By Authorizing User Patents (Class 726/28)
  • Patent number: 10708147
    Abstract: One embodiment provides a method for monitoring context-dependent quality of service in a shared computing environment that includes detecting, by a processor, a change in context. Service classes are dynamically assigned to individual users and respective applications within shared computing environment customers based on the change in context. Service level agreement (SLA) statistics for each assigned service class are aggregated and collected.
    Type: Grant
    Filed: March 7, 2017
    Date of Patent: July 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Nathalie Baracaldo Angel, Heiko H. Ludwig, Rui Zhang
  • Patent number: 10691790
    Abstract: Various methods and systems are provided for autonomous secrets management for a temporary shared access signature (“SAS”) service. Input for a temporary access request for an account resource, is received from a client. The temporary access request is validated, based on communicating a validation request to the secrets management service (“SMS”) that can be utilized to store, renew and distribute secrets in a distributed computing environment. Validating the temporary access request is based on determining a storage account location path for SAS keys that provide temporary access to account resources. An access policy associated with the temporary access request is accessed. An SAS key request, associated with temporary access request, is communicated to the SMS. The SAS key request includes at least a portion of the access policy. An SAS key is received from the SMS. The SAS key, for access to the account resource, is communicated to the client.
    Type: Grant
    Filed: March 14, 2018
    Date of Patent: June 23, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Brian S. Lounsberry, Kahren Tevosyan, Vyom P. Munshi, Chetan S. Shankar, Pavan Gopal Bandla, Pawel Tomasz Lipiec, Sandeep S. Kalarickal
  • Patent number: 10691781
    Abstract: An apparatus and method for device security, wherein a fingerprint image is acquired on a touchscreen, and an authentication process is performed based on the first fingerprint image. Thereafter, a second fingerprint image is acquired and a difference between a characteristic of the first and second fingerprint images is determined, and based upon whether this difference is greater than a threshold, a second authentication process is performed.
    Type: Grant
    Filed: October 30, 2017
    Date of Patent: June 23, 2020
    Assignee: QUALCOMM Incorporated
    Inventors: Meir Agassy, Noam Dagan, Gal Rotem
  • Patent number: 10686824
    Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.
    Type: Grant
    Filed: July 16, 2018
    Date of Patent: June 16, 2020
    Assignee: Authentic8, Inc.
    Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston, Varley H. Taylor, Zachary L. Segal, Luka I. Stolyarov, Joshua R. McMains, Brian T. Zaugg
  • Patent number: 10679704
    Abstract: Devices and techniques for NAND temperature data management are disclosed herein. A command to write data to a NAND component in the NAND device is received at a NAND controller of the NAND device. A temperature corresponding to the NAND component is obtained in response to receiving the command. The command is then executed to write data to the NAND component and to write a representation of the temperature. The data is written to a user portion and the representation of the temperature is written to a management portion that is accessible only to the controller and segregated from the user portion.
    Type: Grant
    Filed: July 5, 2019
    Date of Patent: June 9, 2020
    Assignee: Micron Technology, Inc.
    Inventors: Kishore Kumar Muchherla, Sampath Ratnam, Preston Allen Thomson, Harish Reddy Singidi, Jung Sheng Hoei, Peter Sean Feeley, Jianmin Huang
  • Patent number: 10681204
    Abstract: Concepts and technologies are disclosed herein for separating sensitive data from mobile devices for theft prevention. According to one aspect, a system includes a data security platform and a mobile device platform. The mobile device platform can detect that the data security platform is connected. The mobile device platform can determine whether the data security platform is part of an authenticated pair with the mobile device platform. In response to determining that the data security platform is part of an authenticated pair with the mobile device platform, the mobile device platform can access at least a portion of sensitive data that is stored in a memory component of the data security platform. If the data security platform is disconnected from the mobile device platform, the mobile device platform cannot function or can provide limited functionality, such as a function to communication with a 9-1-1 service.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: June 9, 2020
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Brian Kevin Daly
  • Patent number: 10666653
    Abstract: A technique for network authentication interoperability involves initiating an authentication procedure on a first network, authenticating on a second network, and allowing access at the first network. The technique can include filtering access to a network, thereby restricting access to users with acceptable credentials. Offering a service that incorporates these techniques can enable incorporation of the techniques into an existing system with minimal impact to network configuration.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: May 26, 2020
    Assignee: Aerohive Networks, Inc.
