security level for the application has been satisfied, the application can then be launched, availing a user of the application's full functionality.
    Type: Grant
    Filed: July 24, 2014
    Date of Patent: January 3, 2017
    Assignee: GOOGLE TECHNOLOGY HOLDINGS LLC
    Inventor: Neil Richard Thomas
  • Patent number: 9535674
    Abstract: The method administers an enterprise computing system that includes a plurality of user mobile computing devices. The method includes selecting a pre-written application for inclusion in a menu of enterprise applications downloadable to a user computing device, allowing the user computing device to download the pre-written application, and interposing an application wrapper on the pre-written application before allowing the user computing device to download the pre-written application, the application wrapper being configured to control an operation of the pre-written application.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: January 3, 2017
    Assignee: BMC SOFTWARE, INC.
    Inventors: Adam Charles Cooper, George Thucydides, Geoffrey Ross Mair, Caleb Peter Buxton
  • Patent number: 9531751
    Abstract: The present invention discloses a system and method for identifying a phishing website. The system comprises: a domain name acquisition unit, a domain name statistic unit and a website identification unit; the domain name acquisition unit being configured to collect all links found in a website to be identified so as to acquire the domain names corresponding to the links; the domain name statistic unit being configured to carry out a statistic on the number of times that the domain names occur in the website to be identified, and finding the domain name which has the most number of occurrences and mark it as a target domain name; and the website identification unit being configured to judge whether the website to be identified is a phishing website on the basis of the target domain name and the domain name of the website to be identified.
    Type: Grant
    Filed: May 21, 2013
    Date of Patent: December 27, 2016
    Assignee: Beijing Qihoo Technology Company Limited
    Inventor: Yingying Chen
  • Patent number: 9524398
    Abstract: Systems and methods for computing a checksum are provided. In some aspects, an online application code module is written in a first programming language. The online application code module is configured to implement an online application. A checksum compute module is written in a second programming language different from the first programming language. The checksum compute module is separate from the online application code module. The checksum compute module configured to receive one or more parameters from the online application code module. The checksum compute module configured to determine a checksum for the online application code module based on the received one or more parameters. The checksum compute module configured to provide the checksum to a memory.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: December 20, 2016
    Assignee: Google Inc.
    Inventor: Robert Hundt
  • Patent number: 9520993
    Abstract: The present invention provides a method performed on a computer of preventing re-use of compromised keys in a broadcast encryption system. In an exemplary embodiment, the method includes (1) incorporating a particular set of Sequence Keys assigned by a license agency into individual receivers, (2) assigning a Sequence Key Block (SKB) by the license agency to at least one distributed protected file, (3) performing incremental cryptographic testing by the individual receivers to determine if a selected Sequence Key from the set of Sequence Keys is compromised, (4) if the selected Sequence Key is not compromised, decrypting the file, and (5) if the selected Sequence Key is compromised and if a subsequent Sequence Key from the set of Sequence Keys is available, selecting the subsequent Sequence Key.
    Type: Grant
    Filed: September 19, 2005
    Date of Patent: December 13, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Hongxia Jin, Jeffrey Bruce Lotspiech, Sigfredo Ismael Nin
  • Patent number: 9519794
    Abstract: Redacting material in a user interface is provided. A monitoring agent waits for a change in input or output of user content. A change comparator identifies the change for sensitive material. A type comparator identifies the type of sensitive material. A redaction engine redacts the change according to the identified type of sensitive material.
    Type: Grant
    Filed: October 22, 2014
    Date of Patent: December 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Joshua Fox, Itai Gordon, Peter Hagelund
  • Patent number: 9514291
    Abstract: An information processing system includes a receiving unit configured to receive from an external device a use initiation request designating user specific information and organization identification information, and an authentication unit configured to issue authentication information indicating that authentication has been completed in a case where the user specific information and the organization identification information designated in the use initiation request are stored in association with each other in a first storage unit that stores one or more sets of user specific information in association with the organization identification information. The authentication unit receives a new authentication information issuance request designating the authentication information and issues new authentication information that can be used even after a user termination request designating the authentication information is made.
    Type: Grant
    Filed: January 30, 2014
    Date of Patent: December 6, 2016
    Assignee: Ricoh Company, Ltd.
