Access Control Patents (Class 726/27)
  • Patent number: 10789939
    Abstract: This disclosure generally relates to a word counting device. Specifically, this disclosure generally relates to a wearable word counter device. The word counter device includes a microphone to receive speech input. The word counter device further includes a light sensor to receive data representative of an amount of light in an environment of the word counter device. The word counter device also includes an accelerometer to receive data representative of an amount of movement of the word counter device or the wearer of the word counter device.
    Type: Grant
    Filed: October 23, 2018
    Date of Patent: September 29, 2020
    Assignee: The University of Chicago
    Inventors: Alvin Lacson, Jill Desmond, Andy Turk, Jon Boggiano, Jonathan Simon
  • Patent number: 10791126
    Abstract: A method, system and device for allowing the secure collection of sensitive information is provided. The device includes a display, and a user interface capable of receiving at least one user-generated interrupt in response to a stimulus generated in response to content received by the device, wherein the action taken upon receiving the user-generated interrupt depends on a classification of the content, the classification identifying the content as trusted or not trusted. The method includes detecting a request for sensitive information in content, determining if an interrupt is generated, determining if the content is trusted, allowing the collection of the sensitive information if the interrupt is generated and the content is trusted, and performing an alternative action if the interrupt is generated and the content is not trusted. The method may include instructions stored on a computer readable medium.
    Type: Grant
    Filed: April 9, 2019
    Date of Patent: September 29, 2020
    Assignee: PAYPAL, INC.
    Inventors: Bjorn Markus Jakobsson, William Leddy
  • Patent number: 10791331
    Abstract: A file decompression method to increase speed of display applied in a foldable electronic device includes receiving an image file, compressed into a much smaller form, from a peripheral device, and displaying the received file at least on the second display area, and transmitting a first control signal to an image sensor. The first control signal controls the image sensor to scan the image file on the second display area to identify image and compression data therein and information as to such data is obtained from the image sensor. If the data permits decompression and decompression is performed, the image is displayed as a match of the original uncompressed file.
    Type: Grant
    Filed: June 1, 2018
    Date of Patent: September 29, 2020
    Assignee: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventor: Yeh-Wei Yang
  • Patent number: 10776458
    Abstract: An information processing system including at least one information processing apparatus that includes an administration unit configured to administer whether a service is provided to a service use apparatus using an organization, a license, and a user, and an account registration unit configured to receive a subscription for a trial use of the service from the service use apparatus and perform an account registration for the administration unit so that the trial use from the service use apparatus is enabled.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: September 15, 2020
    Assignee: Ricoh Company, Ltd.
    Inventor: Hiroyuki Matsushima
  • Patent number: 10776002
    Abstract: The present application discloses a method and apparatus for inputting a text. An embodiment of the method comprises: receiving a prompt text from a connected backend server, the prompt text including a defined content segment and a user name of a user logged on the server; acquiring the user name of the user from login information of the user; extracting the defined content segment from the prompt text based on the acquired user name; distributing characters in the prompt text randomly to virtual keys on a virtual keyboard; displaying a typed character, in response to an operation by the user to type a character based on the prompt text by clicking a virtual key. The embodiment enables quick and accurate input of a prompt text.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: September 15, 2020
    Assignee: Baidu Online Network Technology (Beijing) Co., Ltd.
    Inventor: Yelu Liu
  • Patent number: 10769294
    Abstract: A hierarchy of object groups is defined. Objects group collections are defined on top of the hierarchy. Authorization rights for executing actions are defined through the object group collection definitions. A request for a change associated with assignments of an object group in a hierarchy of a plurality of object groups may be received, where the assignments are related to object group collections. A change trigger is stored at an explosion update trigger table. The change trigger is stored synchronously with updating definitions of the object group collections and/or updating the hierarchy organization. The explosion update trigger table is processed to determine changes for the explosion table. The change trigger may be processed together with one or more other triggers associated with the object group. The explosion table is updated to reflect changes to the object group and other object groups hierarchically inherent for the object group.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: September 8, 2020
    Assignee: SAP SE
    Inventors: Michael Aakolk, Andrea Waldi
  • Patent number: 10762193
    Abstract: In an example computer-implemented method, a trusted root certificate for an application running in a container is dynamically generated. The generated trusted root certificate is injected at runtime. The generated certificate is dynamically added to a list of trusted root certificates. A proxy associated with the application instance is authenticated based on the generated root trust certificate.