    Inventors: Kenshin Sakura, Matthew Stuart Gast, Long Fu
  • Patent number: 10657238
    Abstract: This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
    Type: Grant
    Filed: June 4, 2019
    Date of Patent: May 19, 2020
    Assignee: Apple Inc.
    Inventors: Taido Nakajima, Pareet Rahul, Gloria Lin
  • Patent number: 10656897
    Abstract: A communication apparatus displays an image on a display unit, transmits a display image displayed on the display unit to another communication apparatus by wireless communication, transmits a confirmation image for confirming a transmission destination of the display image to the another communication apparatus by wireless communication to display the confirmation image on the another communication apparatus, selects, by a user operation, whether to transmit the display image to the another communication apparatus, after transmission of the confirmation image and before transmission of the display image, and transmits the display image to the another communication apparatus if it is selected in the selecting to transmit the display image.
    Type: Grant
    Filed: March 6, 2019
    Date of Patent: May 19, 2020
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kunio Isonishi
  • Patent number: 10657558
    Abstract: A first set of electronic information is logged to a remotely located data store, including a user identifier, primary content, secondary content, and user interaction with the primary content and the secondary content. A second set of electronic information is received from a data source other than the user device, the second set of electronic information being related to the same user identifier as the user identifier of the first set of electronic information. Behavioral data is created for the user identifier based on at least the logged first set of electronic information and the second set of electronic information. A subsequently displayed container is controlled or modified based on the behavioral data.
    Type: Grant
    Filed: May 16, 2017
    Date of Patent: May 19, 2020
    Assignee: Mather Economics, LLC
    Inventors: Paul Mather Lindsay, Douglas A. Scher, Charles Currin, Arvid Tchivzhel, Kenneth E. Irwin, Jr.
  • Patent number: 10652246
    Abstract: Embodiments regard security descriptors for record access queries. An embodiment of a method includes: receiving a record access query, the query regarding records for a certain one or more users at a certain access level; searching one or more sharing tables of entities in a computing environment for security descriptors, each security descriptor being associated with a set of one or more users having access to one or more records of a set of records at an access level; identifying any security descriptors in the one or more sharing tables that relate to the certain one or more users with at least the certain access level; and searching the one or more records associated with each of the identified security descriptors according to the record access query.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: May 12, 2020
    Assignee: salesforce.com, inc.
    Inventor: Venkat Chandrasekaran
  • Patent number: 10635830
    Abstract: A system for providing an ingest proxy and query rewriter for secure data is described. In an example implementation, the system may include a proxy configured to obfuscate data, generate maps of the obfuscated data to the original data, and send the obfuscated data to an analysis server. The analysis server may be configured to generate analysis data relevant to the obfuscated data and the original data by analyzing the obfuscated data. The analysis server may send the analysis data and an identification of the obfuscated data to a user device in response to a request from the user device. The user device may be configured to detect the identification of the obfuscated data in the signal received from the analysis server and retrieve the analysis data from a client device via the proxy.
    Type: Grant
    Filed: November 29, 2017
    Date of Patent: April 28, 2020
    Assignee: Hound Technology, Inc.
    Inventors: Christopher Toshok, Benjamin Hartshorne, Christine Yen, Charity Majors
  • Patent number: 10630712
    Abstract: Disclosed is an aircraft (102) comprising an aircraft avionics system (108) configured to perform one or more functions, and an interface module (110). The interface module (110) is configured to: store, for each function, respective one or more test criteria; receive, from an entity (104) remote from the aircraft avionics system (108), a function request for the aircraft avionics system (108) to perform a certain function; test the certain function against one or more of the stored test criteria corresponding to the certain function; and, responsive to determining that the certain function satisfies all of the test criteria that correspond to the certain function, outputting the function request for use by the aircraft avionics system (108).