    Inventors: Yasuharu Fukuda, Taku Nagumo, Kohta Nagai
  • Patent number: 9514325
    Abstract: Systems and methods for establishing a secure file system are disclosed, in which system endpoints such as files and directories in a file system are protected using a security appliance. The security appliance protects each endpoint in the file system from unauthorized access by making those endpoints invisible to unauthorized users. The security appliance organizes users and endpoints into various communities of interest (COI). A user COI groups users such that all users associated with that particular COI have authorization to view the same one or more endpoints located in file storage.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: December 6, 2016
    Assignee: Unisys Corporation
    Inventors: Kelsey L Bruso, Uday Datta Shet
  • Patent number: 9515968
    Abstract: Particular embodiments of a method comprise providing one or more ideograms (e.g., written characters, symbols or images that represent an idea or thing) for insertion into a message. A request may be received from a user for a restricted one of the ideograms. A determination may be made as to whether the user is authorized to access the restricted ideogram. This determination may be based on whether the user is a member of a group of authorized users, whether an attribute of the user meets a restriction requirement, or whether the request comprises an authorization code or token. If the user is authorized to access the restricted ideogram, then the restricted ideogram may be displayed to the user in association with the message. Otherwise, a restricted-content response may be generated.
    Type: Grant
    Filed: February 5, 2014
    Date of Patent: December 6, 2016
    Assignee: Facebook, Inc.
    Inventors: David Ebersman, Samuel Lessin, Thomas Stocky, Michael Vernal
  • Patent number: 9515975
    Abstract: An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.
    Type: Grant
    Filed: April 7, 2016
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 9497217
    Abstract: According to one exemplary embodiment, a method for detecting malware in a network stream to at least one host computer is provided. The method may include initializing a browser profile corresponding with a first website having a first website source and a first plurality of content features. The method may include recording the first plurality of content features and a trusted source based on the first website source. The method may include scanning the network stream for a second content feature within a second plurality of content features associated with a second website. The method may include determining if the second content feature matches a first content feature. The method may include determining if the second plurality of content features is consistent with the first plurality of content features. The method may include determining if a second website source matches the trusted source. The method may include generating an alert.
    Type: Grant
    Filed: June 3, 2015
    Date of Patent: November 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: William A. Bird, Rory F. Bray, Jody D. Brownell, Ben A. Wuest
  • Patent number: 9483062
    Abstract: The invention relates to an improved climate control system in which a climate controlling equipment (1) has a control line (2) arranged to be connected to climate influenced impedance means (3). According to the invention, relay means (4) are arranged to disconnect the climate influenced impedance means from the control line under influence from an output (5) of a control unit (6) and to instead connect substituting means (7) providing an impedance controlled by a second output (8) of the control unit. The latter is connected to a processor (9) arranged to receive information from a plurality of climate influenced information means (10, 11, 12) and to process the same in a mathematical model for controlling the impedance of the substituting means via the control unit.
    Type: Grant
    Filed: November 8, 2012
    Date of Patent: November 1, 2016
    Assignee: ATC Industrial Group AB
    Inventor: Anders Widgren
  • Patent number: 9483751
    Abstract: Methods, systems, and apparatus for managing labeling privileges. In one aspect, a method includes receiving label data defining a label to be associated with an image of a first user in a photograph, the first user identified by a first user identifier and the label data associated with a submitting user identifier; accessing data defining labeling privileges for the first user identifier, the labeling privileges being for second users identified by respective second user identifiers, and the labeling privileges defining, for each second user, a labeling privilege for the second user to label an image of the first user in a photograph; determining whether the submitting user identifier is included in the second user identifiers; in response to determining that the submitting user identifier is included in the second user identifiers: determining the labeling privileges for the user identified by the submitting user identifier, and processing the label accordingly.
    Type: Grant
    Filed: June 28, 2011
    Date of Patent: November 1, 2016
    Assignee: Google Inc.
    Inventors: Matthew S. Steiner, Henry T. Benjamin
  • Patent number: 9479519
    Abstract: Techniques and solutions are described for detecting potential problems with web pages. For example, a web page can be analyzed (e.g., during loading of the web page) to determine statistics, such as size and structure statistics. The web page can be compared, using the statistics, to a statistical model representing the web page to determine if the web page is consistent with the statistical model. The statistical model can be created from previous page loads of the web page. Problems such as web page spoofing can be detected if the same web page content (e.g., content with a high degree of statistical similarity) is obtained from two different web sites. For example, a web page that is retrieved from one web site that matches a statistical model representing the same web page from another web site can indicate a spoofed web page.
    Type: Grant
    Filed: December 18, 2014
    Date of Patent: October 25, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Peter Frank Hill, John W. Gray, III, Kurt Kufeld, Dennis Pilarinos, Arun Sundaram, Peter Sven Vosshall, David John Ward, Jr.