    Type: Grant
    Filed: May 9, 2018
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventor: Etai Lev-Ran
  • Patent number: 10754889
    Abstract: Systems and methods for dynamically generating a digital image are described herein. In an embodiment, a server computer stores a first plurality of digital content items of an image requesting entity, a second plurality of digital content items comprising call to action identifiers, and a third plurality of content items of a different provider entity of a plurality of provider entities. The server computer further stores client computing device history data and provider entity data. The server computer identifies a first particular digital content item of the first plurality of digital content items, a second particular digital content item of the second plurality of content items, and a third particular digital content item of the third plurality of content items based, at least in part, on subsets of the client computing device history data and/or the provider entity data. The server computer generates a digital image comprising the particular digital content items.
    Type: Grant
    Filed: May 24, 2018
    Date of Patent: August 25, 2020
    Assignee: QUOTIENT TECHNOLOGY INC.
    Inventor: Xavier Facon
  • Patent number: 10749973
    Abstract: Certain embodiments herein are directed to enabling service interoperability functionality for wireless fidelity (WiFi) Direct devices connected to a network via a wireless access point. A WiFi Direct device may identify various other WiFi Direct devices on a WiFi network for performing a requested service, such as printing content or displaying content to a screen. In so doing, the device may share information associated with an access point to which the device is connected with the other devices, which may also share information associated with an access point to which they are connected. In this way, WiFi Direct devices may discover their connectivity with respect to other devices to utilize a broader array of connection options for implementing a desired service, and hence, may leverage application programming interface (API) modules directed at providing service interoperability functionality between software applications and services requested by the software applications.
    Type: Grant
    Filed: November 25, 2016
    Date of Patent: August 18, 2020
    Assignee: Intel IP Corporation
    Inventors: Emily H. Qi, Carlos Cordeiro, Ganesh Venkatesan, Bahareh Sadeghi
  • Patent number: 10742411
    Abstract: The generation and management of decentralized identifiers of an entity. A decentralized identifier of a particular entity is recorded. Then, upon determining that the particular entity is granting a permission to another entity, the permission is signed based on the recorded decentralized identifier. As one example, the permission may be signed by a private key of the decentralized identifier. The permission may be verified upon request by authenticating the signed permission being associated with the recorded decentralized identifier; and authorizing the other entity to act upon the data depending on the authentication. As an example only, the authentication may occur using a public key associated with the recorded decentralized identifier.
    Type: Grant
    Filed: May 31, 2018
    Date of Patent: August 11, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ankur Patel, Daniel James Buchner
  • Patent number: 10743053
    Abstract: The present disclosure provides a method and system for real time, dynamic, adaptive and non-sequential assembling of one or more mapped fragments of one or more tagged videos. The method includes a step of receiving a set of preference data from pre-defined selection criteria and set of user authentication data. The method includes another step of fetching the one or more tagged videos from the digitally processed repository of videos. The method includes yet another step of fragmenting each tagged video of the one or more tagged videos into the one or more tagged fragments and clustering one or more logical sets of mapped fragments into one or more logical clusters of mapped fragments. The method includes yet another step of assembling at least one of the one or more logical clusters of mapped fragments in a pre-defined order of preference to obtain an assembled video.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: August 11, 2020
    Inventors: N. Dilip Venkatraman, Savitri Dilip
  • Patent number: 10735432
    Abstract: Aspects of the technology described herein provide a mechanism for controlling access to secure computing resources based on inferred user authentication. A current user may be authenticated and access to secure computing resources permitted based on a determined probability that the current user is a legitimate user associated with the secure computing resource. Legitimacy of the current user may be inferred based on a comparison of user-related activity of the current user to a persona model, which may comprise behavior patterns, rules, or other information for identifying a legitimate user. If it is determined that the current user is likely legitimate, then access to secure information may be permitted. However, if it is determined that the current user is likely illegitimate, than a verification procedure may be provided to the current user, such as a temporal, dynamic security challenge based on recent activity conducted by the legitimate user.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: August 4, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Nadav Bar, Tom Jurgenson
  • Patent number: 10725653
    Abstract: An image processing device, an image processing system, and a method of processing an image. The image processing device and the method includes displaying a first screen and a second screen using an image processing device connected to an image display apparatus, controlling a display to display one of the first screen and the second screen on the image display apparatus, acquiring from the image display apparatus discrimination data including at least data for distinguishing between the first screen and the second screen, and determining a partition between the first screen and the second screen based on the discrimination data. The image processing system includes an image display apparatus and at least one information processing device.