    Type: Grant
    Filed: June 1, 2016
    Date of Patent: April 21, 2020
    Assignee: BAE Systems plc
    Inventor: James Richard Amor
  • Patent number: 10628596
    Abstract: An E-signing workflow enables an E-document to be signed by multiple parties including a document signer and a third-party, such as a guarantor. The E-signing workflow employs various online detours that enable addition of third parties to an E-document. The E-signing workflow enables a complete audit trail to be easily and automatically developed for a document sender and signers, and associated with a particular E-document. Privacy concerns are addressed by way of secure electronic communications that take place between the parties within the E-signing workflow. The E-signing workflow reduces reliance on e-mail for document execution insofar as most if not all relevant activities in the E-signing workflow take place within the workflow and result in storage of the E-document and all relevant information within the E-signing solution itself.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: April 21, 2020
    Assignee: Adobe Inc.
    Inventors: Divij Kumar, Aditya Kumar Pandey
  • Patent number: 10620740
    Abstract: A method includes acquiring, from a touch panel, a contact position of a manipulating body and contact information that indicates a degree to which the manipulating body is in contact at the contact position, acquiring, from a camera, a plurality of images captured while the manipulating body is in contact with a plurality of mutually different positions on the touch panel due to manipulations with the manipulating body, creating variation information that indicates a variation in contact information, according to a plurality of contact information corresponding to the plurality of contact positions, and deciding, according to the variation information, suitability of the plurality of images in the biometric authentication to be executed using the plurality of images.
    Type: Grant
    Filed: July 8, 2016
    Date of Patent: April 14, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Hajime Nada, Yukihiro Abiko, Soichi Hama, Satoshi Maeda, Satoshi Semba
  • Patent number: 10621320
    Abstract: The operator identification system is capable of managing the information required for authentication of operators centrally with high operation rate. The operator identification system includes a manufacturing cell including a manufacturing machine and a cell controller that can communicate with the manufacturing machine. The cell controller includes a first operator identification information acquisition unit for acquiring operator identification information, a first operation permission/inhibition information storage unit for storing operation permission/inhibition information of the operator on the manufacturing machine, and a first operator identification unit for determining an operation executable by the operator on the manufacturing machine based on the operator identification information and the operation permission/inhibition information.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: April 14, 2020
    Assignee: Fanuc Corporation
    Inventors: Hideo Ogino, Keisuke Tsujikawa
  • Patent number: 10614427
    Abstract: A system for monetizing deployment of building management software configured to operate an HVAC device includes one or more processors coupled to non-transitory memory. The one or more processors are configured to create a service task for a field technician including information identifying the building management software to be installed on an end device. The one or more processors are further configured to generate a unique product key and attach the unique product key to the service task, transmit the service task to a field technician platform configured to be accessed by the field technician, validate bound data received from the field technician platform, the bound data comprising end device fingerprint information and the unique product key. The one or more processors are further configured to generate a license file configured to complete installation of the building management software.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: April 7, 2020
    Assignee: Johnson Controls Technology Company
    Inventors: Joseph Morris, Suresh R. Sunderesan, James R. Beninghaus
  • Patent number: 10606808
    Abstract: Described herein is a system and method for suggesting other user(s) with whom to share an electronic file. During editing of the electronic file, an intent of a user to share the electronic file can be inferred. For each of a plurality of other users, a probability indicative of a likelihood that the user would like to share the electronic file with the particular other user is calculated. Based upon the calculated probabilities, at least one other user to suggest to the user for sharing of the electronic file is identified. Information regarding the identified at least one other user is displayed. Based upon a user selection of another user to share the electronic file with, an algorithm used to calculate the probabilities can be updated.