  • Patent number: 9473531
    Abstract: According to one exemplary embodiment, a method for detecting malware in a network stream to at least one host computer is provided. The method may include initializing a browser profile corresponding with a first website having a first website source and a first plurality of content features. The method may include recording the first plurality of content features and a trusted source based on the first website source. The method may include scanning the network stream for a second content feature within a second plurality of content features associated with a second website. The method may include determining if the second content feature matches a first content feature. The method may include determining if the second plurality of content features is consistent with the first plurality of content features. The method may include determining if a second website source matches the trusted source. The method may include generating an alert.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventors: William A. Bird, Rory F. Bray, Jody D. Brownell, Ben A. Wuest
  • Patent number: 9450761
    Abstract: According to one embodiment, a memory system includes a host interface, a first storage unit which stores data in a nonvolatile manner, and a memory controller. The memory controller includes a management information generating unit which generates command information for every command received from a host through the host interface and a digital signature calculating unit which generates a digital signature from the command information using a secret key. The management information generating unit generates management information which contains the command information and the digital signature for the every command.
    Type: Grant
    Filed: August 8, 2014
    Date of Patent: September 20, 2016
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Takeyuki Minamimoto, Kentaro Umesawa, Masaki Saito, Masamitsu Ohhashi
  • Patent number: 9432373
    Abstract: This is directed to providing access to content stored on a local cloud. In particular, a device can direct a librarian service overseeing the operation of a local cloud to provide another device with access to content stored on the local cloud. The librarian service can generate credentials for the other device, and provide the credentials to the other device. Using the credentials, the other device can connect directly to the local cloud and access the content. In addition, the local cloud can validate the credentials of the other before providing access to the content. The credentials can include, for example, a key to install or load on the device. The librarian may not require, however, the user to create credentials or register with the librarian before being permitted to access the content on the local cloud.
    Type: Grant
    Filed: April 23, 2010
    Date of Patent: August 30, 2016
    Assignee: Apple Inc.
    Inventor: Scott Ryder
  • Patent number: 9426648
    Abstract: Systems and methods of performing link setup and authentication are disclosed. A method includes, at an access point, receiving an unprotected authentication request from a mobile device. The method also includes extracting an initiate message from the unprotected authentication request and sending the initiate message to an authentication server. The method further includes receiving an answer message from the authentication server, where the answer message includes a re-authentication master session key (rMSK). The method includes generating an access point nonce (ANonce) and sending an authentication response to the mobile device, where the authentication response includes the ANonce.
    Type: Grant
    Filed: February 14, 2014
    Date of Patent: August 23, 2016
    Assignee: Qualcomm Incorporated
    Inventors: George Cherian, Philip Michael Hawkes, Santosh Paul Abraham, Hemanth Sampath
  • Patent number: 9426120
    Abstract: Location and time based mobile app policies are disclosed. One or more location and time policies are received at a management agent on a device. The policies are calculated by processing user and group information. Policy information in a bus is updated with a current allowed state. Location information is received from the device. The location information includes a new location that is not an allowed location. A use of an application may be blocked by the management agent based at least in part on the received location information.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: August 23, 2016
    Assignee: MOBILE IRON, INC.
    Inventors: Mansu Kim, Joshua Sirota, Suresh Kumar Batchu
  • Patent number: 9411967
    Abstract: A computer-implemented method includes providing a user interface on an internet-protocol (IP) connected mobile device, the user interface configured to receive a user input corresponding to one or more data privacy parameters for geo-location data, and controlling a transferring of geo-location data to and from each of a plurality of mobile applications on the mobile device based on the user input. A change in one or more of the data privacy parameters can change how geo-location data is provided to each of the plurality of applications and can affect location data accuracy, location data reporting frequency, geo-functions, and more. The user interface can be configured to allow a user to view, manage, and delete a personal location history. Furthermore, one or more profiles can be associated with one or more of the plurality of mobile applications, where each of the one or more profiles is assigned individual data privacy parameters.
    Type: Grant
    Filed: August 26, 2013
    Date of Patent: August 9, 2016
    Assignee: Environmental Systems Research Institute (ESRI)
    Inventors: Aaron D. Parecki, Amber L. Case, Wayne Chambliss
  • Patent number: 9411643
    Abstract: A method of performing tasks on a production computer includes retrieving a one task description file stored on a task computer and containing a description of a task on a production computer, transferring the task description file from the task computer to a production computer, causing the production computer to check that the file is associated with at least one task stored on the production computer, performing the task associated with the file in the production computer using the file, if the association check was successful, wherein the task computer has open ports and the production computer keeps the ports closed so that access by a user of a first user group to the task computer is arranged, but access by a user of the group to the production computer is prevented while steps above are performed in a predetermined operating state of the production computer.
