By Authorizing Client Patents (Class 726/29)
  • Patent number: 10817277
    Abstract: An update providing apparatus of a vehicle is provided. The apparatus includes a communication circuit that communicates wirelessly with a server, a battery, and a control circuit. The control circuit is electrically connected to the communication circuit and the battery and obtains update data associated with a target controller mounted within the vehicle, from the server. Accordingly, the control circuit calculates an estimated remaining amount upon completing an update, based on an estimated required time of the update, an estimated required time of a roll-back, and a current remaining amount of the battery and performs the update on the target controller, when the estimated remaining amount satisfies a particular condition.
    Type: Grant
    Filed: December 2, 2018
    Date of Patent: October 27, 2020
    Assignees: Hyundai Motor Company, Kia Motors Corporation
    Inventors: Heok Sang Jeong, Jae Am Seo, Myeong Gyu Jeong, Hee Jun Lee, Dong Youl Lee, Dong Jin Shin
  • Patent number: 10802927
    Abstract: System and method for checking and characterizing metadata of snapshots utilize a snapshot metadata database to execute at least one of checking and characterizing operations on the metadata of snapshots. The snapshot metadata database includes information extracted from backing storage elements containing the metadata of snapshots.
    Type: Grant
    Filed: November 17, 2016
    Date of Patent: October 13, 2020
    Assignee: VMware, Inc.
    Inventors: Cheng Li, Li Ding, Bret Needle, Mayank Rawat
  • Patent number: 10798294
    Abstract: Remotely controlling access to a digital camera. In some embodiments, a method may include defining at least one parameter associated with a capture of media by a camera coupled to a monitored computer device, determining that the camera is capturing media, determining that the at least one parameter is present in the captured media; determining that the presence of the at least one parameter is not approved, and sending an instruction to the monitored computer device to disable use of the camera coupled to the monitored computer device for a pre-determined period of time based on determining that the presence of the at least one parameter is not approved.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: October 6, 2020
    Assignee: NORTONLIFELOCK INC.
    Inventor: Santhanakrishnan K C
  • Patent number: 10795975
    Abstract: A node, of a network of nodes with access to a distributed ledger, receives a request to verify the user has consented to a current version of terms (i.e., current terms) associated with a program. The node obtains, using the distributed ledger, historical consent data indicating a version of the terms to which the user has previously provided consent. The node performs a first verification procedure to determine the user has not consented to the current terms, provides an indication to a user device that the user has not consented to the current terms, and receives, from the user device, a message indicating an acceptance of the current terms. The node performs additional verification procedures to determine that the user is who consented to the current terms and updates the distributed ledger to include a record indicating that the user consented to the current terms.
    Type: Grant
    Filed: June 14, 2019
    Date of Patent: October 6, 2020
    Assignee: Capital One Services, LLC
    Inventors: Adam Vukich, Abdelkadar M'Hamed Benkreira, Mykhaylo Bulgakov, Joshua Edwards, William Carroll
  • Patent number: 10778839
    Abstract: A method for detecting and preventing phishing phone calls through verified attribute analysis is described. The method may comprise receiving, by a receiving device, a phone call from a sending device and receiving identification data in parallel with the phone call, the identification data describing context of the phone call. The method may then identify an attribute assertion from the identification data. The attribute assertion may comprise a signed attribute of the phone call and may be signed by a trusted authority. The method may comprise determining content of the phone call, analyzing the content of the phone call against the signed attribute, and performing a defined operation based on a result of the analysis of the content against the signed attribute.
    Type: Grant
    Filed: March 30, 2018
    Date of Patent: September 15, 2020
    Assignee: NORTONLIFELOCK, INC.
    Inventors: Keith Newstadt, Ilya Sokolov, Venkadesan Marimuthu
  • Patent number: 10771252
    Abstract: This disclosure describes techniques for securely, efficiently, and/or effectively providing cryptographic operations and key management services. Systems in accordance with one or more aspects of the present disclosure may provide secure management of cryptographic keys as service to a plurality of data center users or customers that contract for services provided by a data center. In one example, this disclosure describes a data center comprising a plurality of cloud service provider ports, a plurality of customer ports, network infrastructure coupling the plurality of cloud service provider ports to the plurality of customer ports, and a computing system including at least one hardware security module.
    Type: Grant
    Filed: June 12, 2018
    Date of Patent: September 8, 2020
    Assignee: Equinix, Inc.
    Inventors: Juxiang Teng, Muhammad Durrani, Imam Sheikh, Lance Weaver, Brian J. Lillie
  • Patent number: 10771468
    Abstract: Approaches provide for mandatory access controls and account identification masking controls in an electronic environment. For example, a customer can configure a client device to access an API gateway which acts as a proxy for a resource in a resource provider environment. Requests for resources or services can be redirected to the API gateway. A registered function may be triggered when the request is received and may filter the request. After filtering, the request can be forwarded on to the actual API endpoint to access the requested resource. From the client's perspective, the resource is being accessed directly, and from the resource's perspective, it is being accessed by the proxy. This layer of indirection enables data to be protected preemptively, rather than waiting for an undesirable condition to exist and then reactively attending to the issue.