    Type: Grant
    Filed: March 7, 2018
    Date of Patent: March 31, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Patrick Michael Gan, Douglas Lane Milvaney
  • Patent number: 10607237
    Abstract: A system and methods allowing the creation, integration, and transaction of rule circumventions and/or interactive advertisements in computing environments is provided. In an illustrative implementation, the present invention comprises a core transaction server, a multimedia transaction server, and browser application. A computing environment cooperates with the core transaction server to obtain data representative of computing environment rule circumventions for integration within the computing environment as well as computing environment circumvention transaction information. The core transaction server cooperates with the multimedia transaction server to obtain data representative of the desired computing environment rule circumvention and with the browser application to obtain inputs from computing environment to establish accounts for use when transacting computing environment rule circumvention transactions.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: March 31, 2020
    Assignee: GAMETEK LLC
    Inventor: Shawn Cartwright
  • Patent number: 10602353
    Abstract: Provisioning a requesting device is provided using extended identity attestation for the requesting device. A provisioning request is received at a device provisioning system. The provisioning request includes a registration identifier provided by the requesting device. A plurality of extended attestation components is accessed in an enrollment datastore of the device provisioning system. Each extended attestation component identifies an external computing system. One of the extended attestation components in the enrollment datastore is selected based on the received registration identifier. Execution of the device attestation is initiated at the external computing system identified by the selected extended attestation component to yield an attestation result. Satisfaction of a validity condition by the attestation result is detected. The requesting device is provisioned from the device provisioning system, responsive to detection that the attestation result satisfies the validity condition.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: March 24, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Nicole Elaine Berdy, Alexander Tolpin, Tamer Awad, Rajeev Mandayam Vokkarne, Puneet Gupta, Timothy James Larden, Jelani Z. Brandon, SachinKumar Chandramohan, Mounica Arroju
  • Patent number: 10592642
    Abstract: In some embodiments, systems, apparatuses, and methods are provided herein useful to automatically authorizing digital rights access. In some embodiments, the system comprises a content creator server, wherein the content creator server is configured to create a block, wherein the block includes the content, publish, to a public ledger, the block, wherein the public ledger comprises a blockchain, generate, for a user device, a key, wherein the key provides digital rights access to the block, and transmit, to the user device, the key, the user device configured to store a local copy of the public ledger, update the local copy of the public ledger to include the block, receive, from the content creator server, the key, and access, via the local copy of the public ledger with the key, the block, wherein access to the block allows the user device to make use of the content.
    Type: Grant
    Filed: April 17, 2019
    Date of Patent: March 17, 2020
    Assignee: Walmart Apollo, LLC
    Inventors: Bruce W. Wilkinson, Charles Harry Lobo, Sid Shake
  • Patent number: 10587661
    Abstract: A method for providing a content streaming service and managing data statistics of a user using a quick response (QR) code is provided. The method includes receiving, by a server, scan data of the QR code printed on a real content product of the user from a user terminal, authenticating, by the server, the purchase of the real content product of the user based on the scan data and registering unique information of the user terminal which transmits the scan data, registering, by the server, content corresponding to the scan data with a list of content of the user terminal, receiving, by the server, a request to stream the content registered with the list of the content of the user terminal from the user terminal, and transmitting, by the server, streaming data of the requested content to the user terminal.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: March 10, 2020
    Assignee: PLAYCOMPANY corp.
    Inventor: Hyung Seok Cho
  • Patent number: 10581854
    Abstract: An information processing system includes an information processing apparatus, a first server, and one or more second servers configured to manage authority to use different applications.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: March 3, 2020
    Assignee: RICOH COMPANY, LTD.
    Inventor: Xiaofeng Han
  • Patent number: 10579262
    Abstract: Links between data regions are intelligently formed, based on up-to-date popularity statistics, including a number of times a particular one of the data regions was a target for a potential link with another one of the data regions. An owner manages a popularity index incorporating the popularity statistics, where over time, the popularity index is subjected to an aging mechanism pursuant to a decaying algorithm. An owner one of the data regions decides whether to accept the one of the intelligently formed links based on at least one of a plurality of predetermined factors. If the one of the intelligently formed links is accepted by the owner one of the data regions, a potential referrer creates one of the data regions using one of the intelligently formed links. If the one of the intelligently formed links is rejected by the owner one of the data regions, data is written.