    Type: Grant
    Filed: May 3, 2017
    Date of Patent: July 28, 2020
    Assignee: RICOH COMPANY, LTD.
    Inventors: Tatsuyuki Oikawa, Ayako Watanabe, Shigeru Nakamura
  • Patent number: 10713031
    Abstract: In response to an attempt to install an instance of a container in a production environment, a set of security criteria associated with the container and features of the production environment are compared. Based on the comparison, a determination is made as to whether the features of the production environment satisfy the set of security criteria.
    Type: Grant
    Filed: December 6, 2018
    Date of Patent: July 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Sreekanth R. Iyer, Kaushal K. Kapadia, Ravi K. Muthukrishnan, Nataraj Nagaratnam, Sulakshan Vajipayajula
  • Patent number: 10713381
    Abstract: Provided are a method for securely calling fingerprint information, an apparatus for securely calling fingerprint information, and a mobile terminal. The method includes: receiving a request for calling the fingerprint information (S101); according to a unique identification in an application process sending the request for calling the fingerprint information, determining whether the application corresponding to the application process is a legitimate application (S102); when it is determined that the application corresponding to the application process is a legitimate application, allowing the application corresponding to the application process to call the fingerprint information (S103).
    Type: Grant
    Filed: January 15, 2019
    Date of Patent: July 14, 2020
    Assignee: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventors: Qiang Zhang, Lizhong Wang, Haitao Zhou, Kui Jiang, Wei He
  • Patent number: 10706130
    Abstract: System and method for software activation and further tracking of its states on an end-user computing device (computer) was developed to provide software developers a flexible and secure tool for software distribution and gathering statistics of usage of software activation. The method consists of the following logical steps: (a) obtaining an acquisition confirmation; (b) requesting for a license; (c) issuing and delivering the license to End User, the license being secured with a private key by a server, and the private key is not stored at the client; (d) verification of license on the User's computer; (e) storing the license on the User's computer; (f) periodic tracking of activation state, (g) another action with the User's license, wherein the verifying the license comprises validating, at the client associated with the application, the license received from the server without any modifications, and saving the license to the client.
    Type: Grant
    Filed: May 22, 2017
    Date of Patent: July 7, 2020
    Assignee: MacPaw Inc.
    Inventor: Oleksandr Kosovan
  • Patent number: 10708052
    Abstract: Systems and methods for monitoring data input are disclosed. A dataset entered into a non-password field is received. Based on the dataset meeting one or more criteria for a likely password, a determination as to whether the dataset is inadvertently entered into the non-password field is made. Based on determining that the dataset is inadvertently entered into the non-password field, further processing of the dataset is inhibited.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: July 7, 2020
    Assignee: BlackBerry Limited
    Inventors: Jeremy Lawson Kominar, Neil Patrick Adams, Nick Mark Waterman, Marc Anthony Lepage
  • Patent number: 10708312
    Abstract: A telecommunications service provider provides a telecommunications infrastructure that is based in part on an IP Multimedia Subsystem (IMS). The provider may have various IMS application servers to support different services for subscribers of the provider, such as messaging, voice communications, presence, etc. In addition, third parties may provide their own IMS application servers for the same services or for different services. Subscribers of the provider are routed to the provider-supported application servers, while subscribers of the third parties are routed to application servers of the third parties. This allows third parties to implement and control their own services, while also leveraging the existing infrastructure of the provider.
    Type: Grant
    Filed: April 5, 2017
    Date of Patent: July 7, 2020
    Assignee: T-Mobile USA, Inc.
    Inventor: Kulandaivel Marappa Gounder
  • Patent number: 10708238
    Abstract: According to certain embodiments, a system is operable to receive a message intended for a recipient. The system is further operable to generate first and second push envelopes comprising first and second encrypted copies of the message, respectively. The push envelopes also comprise executable code that facilitates decrypting the message. The system is operable to associate the first and second push envelopes with a message index that uniquely identifies the message. The system is operable to communicate the first push envelope to the recipient and to communicate the second push envelope to a viewing system.