    Type: Grant
    Filed: February 25, 2014
    Date of Patent: August 9, 2016
    Assignee: Fujitsu Technology Solutions Intellectual Property GmbH
    Inventor: Heinz-Josef Claes
  • Patent number: 9407440
    Abstract: Data is encrypted such that multiple keys are needed to decrypt the data. The keys are accessible to different entities so that no single entity has access to all the keys. At least one key is managed by a service provider. A customer computer system of the service provider may be configured with executable instructions directing the orchestration of communications between the various entities having access to the keys. As a result, security compromise in connection with a key does not, by itself, render the data decryptable.
    Type: Grant
    Filed: June 20, 2013
    Date of Patent: August 2, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Matthew James Wren
  • Patent number: 9405556
    Abstract: Systems, computer program products and computer program products for facilitating the dynamic addition and removal of operating system components on computing devices based on application or user interaction over time are disclosed. Such systems, computer program products and computer program products provide one or more API intercept layers, a rules engine and a hydrate engine that facilitates the ability to dynamically rehydrate or hydrate operating system components. In an embodiment, a minimal (or core) operating system image on a computing device is deployed. Then, required components may be dynamically added (i.e., “streamed” or “rehydrated”) from storage, a server or cloud service as required by an executing application program on the computing device. In another embodiment, a totally complete operating system image is deployed on a computing device. Then, unused components may be dynamically removed (i.e., “dehydrated”) from the computing device over time based on application or user interaction.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: August 2, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Michael Hall, Andrew Lovitt
  • Patent number: 9397988
    Abstract: A security component may be associated with a network-enabled application. The security component may access a secure store, which may include customization information, which may include one or more graphical user interface customizations defined by a user, and one or more instances of card information. The card information may specify how to authenticate a user's credentials to access a relying party (e.g., web site). The security component may initiate the display of an embedded region of a window drawn by the network-enabled application. At least a part of the appearance of the embedded region of the window may be defined according to the customization information and not by the relying party. The embedded region may provide a user interface for determining user authentication credentials. The customization information and the one or more instances of card information may not be accessible to the relying party.
    Type: Grant
    Filed: January 7, 2013
    Date of Patent: July 19, 2016
    Assignee: Adobe Systems Incorporated
    Inventors: James D. Pravetz, Joseph Donovan Steele, Sunil Agrawal
  • Patent number: 9398142
    Abstract: A method and a system for displaying information and content in a lock screen system having a plurality of screens so as to provide a screen lock for preventing an unintended input of a user terminal device, and a computer-readable recording medium. The method includes setting information and content on a plurality of lock screen, displaying the plurality of lock screens, providing a screen movement between the plurality of lock screens, executing an existing external application so as to provide detailed information for the information and content displayed on the plurality of lock screens, unlocking the plurality of lock screens, and posting an advertisement on a part of the plurality of lock screens. Users can easily confirm simple information and content and use the as a new medium and means for expressing themselves by setting the lock screen windows according to the personalities of the users.
    Type: Grant
    Filed: February 19, 2013
    Date of Patent: July 19, 2016
    Inventor: Moon Sang Lee
  • Patent number: 9398042
    Abstract: The disclosed computer-implemented method for capturing input from users to prevent data loss may include (1) intercepting, as part of a data-loss-prevention application, user input intended for a data-processing application that would, if received by the data-processing application, cause the data-processing application to perform an operation on data that may violate a data-loss-prevention policy, (2) upon intercepting the user input, causing the data-processing application to perform an alternative operation on the data that makes the data accessible to the data-loss-prevention application, (3) scanning, while the data-processing application is prevented from performing the operation, the data for compliance with the data-loss-prevention policy, (4) determining, based on a result of the scanning, that the data complies with the data-loss-prevention policy, and (5) causing, in response to determining that the data complies with the data-loss-prevention policy, the data-processing application to perform the
    Type: Grant
    Filed: March 11, 2015
    Date of Patent: July 19, 2016
    Assignee: Symantec Corporation
    Inventor: Dhananjay Dodke
  • Patent number: 9391970
    Abstract: Providing media management services includes creating an account record for a first user of the media management services, allocating a first storage space to the first user that is accessible to the first user via user credentials assigned to the first user, creating an account record for a second user of the media management services, and allocating a second storage space to the second user that is accessible to the second user via user credentials assigned to the second user. The media management services also include sharing the second storage space with the first user based on a device identifier of a media recording device that is common to both the first account record and the second account record.