    Type: Grant
    Filed: April 6, 2018
    Date of Patent: March 3, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Danny Harnik, Ben Sasson, Yosef Shatsky, Dmitry Sotniknov
  • Patent number: 10579810
    Abstract: Examples of the present disclosure relate to providing policy-protected file access. Some examples involve a configuration profile that includes a credential. The credential permits access to a policy-protected file. Once installed, the configuration profile causes the second credential to be accessible by a file management application of the client device, but inaccessible by a user of the client device. A file management application provides access to the policy-protected file based on the second credential.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: March 3, 2020
    Assignee: AIRWATCH LLC
    Inventors: Ramani Panchapakesan, Saurabh Agrawal, Suja Ramachandran, Sushilvas Vasavan
  • Patent number: 10576929
    Abstract: An electronic control unit configured to permit a vehicle to travel in an automated driving mode. The electronic control unit is configured to detect unauthorized access from an outside to an in-vehicle Local Area Network during the automated driving mode. The electronic control unit is configured to perform control to fix a gear position of an automatic transmission when the electronic control unit determines that unauthorized access from the outside occurs during the automated driving mode.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: March 3, 2020
    Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHA
    Inventor: Kenta Kumazaki
  • Patent number: 10572643
    Abstract: The operator identification system is capable of managing the information required for authentication of operators centrally with high operation rate. The operator identification system includes a manufacturing cell including a manufacturing machine and a cell controller that can communicate with the manufacturing machine. The cell controller includes a first operator identification information acquisition unit for acquiring operator identification information, a first operation permission/inhibition information storage unit for storing operation permission/inhibition information of the operator on the manufacturing machine, and a first operator identification unit for determining an operation executable by the operator on the manufacturing machine based on the operator identification information and the operation permission/inhibition information.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: February 25, 2020
    Assignee: Fanuc Corporation
    Inventors: Hideo Ogino, Keisuke Tsujikawa
  • Patent number: 10572670
    Abstract: Current security tools in the marketplace fall into different categories: Security Enforcement Tools which identify and block malicious activity, and Security Vulnerability Testing Tools which scan and identify security threats within an organisation. The disclosure describes Silently (invisible to the user) but as if it is the user, within the User's Context, Executing applications to test whether third party security products and security settings exhibit the correct behaviour. The application can continuously perform a test(s) and expects a security product to behave in a certain way, records the result of the test(s) and reports those results.
    Type: Grant
    Filed: September 12, 2017
    Date of Patent: February 25, 2020
    Assignee: INTROSPECTUS PTY LTD
    Inventor: Eugene Sean Nolan
  • Patent number: 10565572
    Abstract: Disclosed herein are representative embodiments of methods, apparatus, and systems for facilitating the use and exchange of customized third-party content in a distributed computing environment that allows for third-party hosting. Embodiments of the disclosed technology concern an application store within an application (e.g., an “in-app app store”). The application store can offer downloadable digital content and/or roaming entitlements to a user of the application. Further, in particular embodiments, the downloadable content and/or entitlements are generated by a third party (e.g., a party different than the provider/publisher of the application and the user of the application). Also disclosed are methods and mechanisms for copy-protecting such content.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: February 18, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: John M. Thornton, Jason M. Cahill
  • Patent number: 10567359
    Abstract: A computer program product and a system comprising: a cluster of Secure Execution Platforms (SEPs) having connectivity to a data storage, each SEP of said cluster is configured to maintain, using a key, confidentiality of data while processing thereof; the key is shared among the SEPs of said cluster, the key is automatically generated by the cluster or portion thereof and is unavailable to any non-cluster entity; the data storage retains encrypted data that is encrypted using the key; a first SEP of the cluster is configured to encrypt client data using the key to obtain encrypted client data and store the encrypted client data in the data storage; and a second SEP of the cluster is configured to retrieve encrypted stored data from the data storage, decrypt the encrypted stored data using the key to obtain non-encrypted form of the encrypted stored data.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: February 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Danny Harnik, Moshik Hershcovitch, Paula Ta-Shma, Yaron Weinsberg
  • Patent number: 10552627
    Abstract: Computing systems and methods for the creation and management of authorizations of blockchain objects. Systems and methods managed by a controlled number of governing entities allow the management of access authorizations for an object connected to a varying group of services. Systems and methods therefore have numerous advantages including strong inter-operability, strong resilience, confidentiality, autonomy, ensured data integrity and traceability.
    Type: Grant
    Filed: January 24, 2019
    Date of Patent: February 4, 2020
    Assignee: BULL SAS
    Inventors: David Leporini, Charles Piron
  • Patent number: 10554621
    Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.
    Type: Grant
    Filed: July 16, 2018
    Date of Patent: February 4, 2020
    Assignee: Authentic8, Inc.
    Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston, Varley H. Taylor, Zachary L. Segal, Luka I. Stolyarov, Joshua R. McMains, Brian T. Zaugg
  • Patent number: 10542031
    Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for providing a remote cloud browsing session. A remote cloud browsing session may receive a request for Internet content from a user device, access the Internet content from an Internet content source, and transmit second Internet content to the user device based on the requested Internet content.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: January 21, 2020
    Assignee: Authentic8, Inc.
    Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston
  • Patent number: 10540730
    Abstract: Aspects are disclosed that facilitate matching a user with a virtual agent. A database of virtual agents is maintained in which each of the virtual agents are remotely located from a property secured by a locking mechanism. A user is authenticated based on user information included in a request to enter the property, and an authenticated user is matched with a host agent of a virtual tour. Here, the host agent is selected from the database of virtual agents, and the virtual tour comprises a remote real time interaction between the user and the host agent while the user physically accesses the property.
    Type: Grant
    Filed: February 10, 2016
    Date of Patent: January 21, 2020
    Inventor: Erick Motta
  • Patent number: 10542045
    Abstract: The secure management of attachments is described. In one example, a message is received by a device management computing environment from a client computing device. The message can include an addressee list, a resource locator to a file, and a schedule associated with an event, for example. The message is intended for distribution to a number of other client devices along with the file according to the addressee list. However, the file is not directly attached to the message. Instead, the distribution of and access to the file is managed separately and securely by the device management computing environment. The device management computing environment can cause the file to be accessible through the client devices using the resource locator based on the schedule associated with the event. Further, after the event, the device management computing environment can cause the file to be inaccessible and/or removed from the client devices.
    Type: Grant
    Filed: February 22, 2017
    Date of Patent: January 21, 2020
    Assignee: AIRWATCH LLC
    Inventors: Sachin Vas, Sushilvas Vasavan, Ramani Panchapakesan, Pavithra Narayanaswamy
  • Patent number: 10534533
    Abstract: A messaging system in one embodiment includes a messaging app and one or more sticker extension apps configured to create a sticker image and render a sticker image that is displayed in a view hosted by the messaging app. The messaging app can launch, from a browsable view that includes one or more sticker extension apps, one or more of the sticker extension apps, and a sticker image created by one of the sticker extension apps can be communicated between the sticker extension app and the messaging app through an interprocess communication.
    Type: Grant
    Filed: December 22, 2016
    Date of Patent: January 14, 2020
    Assignee: Apple Inc.
    Inventors: Adele C. Peterson, Bhaskar P. Sarma, Kevin J. Lindeman, Roberto Garcia, David Alex Carter, Gokul Thirumala
  • Patent number: 10536407
    Abstract: Functionality is disclosed herein for converting shared files to message attachments. A message interface is displayed that allows a user to compose an electronic message and to specify files to attachments. For example, a user may use a messaging client to specify the files to be converted to an attachment. The files that are specified to be attached to the electronic message are stored by a sharing service that is separate from the messaging service. Instead of downloading the specified files to the messaging client, the sharing service communicates the specified files directly to the messaging service. In this way, the amount of data downloaded to the messaging client associated with the computing device is reduced. When the user sends the message, the messaging client sends the message with the attachments to one or more recipients.
    Type: Grant
    Filed: December 15, 2014
    Date of Patent: January 14, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Ivo van Doorn, Floor Mesters, Milo Oostergo
  • Patent number: 10530771
    Abstract: An improved method and system of enabling the owner of an account associated with a resource to allow a second user to gain access to the resource or a particular aspect of the resource is disclosed. Solutions and implementations disclosed provide an easily manageable mechanism for allowing access to a resource, without the need for a complex administrator-based access control system. Instead, a negotiated account to account resource access arrangement is established between the first user's account and the second user's account to share some or all of the actions available to the first user for the resource.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: January 7, 2020
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Ira C. Stevens, III, Nicholas H. Katis
  • Patent number: 10530790
    Abstract: A privileged account manager is provided for monitoring privileged sessions on target systems of an enterprise. In an embodiment, the privileged account manager is configured to capture metadata related to a privileged session and generate a first activity pattern for the privileged session based on the captured metadata. The first activity pattern may include a sequence of one or more activities performed by a first user during the privileged session. The privileged account manager may be configured to identify a second activity pattern that comprises at least a subset of the one or more activities performed by the first user during the privileged session and determine an appropriate action to be performed for the first activity pattern based on the identification of the second activity pattern. In some embodiments, the privileged account manager may be configured to transmit the action to a second user on a client device.