    Type: Grant
    Filed: June 8, 2017
    Date of Patent: July 7, 2020
    Assignee: ZixCorp Systems, Inc.
    Inventor: David Joseph Robertson
  • Patent number: 10708165
    Abstract: Methods, a switch and a Frame Capture Managing Module, FCMM for managing Ethernet frames. The FCMM receives a request for capturing Ethernet frames at a network interface of the switch. The request comprises an identity of the network interface and information relating to a second filter indicating Ethernet frames for monitoring by the network node. The FCMM sends to the switch, a configuration comprising: the identity of the network interface of the switch, an indication about a first multicast channel, and information relating to a first filter. The FCMM sends a response comprising a second multicast channel relating to the first multicast channel. Furthermore, the switch receives a request for receiving Ethernet frame sent to the first multicast channel. The switch filters, by use of the first filter, received Ethernet frames into a collection of Ethernet frames. The switch sends the collection of Ethernet frames on the first multicast channel.
    Type: Grant
    Filed: June 22, 2016
    Date of Patent: July 7, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: Niclas Nors
  • Patent number: 10698987
    Abstract: Systems and methods for binding content to pairing of a playback device and removable memory storage device are disclosed. In one embodiment, a method for requesting authorization to play content using a playback device and a removable memory storage device includes retrieving a coupon identifier from a removable memory storage device while it is attached to the playback device, generating a coupon code using the coupon identifier, sending a request for storefront token that includes a device match data token and an application identifier, receiving a storefront token associated with a storefront identifier where the storefront identifier identifies a storefront application, sending a request for ticket token that includes the coupon code, the storefront identifier, and a content identifier that identifies the content, sending a request for license file that includes the ticket token, and receiving a license file that grants playback rights to the piece of content.
    Type: Grant
    Filed: September 20, 2017
    Date of Patent: June 30, 2020
    Assignee: DIVX, LLC
    Inventors: Hans Andreas Baumgartner, Mayur Srinivasan, Jason Braness
  • Patent number: 10699181
    Abstract: In one example, a method includes generating, responsive to receiving a request for a recommendation for a group of users and based on first privacy level data for users of the group, an original list of recommendations for the group. In this example, the method further includes evaluating, by respective computational assistants associated with the users of the group and based on respective second privacy level data for the users of the group, recommendations from the original list of recommendations for inclusion in a pruned list of recommendations for the group, wherein the second privacy level is more restricted than the first privacy level. In this example, the method further includes, in response to the pruned list of recommendations including at least one recommendation, outputting, for presentation to the users of the group, the pruned list of recommendations.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: June 30, 2020
    Assignee: GOOGLE LLC
    Inventors: Liron Yatziv, Shlomo Krepner
  • Patent number: 10701069
    Abstract: An online identity verification application may be provided. According to an exemplary embodiment, an online identity verification application may utilize photographic, biometric, and documentation identification protocols. The verification application may use a multi-tier verification process based on identification protocols to verify the owner of a verification account and subsequently verify any linked accounts.
    Type: Grant
    Filed: May 28, 2019
    Date of Patent: June 30, 2020
    Assignee: LAURIE CAL LLC
    Inventor: Laurie A. Caluwaert
  • Patent number: 10691011
    Abstract: An imaging system includes a sound recording apparatus and an imaging apparatus that is connected to the sound recording apparatus and records, as moving-image sounds, sounds collected by the sound recording apparatus. The imaging apparatus detects whether the sound recording apparatus has been connected thereto. Upon detecting that the sound recording apparatus has been connected to the imaging apparatus, the imaging apparatus sets a sound-recording condition associated with the sound recording apparatus as a sound-recording condition for the imaging apparatus in a sound recording process and records sounds under the sound-recording condition that has been set.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: June 23, 2020
    Assignee: Olympus Corporation
    Inventors: Hiroki Kudo, Kazuki Sakurai, Keiji Kunishige
  • Patent number: 10691581
    Abstract: A connection request is received from a debug UI by a middle tier instance through a first predefined computer port. A connection data request is received from the debug UI by the middle tier instance. Connection data for a debug engine is sent from the middle tier instance to the debug UI and provided to the debug engine from the debug UI. The connection data includes a second predefined computer port of the first computing device. An initial packet is received by the middle tier instance from the debug engine through the second predefined computer port. A unique engine identifier is defined for the debug engine by the middle tier instance and an engine connection confirmation is sent from the middle tier instance to the debug UI indicating that a connection with the debug engine has been established and including the unique engine identifier for the debug engine.