    Type: Grant
    Filed: March 7, 2014
    Date of Patent: July 12, 2016
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Michael Branam, Akbar Pirani
  • Patent number: 9386079
    Abstract: Aspects of the present disclosure relates to a virtual desktop deployment system configured to deploy a virtual desktop infrastructure.
    Type: Grant
    Filed: June 10, 2014
    Date of Patent: July 5, 2016
    Assignee: AMERICAN MEGATRENDS, INC.
    Inventors: Muthukkumaran Ramalingam, Santhosh Samuel Mathews, Varadachari Sudan Ayanam, Joseprabu Inbaraj, Samvinesh Christopher
  • Patent number: 9372964
    Abstract: A system for software license control is described that is particular useful for use in a virtualized system, such as a cloud computing system. A module can be made available for use within the virtualized network, wherein a license fee is payable for use of the module. The module includes a license file that can be located wherever it is required. In addition, a central license file is provided at an administration node. The central license file is configured such that it can only be operated from that administration node, thereby preventing the copying of that file. The license file operating in the virtual network communicates with the central license file. The central license file controls the use of the licensed module.
    Type: Grant
    Filed: March 21, 2011
    Date of Patent: June 21, 2016
    Assignee: NOKIA SOLUTIONS AND NETWORKS OY
    Inventors: Robert Engelbert Hubert Kamphuis, Saku Juhani Oja, Sami Petteri Levijoki, Jin Albert Zhang
  • Patent number: 9372862
    Abstract: A method for automatic folder ownership assignment, including ascertaining which first folders, among a first multiplicity of folders, have at least one of modify and write permissions to non-IT administration entities, adding the first folders to a list of candidates for ownership assignment, defining a second multiplicity of folders which is a subset of the first multiplicity of folders and not including the first folders and descendents and ancestors thereof, ascertaining which second folders among the second multiplicity of folders, have permissions to non-IT administration entities, adding the second folders to the candidates, defining a third multiplicity of folders, which is a subset of the second multiplicity of folders and not including the second folders and descendents and ancestors thereof, ascertaining which third folders among the third multiplicity of folders are topmost folders, adding the third folders to the candidates, and recommending possible assignment of ownership of the candidates.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: June 21, 2016
    Assignee: VARONIS SYSTEMS, INC.
    Inventors: Yakov Faitelson, Ohad Korkus, Ophir Kretzer-Katzir
  • Patent number: 9372740
    Abstract: Embodiments of the invention broadly contemplate a situational application development framework that provides consumable software components that are accessed as services and monitored in a standardized fashion through a mediator service and thus suitable for use in a controlled development environment. At least one embodiment of the invention thus facilitates on the fly application creation using mashup makers in an enterprise setup.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: June 21, 2016
    Assignee: International Business Machines Corporation
    Inventors: Kapil Gambhir, Anuj Gupta, Jaspreet Singh
  • Patent number: 9373003
    Abstract: Systems and methods are provided for automatically handling multiple levels of encryption and decryption. An electronic file is received to add to encrypted storage. The electronic file is encrypted to generate a new level of encryption for the electronic file using an encryption process that uses encryption data to generate the new level of encryption and to decrypt the new level of encryption. A set of existing encryption data associated with the electronic file is identified, wherein each existing encryption data from the set of existing encryption data is associated with an existing level of encryption already applied to the electronic file. The encryption data is added to the set of existing encryption data associated with the electronic file so that the existing levels of encryption and the new level of encryption can be decrypted.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: June 21, 2016
    Assignee: AppSense Limited
    Inventors: Paul Keith Branton, Paul Delivett
  • Patent number: 9367341
    Abstract: A mechanism for automatically encrypting and decrypting virtual disk content using a single user sign-on is disclosed. A method of embodiments of the invention includes receiving credentials of a user of a virtual machine (VM) provided as part of a single sign-on process to access the VM, referencing a configuration database with the received credentials of the user, determining encryption and decryption policy settings for the VM from the configuration database, and at least one of encrypting or decrypting, by the VM, files of the VM based on the determined encryption and decryption policy settings.
    Type: Grant
    Filed: March 30, 2010
    Date of Patent: June 14, 2016
    Assignee: Red Hat Israel, Ltd.
    Inventors: Dor Laor, Izik Eidus