    Type: Grant
    Filed: September 23, 2015
    Date of Patent: January 7, 2020
    Assignee: Oracle International Corporation
    Inventors: Kuang-Yu Shih, Himanshu Sharma, Fannie Ho, Zhuoxing Mao, Sudhir Kumar Srinivasan
  • Patent number: 10523540
    Abstract: Provided is a process, including: obtaining a plurality of network-traffic pattern specifications; obtaining network traffic data captured as the network traffic data is leaving from, arriving to, or looping back at a network interface of a computing device; comparing the plurality of network-traffic pattern specifications to the network traffic data; detecting based on the comparing, a match between at least a portion of the network traffic data and a matching network-traffic pattern specification among the plurality of network-traffic pattern specifications; and causing adding or adjusting one or more instances of one or more monitoring agents monitoring the instance of a service based on the detected match and the respective monitoring agent or monitoring agent configuration setting associated with the matching network-traffic pattern specification.
    Type: Grant
    Filed: March 29, 2017
    Date of Patent: December 31, 2019
    Assignee: CA, Inc.
    Inventors: Prabodh Joshi, Ryan Clemens, Jester Goldman, Scott Strobel
  • Patent number: 10521566
    Abstract: One aspect of the present invention discloses a client device for content security. The device includes: an application execution unit configured to control content in response to a content control command requested in a user level; a DRM agent configured to communicate with a DRM server and the application execution unit in the user level, to detect the content control command, to receive an encryption/decryption key and security policy for content from the DRM server, to provide the received encryption/decryption key and security policy to a client kernel module, and to transmit an encryption/decryption request; and the client kernel module configured to receive the encryption/decryption key and the security policy, to store the encryption/decryption key and security policy in a secure box of a kernel level, and to perform encryption or decryption on the content based on the encryption/decryption key and security policy in response to the encryption/decryption request.
    Type: Grant
    Filed: May 11, 2017
    Date of Patent: December 31, 2019
    Assignee: MARKANY INC.
    Inventors: Jonguk Choi, Yongjin Lee
  • Patent number: 10512843
    Abstract: Systems and methods for using re-playable in-game operations to reach particular user game states in an online gaming platform are disclosed. Exemplary implementations may: manage user inventories for users of the online gaming platform; receive a request, from the first user, for activation of the replay asset by the first user; and execute the set of in-game operations automatically such that a first current user game state for the first user is advanced to a first subsequent user game state for the first user within the online gaming platform, responsive to the activation of the replay asset as requested by the first user.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: December 24, 2019
    Assignee: Mythical, Inc.
    Inventors: Stephan Cunningham, Cameron Thacker, John Linden
  • Patent number: 10513243
    Abstract: An electronic control unit configured to permit a vehicle to travel in an automated driving mode. The electronic control unit is configured to detect unauthorized access from an outside to an in-vehicle Local Area Network during the automated driving mode. The electronic control unit is configured to perform control to fix a gear position of an automatic transmission when the electronic control unit determines that unauthorized access from the outside occurs during the automated driving mode.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: December 24, 2019
    Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHA
    Inventor: Kenta Kumazaki
  • Patent number: 10496846
    Abstract: Computer-readable mediums, according to various embodiments, store computer-executable instructions for: (1) scanning computer code to determine what types of personal information the computer code collects or analyzes; (2) prompting a first one or more individuals for information regarding this aspect of the computer code (e.g., why the computer code is collecting the personal information); (3) communicating this information to a second set of one or more individuals; (4) receiving, from the second set of individuals, a recommended revision to the computer code that would facilitate the compliance of the computer code with one or more privacy standards; (5) facilitating the implementation of the revision; and (6) after the revision has been completed, generating an updated privacy assessment for the computer code that reflects the fact that the one or more revisions have been completed; and (7) generating a report listing the one or more revisions that have been completed.