    Type: Grant
    Filed: February 27, 2020
    Date of Patent: June 23, 2020
    Assignee: SAS INSTITUTE INC.
    Inventors: Michael Stephen Whitcher, Aaron Samuel Mays, Ryan Richard Albert, Gerald Lee Haden
  • Patent number: 10692166
    Abstract: A method, apparatus and computer readable storage to implement an automated system for video surveillance in a casino or other controlled environment. Players in the casino can be automatically scanned and analyzed for whether they are under the legal gambling age or not. When an underage gambler is detected, a casino security employee (or other casino personnel) is notified so they can take the appropriate action. Similarly, players who are excluded from the casino can also be automatically detected and would be ejected when detected.
    Type: Grant
    Filed: March 18, 2019
    Date of Patent: June 23, 2020
    Assignee: VISUALIMITS, LLC
    Inventors: Perry Stasi, Ryan McClellan
  • Patent number: 10680808
    Abstract: A biometric authentication system has a terminal which extracts and encodes feature data for authentication from acquired biometric information, and which transmits the encoded feature data for authentication. The system has a DB for storing encrypted authentication information, a search unit which searches for encrypted authentication information included in the DB, and a decryption unit which decrypts the encrypted authentication information searched for using encoded feature data for authentication as a decryption key. Accordingly, a user is uniquely identified using the obtained authentication information. Further, a processing unit performs authentication response processing with respect to the identified user, based on authentication information obtained by decryption.
    Type: Grant
    Filed: March 21, 2017
    Date of Patent: June 9, 2020
    Assignee: Hitachi, Ltd.
    Inventor: Kenta Takahashi
  • Patent number: 10678577
    Abstract: The invention discloses a method for realizing virtual secure element (VSE), which comprises the following steps: a secure element manager (SEM) generates a request which comprises virtualized configuration information; and a virtual machine monitor in a hypervisor allocates an address space for the VSE according to the above request.
    Type: Grant
    Filed: April 11, 2014
    Date of Patent: June 9, 2020
    Assignee: CHINA UNIONPAY CO., LTD.
    Inventors: Hongfeng Chai, Zhijun Lu, Shuo He, Wei Guo, Yu Zhou, Dingzhou Li
  • Patent number: 10664615
    Abstract: A computer-implemented method for adapting an application programming interface (API), according to some embodiments, includes: determining that a data field of API response data satisfies a condition for applying a data security operation to data stored in the data field; and modifying the API response data by performing the data security operation on the data stored in the data field. A computer-implemented method for adapting an application programming interface (API), according to some embodiments, includes: determining that a data field of an API call satisfies a condition for applying a data security operation to data stored in the data field; and performing the data security operation on the data stored in the data field of the API call.
    Type: Grant
    Filed: May 22, 2019
    Date of Patent: May 26, 2020
    Assignee: Capital One Services, LLC
    Inventor: Scott Schenkein
  • Patent number: 10637915
    Abstract: The subject technology provides for receiving, via an application programming interface (API), a request from a client, the request including software configuration data for configuring data storage for supporting a workload of an application. A set of hardware performance characteristics for supporting the workload of the application is determined based at least in part on the software configuration data that includes a name of a respective software application and/or version of the software application. The subject technology determines a current set of available hardware resources that match the set of hardware performance characteristics. Using the current set of available hardware resources, a set of data stores are provisioned. The subject technology then provides, to the client, information related to a virtual mount point for provisioning the set of data stores to the application.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: April 28, 2020
    Assignee: Amazon Technologies, Inc.
    Inventor: Miles Julian Ward
  • Patent number: 10630490
    Abstract: A secure element (SE) with a notion of time useful for checking secure items is disclosed herein. Methods of obtaining time information by the SE include push, pull, opportunistic, local interface, and multi-check methods. Time information can be obtained from a root certification authority (CA) and one or more subordinate CAs, which are associated with and subordinate to the root CA. The SE uses the time information for time management of time values stored in the SE. The SE also uses the time information in cooperation with certificate revocation lists (CRLs) and/or online certificate status protocol (OCSP) stapling procedures.