    Type: Grant
    Filed: December 19, 2016
    Date of Patent: September 8, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: David Walker, Bertram Dorn
  • Patent number: 10754930
    Abstract: A method is performed at a client device distinct from an application server. In the method, a first key is stored in a secure store of the client device. A wrapped second key is received from the application server. The first key is retrieved from the secure store and used to unwrap the second key. Encrypted media content and a media control command to control playback of the media content is received from the application server. The content is decrypted using the unwrapped second key, and decoded for playback. During playback of the media content, a play position of the decrypted media content is transmitted to the application server and the decrypted media content is transmitted to a display device that is coupled to the client device. The decrypted media content is displayed in accordance with the received media control command.
    Type: Grant
    Filed: April 22, 2019
    Date of Patent: August 25, 2020
    Assignee: ACTIVEVIDEO NETWORKS, INC.
    Inventors: Ronald Brockmann, Gerrit Hiddink
  • Patent number: 10747871
    Abstract: A system for producing secure data management software, comprising at least one hardware processor adapted to: receive a plurality of data patterns, each comprising at least one data field identifier selected from a set of protected data field identifiers of at least one data repository, at least one output target, and an access instruction; identify in a plurality of computer instructions of the data management software one or more forbidden output instructions by matching one or more reaching definitions of some of the plurality of computer instructions with one or more of the plurality of data patterns; and remove the one or more forbidden output instructions from the plurality of computer instructions.
    Type: Grant
    Filed: June 21, 2018
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Aharon Abadi, Moria Abadi, Roie Melamed, Aidan Shribman
  • Patent number: 10740183
    Abstract: A computer-implemented method enables reconstructing contents of blocks in a storage system having l availability zones (AZs), a set of n storage units in each AZ arranged as columns, and a set of m storage blocks in each storage unit. The storage blocks of n+1 of the storage units are parity blocks, where l?1 of the AZs each include an additional parity block. The method includes using the parity blocks and/or data in the AZs and reconstructing contents of blocks in the storage system having l availability zones (AZs) from a concurrent loss of: one of the AZs, a storage unit together with one storage block in one of the remaining l?1 AZs, and one further storage block in each of the remaining l?2 AZs of the storage system.
    Type: Grant
    Filed: April 1, 2019
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Mario Blaum, Steven R. Hetzler
  • Patent number: 10742640
    Abstract: In an implementation of identifying related computing devices for automatic user account login, a login request to a user account that includes a unique identification (ID) of a user computing device and an internet protocol (IP) address of the user computing device are received. One or more user computing devices that have logged in to the user account using a same IP address as the user computing device are identified based on a user ID of the user account and the unique ID of the user computing device. Whether one or more unique IDs corresponding to the one or more user computing devices that have logged in to the user account are correlated with the unique ID of the user computing device is determined. If yes, data corresponding to login information used by the one or more user computing devices to log in to the user account to the user computing device for automatic account login are sent.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: August 11, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Tengfei Fang
  • Patent number: 10698738
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a blockchain-based workflow. One of the methods includes receiving a workflow specification that indicates one or more state transition methods to be performed by a smart contract on a blockchain network and one or more client service methods to be performed by one or more client devices off the blockchain network participating in a workflow. The smart contract is generated according to the workflow specification and includes the one or more state transition methods. A configurable client service logic is generated according to the workflow specification for each of the one or more client devices and includes the one or more client service methods. The smart contract is deployed to the blockchain network.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: June 30, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Shanlu Sun, Shubo Li
  • Patent number: 10691817
    Abstract: Provided is a process of securing data in a distributed storage and processing application, the process including: obtaining a cluster of computing nodes, wherein: the cluster stores a plurality of ciphertexts; accessing a transformation key with a first computing node; transforming the ciphertext with the first computing node based on the transformation key into a transformed ciphertext configured to be decrypted with a temporary access key; decrypting the transformed ciphertext with the second computing node based on the temporary access key to obtain plaintext data.
    Type: Grant
    Filed: May 6, 2017
    Date of Patent: June 23, 2020
    Assignee: ZeroDB, Inc.
    Inventors: Mikhail Egorov, MacLane Scott Wilkison, David Nu{grave over (n)}ez, Isaac Agudo
  • Patent number: 10673839
    Abstract: Networks and methods for use in authenticating messages are provided. One exemplary method generally includes receiving a message from a client, where the message includes a client certificate. The method also includes validating, by an application programming interface (API) gateway, a computing device based on a certificate identifying the computing device as a recognized computing device, and validating, by the API gateway, the client based on the client certificate via a global access manager, separate from the repository. The method further includes causing a security token indicative of the client to be generated, when the computing device and the client are validated, whereby the security token is indicative of the client and permits the message, from the client, to be delivered to one or more backend services.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: June 2, 2020
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventors: Jenny Qian Zhang, Justus Albert Srigiri, Brian Christopher Loeffler, Ankur Panthi, Ronald Marc Phillips
  • Patent number: 10674039
    Abstract: An information processing device that performs an authentication to authenticate a user and controls operations of an image processing device based on a result of the authentication, comprising: an application that accesses the image processing device and performs a process to enable the image processing device to operate; and an authentication server that performs the authentication to authenticate the user and sends application information relating to the application to the image processing device when successfully authenticating the user through the authentication. The application generates an access request including information relating to the application and sends the generated access request to the image processing device when accessing the image processing device in response to an instruction given by the authenticated user who is successfully authenticated through the authentication.