    Type: Grant
    Filed: July 15, 2019
    Date of Patent: December 3, 2019
    Assignee: OneTrust, LLC
    Inventor: Kabir A. Barday
  • Patent number: 10498880
    Abstract: A mobile communication device executes a plurality of applications. Each application of the plurality of applications is configured to be activated via a respective application identification number. The mobile communication device comprises: a subscriber identity module, which is assigned a personal identification number; a user interface for receiving a user input of the personal identification number of the subscriber identity module; and a processor, configured to automatically activate at least one application of the plurality of applications via the at least one respective application identification number assigned to the at least one application in response to the user input of the personal identification number.
    Type: Grant
    Filed: July 28, 2017
    Date of Patent: December 3, 2019
    Assignee: DEUTSCHE TELEKOM AG
    Inventor: Thomas Sonntag
  • Patent number: 10476733
    Abstract: Even if a user ID of a target user is not stored in a cooperation destination Web site, it is possible to access the cooperation destination Web site by use of a user ID of a cooperation source Web site. According to a typical embodiment, a cooperation source application calls up a log-in API of a cooperation destination Web server, based on information including the user ID. The log-in API records the information including the user ID as redirect information, creates a redirect token, and adds the redirect token to a URL of a guide application to send the URL. Based on the sent URL, the cooperation source application redirects access to the guide application. When the redirect information identified by the redirect token included in the URL is recorded, the guide application creates a log-in cookie based on the user ID included in the redirect information, and redirects the access to a cooperation destination application.
    Type: Grant
    Filed: April 15, 2015
    Date of Patent: November 12, 2019
    Assignee: HITACHI SYSTEMS, LTD.
    Inventor: Mineyuki Tamura
  • Patent number: 10459936
    Abstract: An information search method and apparatus includes receiving search information entered by a user, acquiring, according to the search information, at least one search element and at least one piece of key information associated with each search element, sending the at least one piece of key information associated with each search element, to at least one search application corresponding to the search element such that the at least one search application performs a search according to the at least one piece of key information associated with the search element, and receiving search results returned by the at least one search application, and outputting the search results.
    Type: Grant
    Filed: January 4, 2015
    Date of Patent: October 29, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Zhe Xu, Huangwei Wu
  • Patent number: 10460128
    Abstract: In an example embodiment, an attribute interference model is trained by a machine learning algorithm to output missing attribute values from a member profile of a social networking service. In an attribute inference phase, an identification of a member of a social networking service is obtained. A member profile corresponding to the member of the social networking service is retrieved using the identification. The member profile is then passed to the attribute inference model to generate one or more missing attribute values for the member profile. A collection flow, defined in a user interface of a computing device, is modified based on the generated one or more missing attribute values, the collection flow defining a sequence of screens for collecting confidential data. The modified collection flow is then presented to the member in the user interface to collect confidential data from the member.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: October 29, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Krishnaram Kenthapadi, Stephanie Chou, Ahsan Chudhary, Ryan Wade Sandler
  • Patent number: 10460092
    Abstract: Disclosed are a fingerprint identification system and a fingerprint identification method and a display device capable of simplifying operations of starting an application by a user. The fingerprint identification system includes: a fingerprint identification region arranged on a touch screen to acquire an input fingerprint; a fingerprint verification module connected with the fingerprint identification region to verify whether the input fingerprint is a fingerprint of a user and to unlock the touch screen if it is determined that the input fingerprint is the fingerprint of the user; an application start control module connected with the fingerprint identification region and the fingerprint verification module respectively to obtain a finger press direction from the input fingerprint and start an application corresponding to the finger press direction when the input fingerprint is the fingerprint of the user.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: October 29, 2019
    Assignee: BOE TECHNOLOGY GROUP CO., LTD.
    Inventor: Defeng Mao
  • Patent number: 10454941
    Abstract: A system for configuring and executing a secure communication network for authorizing access to safeguarded resources is provided. In particular, the system uses person-to-person (P2P) authentication technology to securely transmit resources between users. In this way, an efficient way to for users to manage resources is provided.
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: October 22, 2019
    Assignee: Bank of America Corporation
    Inventors: Katherine Dintenfass, Elizabeth S. Votaw, Cameron Darnell Wadley