    Type: Grant
    Filed: March 9, 2018
    Date of Patent: April 21, 2020
    Assignee: Apple Inc.
    Inventor: Xiangying Yang
  • Patent number: 10623185
    Abstract: Granting an aligned secured access to a resource for a client system. A first authentication token and a first validity time period value are received from a first server. The first authentication token includes an authorization for accessing the system resource and the predefined session time. The first authentication token including the predefined session time is sent from the client system to a second server. A second validity period value of a second validity period of a second authentication token for a service provided by the second server to the client system is set equal to the received predefined session time. The second authentication token for the second validity period is sent from the second server to the client system such that an aligned secured access is granted for the client system to the resource.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: April 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sascha Schefenacker, Stefan Schmitt
  • Patent number: 10616759
    Abstract: Some embodiments relate to a device that transmits/receives encrypted communications with another device. A first device, such as a smart phone or smart watch, may generate a message associated with a certain data class, which may determine the security procedure used in the communication of the message. The first device may establish an encryption session for the purpose of communicating the message to a second device. Prior to sending the message, the first device may wait until encryption credentials are accessible according to certain conditions, which may be determined at least in part by the data class of the message. Similarly, after receiving the message, the second device may not be able to decrypt the message until encryption credentials are accessible according to certain conditions, which may be determined at least in part by the message data class.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: April 7, 2020
    Assignee: Apple Inc.
    Inventors: Berkat S. Tung, Daniel B. Pollack, Hyeonkuk Jeong, Joe S. Abuan, Pierre J. De Filippis, Yan Yang
  • Patent number: 10607263
    Abstract: Disclosed are systems and methods for improving interactions with and between computers in an authentication system supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data across platforms, which data can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods provide advanced, computerized security features that dynamically, in real-time, determine parameters that must be entered in order for a user to login to a system or platform, as well as the quantity and order such parameters must be entered. The disclosed systems and methods involve computerized mechanisms for authenticating a user or device for which access to a web-based resource is desired. Requested credentials in accordance with the dynamically determined manner in which such credentials are automatically determined and requested must be appropriately entered.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: March 31, 2020
    Assignee: OATH INC.
    Inventors: Manoj Palki, Alice Gutman, Gabriel Maganis, Francis Hsu
  • Patent number: 10609075
    Abstract: An apparatus for computer-network security includes a network interface and a processor. The network interface is configured for communicating over a communication network. The processor is configured to detect a request from a first computer to access a non-existent shared resource of a second computer, to send to the first computer, responsively to the request, a response that imitates a genuine grant of access to the non-existent shared resource, so as to initiate an interaction between the first computer and the shared resource, and to process the interaction so as to identify a malicious activity attempted by the first computer.
    Type: Grant
    Filed: April 20, 2017
    Date of Patent: March 31, 2020
    Assignee: GUARDICORE LTD.
    Inventors: Yoni Rozenshein, Ofri Ziv
  • Patent number: 10599952
    Abstract: A method includes passing an original text document through distortion filter generators to generate a training dataset that includes distorted text documents. Each distortion filter generator is configured to distort words or letters of words in phrases of text of a facsimile image in a respective unique manner. A neural network model is trained to recognize each respective distortion and match each respective distortion with each respective distortion filter generator based on the training dataset and the original text document. Image data of one facsimile having at least one text distortion is received and inputted to the trained neural network model. The output of the trained neural network model is coupled to an input of an optical character recognition (OCR) engine. The trained neural network model and the OCR engine convert the received image data of the incoming facsimile corrected for the at least one text distortion to machine-encoded text.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: March 24, 2020
    Assignee: Capital One Services, LLC
    Inventors: Reza Farivar, Jeremy Goodsitt, Vincent Pham, Austin Walters, Fardin Abdi Taghi Abad, Anh Truong, Mark Watson
  • Patent number: 10600055
    Abstract: Aspects of the invention relate to a central authentication and interaction tracking system for authenticating an entity making a request related to a financial account. The system facilitates authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity. The system includes an application interface receiving interaction requests over a network, the interaction requests originating from multiple entities and including a plurality of authentication factors. The system further includes a computer processor and computer memory capable of building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes indicators of the authentication factors from each initiated transaction request.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: March 24, 2020
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Stephen Durney, Tracy M. Pletz, Timothy A. Webb
  • Patent number: 10579443
    Abstract: The present technology pertains to responding to a kernel level file event for a content item and presenting a file event window associated with the content item. A client device can detect the kernel level file event for the content item. This can be accomplished using a kernel extension on a client device that is networked with a content management system. The client device can then retrieve data associated with the content item, including an instruction for the content item. The client device can then perform the instruction. This instruction can be to retrieve collaboration data from the content management system and present the collaboration data in a file event window.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: March 3, 2020
    Assignee: Dropbox, Inc.
    Inventors: Marcio von Muhlen, Vinod Valloppillil, Nils Bunger
  • Patent number: 10581873
    Abstract: A computing device running a local enforcement agent is configured to instantiate at least one application container at the computing device, where the at least one application container is part of a containerized application. The computing device is also configured to associate the local enforcement agent with the least one application container so that the local enforcement agent operates as an intra-application communication proxy for the least one application container. The local enforcement agent receives an intra-application Application Programming Interface (API) call that is sent to the at least one application container from a second application container that is part of the containerized application. The local enforcement agent is configured to analyze the intra-application API call for compliance with one or more security policies associated with the at least one container.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: March 3, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Andre Surcouf, Jérôme Tollet
  • Patent number: 10565399
    Abstract: Disclosed herein are system, method, and computer program product embodiments for data anonymization in an in-memory database. An embodiment operates by receiving an indication to perform data anonymization based on one or more quasi attributes of a data set. The data set is sorted based on the one or more quasi attributes. The sorted data set is grouped into a first plurality of groups. A particular group that does not include enough records to satisfy an anonymization threshold is identified from amongst the first plurality of groups. The particular group is combined with another group of the first plurality of groups.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: February 18, 2020
    Assignee: SAP SE
    Inventor: Xinrong Huang
  • Patent number: 10565248
    Abstract: A device may receive multiple versions of content from one or more data streams associated with a content provider. The content may include audio content and/or video content. The one or more data streams may include digital rights management (DRM) protection. The device may cause the multiple versions of the content to be stored via a data structure. The data structure may be organized based on contextual information associated with the multiple versions of the content. The multiple versions of the content may be stored with the DRM protection. The device may receive a request for the content. The device may determine a particular version of the content, of the multiple versions of the content, based on the request for the content and at a determined location of the content. The device may provide the particular version of the content for playback of the audio content and/or the video content.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: February 18, 2020
    Assignee: Verizon Patent And Licensing Inc.
    Inventor: Alexander Tiraspolsky
  • Patent number: 10558814
    Abstract: Methods for identifying and obtaining a suitable application for interacting with a selected content item by providing secure access to a limited portion of information on the selected content item are provided. In one aspect, a method includes receiving a selection from a user in an initial application running on a device to interact with a content item accessible by the initial application, and generating a hash value from the limited portion of information on the content item. The method further includes requesting a copy of the at least one suitable application when the comparison of the hash value for the content item with the hash value for the suitable application match, executing the suitable application on the device, and providing the limited portion of information on the content item to the suitable application for interaction by the user. Systems and machine-readable media are also provided.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: February 11, 2020
    Assignee: Google LLC
    Inventors: Giles Hogben, Matthew Kulick, Todd Kennedy, Dianne Hackborn
  • Patent number: 10555154
    Abstract: For transmitting a secured data package from a computer system to a short-range communication device, the secured data package is transmitted from the computer system via a mobile radio network to a mobile communication apparatus. The mobile communication apparatus is placed in the communication range of the short-range communication device and receives from the short-range communication device a data read request, which includes device location information. The mobile communication apparatus determines the current location of the mobile communication apparatus. In case of correspondence of the current apparatus location with the received device location information, the mobile communication apparatus determines positive access authorization and transfers the secured data package to the short-range communication device.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: February 4, 2020
    Assignee: LEGIC Identsystems AG
    Inventors: Martin Buck, Peter Plüss, Marcel Plüss
  • Patent number: 10542407
    Abstract: Techniques are described that facilitate analyzing real-time communication sessions between a client device of a client account and a third-party device for the purpose of detecting safety concerns that may impact a client associated with the client device. The real-time communication sessions may include voice or text communications provisioned by a telecommunication service provider. In response to detecting a safety concern, notification data may be sent to a trusted device associated with the client account that alerts a trusted person of the inferred safety concern. In some examples, a safety concern may be inferred based on an irregular performance or non-performance of a regularly conducted real-time communication session. Moreover, communication session modification data may be sent to a client device involved in the real-time communication session for the purpose of terminating the real-time communication session based at least in part on safety concerns.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: January 21, 2020
    Assignee: T-Mobile USA, Inc.
    Inventor: Parag Garg
  • Patent number: 10536479
    Abstract: Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.
    Type: Grant
    Filed: March 19, 2018
    Date of Patent: January 14, 2020
    Assignee: Shape Security, Inc.
    Inventors: Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
  • Patent number: 10536450
    Abstract: A method and system performed by a computing system for signing in using personal identifiers input via a sign-in portal that supports multiple tenants is provided. The system receives a sign-in request for a user that includes a personal identifier. The personal identifier uniquely identifies a person but does not include an identification of a tenant. The system performs a verification based on the personal identifier to authenticate the user. The system identifies, from a mapping, a tenant to which the personal identifier is mapped. The mapping maps personal identifiers of users to tenants. The system retrieves, from a user store for the tenant, user information relating to the user. The system then creates a security token based on the user information. If verification of the user was successful, the system sends the security token to the sign-in portal as evidence that the user has been authenticated.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: January 14, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.
    Inventors: Ariel Gordon, Sarat Chandra Subramaniam, Ben Vincent, Paul Garner
  • Patent number: 10528689
    Abstract: A system and methods to verify a correctness of data formatted according to an IEEE P1687 (IJTAG) standard, in connection with migration of test patterns from an instrument level to a top level of an integrated circuit design. Data describing an integrated circuit at the instrument level and at the top level is read from Instrument Connectivity Language (ICL) files, Procedural Description Language (PDL) files, and hardware description language (HDL) files. The methods include at least one of verifying structural descriptions of the integrated circuit in the ICL files and verifying an ability to use chip level inputs to access instruments in the integrated circuit. The verification procedure is performed prior to a simulation in which a migrated test pattern is applied to the integrated circuit.
    Type: Grant
    Filed: November 29, 2016
    Date of Patent: January 7, 2020
    Assignee: CADENCE DESIGN SYSTEMS, INC.
    Inventors: Rajesh Khurana, Vivek Chickermane, Dhruv Dua, Krishna Vijaya Chakravadhanula
  • Patent number: 10528504
    Abstract: A control unit makes a connection state between a connection device connected to a connection management device and an electronic device when a determination unit determines that identification information of the connection device connected to the connection management device has been registered in a connection work plan and a connection history of a connection order preceding a connection order of the connection device is “connected”, and does not make the connection state between the connection device connected to the connection management device and the electronic device when it is determined that the connection history of the connection order preceding the connection order of the connection device is “unconnected”.
    Type: Grant
    Filed: May 15, 2019
    Date of Patent: January 7, 2020
    Assignee: Hitachi, Ltd.
    Inventors: Tatsuya Okamoto, Takayuki Kameda, Ryuutarou Tomozawa
  • Patent number: 10509919
    Abstract: A target transaction initiated by a member node device in a blockchain is received, where the target transaction include a reference time parameter, and where the reference time parameter is used to determine whether the target transaction is a valid transaction within a transaction validity period. Based on the reference time parameter, a determination is performed as to whether the target transaction is a valid transaction within a transaction validity period. In response to determining that the target transaction is a valid transaction within the transaction validity period, the target transaction is recorded to a generated candidate block.
    Type: Grant
    Filed: May 29, 2019
    Date of Patent: December 17, 2019
    Assignee: Alibaba Group Holding Limited
    Inventors: Jiyuan Wang, Huabing Du, Xuebing Yan
  • Patent number: RE48132
    Abstract: An operating method for a media stream transmission key includes: detecting, by a media gateway, lifetime status information of a media stream transmission key; and when the media gateway determines that a lifetime of the media stream transmission key expires, executing, by the media gateway, a media stream transmission key lifetime expiry behavior according to an instruction of a media gateway controller. The embodiments of the present invention fill a technical gap that an operation is performed on a lifetime status of a media stream transmission key in an architecture where an MG and an MGC are separated.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: July 28, 2020
    Assignee: Huawei Technologies Co., Ltd.
    Inventor: Weiwei Yang