    Type: Grant
    Filed: February 8, 2017
    Date of Patent: June 2, 2020
    Assignee: KONICA MINOLTA, INC.
    Inventor: Takahiro Kano
  • Patent number: 10673904
    Abstract: A computer identifies one or more privacy settings. The computer receives a query for information. The computer determines whether a response to the query satisfies the one or more privacy settings. If the computer determines that the response to the query does not satisfy the one or more privacy settings, the computer alters the response to satisfy the one or more privacy settings.
    Type: Grant
    Filed: November 4, 2015
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: Yuk L. Chan, Heidi Lagares-Greenblatt, Deppti M. Naphade
  • Patent number: 10628203
    Abstract: Systems and methods for facilitating hibernation mode transitions for virtual machines. An example method comprises: disabling modifications of a hardware configuration parameter of a virtual machine running in a hibernation state on a host computer system; and responsive to determining the hardware configuration parameter of the virtual machine has been modified, causing the virtual machine to discard, upon awakening, a previously saved memory state.
    Type: Grant
    Filed: February 5, 2018
    Date of Patent: April 21, 2020
    Assignee: Parallels International GmbH
    Inventors: Yuri Ovchinnikov, Nikolay Dobrovolskiy, Serguei Beloussov
  • Patent number: 10631017
    Abstract: A network media system forms a group comprising a first networked device and a second networked device using a first media playback protocol. The network media system includes the first networked device and the second networked device. The network media system determines a group coordinator for the group using the first media playback protocol. The network media system transmits, to a media source device, a group network identity using a second media playback protocol. The media source device and one of the first networked device and the second networked device are configured to use the first media playback protocol and the second media playback protocol. The first media playback protocol and the second media playback protocol are incompatible.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: April 21, 2020
    Assignee: Sonos, Inc.
    Inventors: Arthur L. Coburn, IV, Jeffrey Torgerson, Robert A. Lambourne
  • Patent number: 10616249
    Abstract: In an example, there is disclosed an apparatus, including: a network interface to communicatively couple to an internet of thing (IoT) having at least one edge device; a gateway engine to provide gateway services to one or more edge devices via the network interface; and one or more logic devices, including at least one hardware logic device, providing an adaptive security engine to: compile a periodic device interaction summary (DIS) for the edge device; send the DIS to a cloud service; receive from the cloud service a DIS signature for the edge device; determine that one or more interactions from the edge device are suspicious; and act on the determining.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: April 7, 2020
    Assignee: Intel Corporation
    Inventors: Subramanian C, Balachandar Santhanam
  • Patent number: 10609031
    Abstract: Mechanisms are provided for providing a private consolidated cloud service architecture. The mechanisms operate to implement a private consolidated cloud service (PCCS) engine. The PCCS engine generates a private consolidated cloud (PCC) for a consumer based on one or more PCC characteristics specified by a request from the consumer. The PCCS engine also generates, in the PCC, for each of a plurality of public cloud services, a private instance of the public cloud service in the PCC. The PCC receives, from a consumer device, a request for processing of consumer private data by a specified private instance of a public cloud service in the PCC. The private instance of the public cloud service in the PCC performs the requested processing of consumer private data within the PCC without exposing the consumer private data outside the PCC. The PCC provides results of the requested processing to one of the consumer device or the public cloud service.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: March 31, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Bender, Rhonda L. Childress, David B. Kumhyr, Joanna W. Ng
  • Patent number: 10594833
    Abstract: Systems and methods are provided for implementing reciprocal data sharing in a data exchange system. Limitations may be placed on the amount of data an exchange member may access based on the amount of data that exchange member has contributed. The system may include determining a data contribution associated with a first member of the data exchange, determining a data access limit for the first member based on the data contribution, and providing data to the first member when the first member has not exceeded the data access limit. In some embodiments, there may be separate data access limits for each member of the data exchange, so that a first member may have different access limits when accessing data from a second member, data from a third member, and data from a fourth member. Further, the system may limit a requester to a type of data that corresponds to the type of data contributed.
    Type: Grant
    Filed: March 12, 2018
    Date of Patent: March 17, 2020
    Assignee: Early Warning Services, LLC
    Inventors: Michael Cook, Gregor R. Bonin, Aaron Antonio Rodriguez
  • Patent number: 10552404
    Abstract: One embodiment provides a method for retrospective snapshot creation including creating, by a processor, a first snapshot that captures logical state of a data store at a first key. Creation of the first snapshot is based on determining a log offset corresponding to the first key, determining existence of a second snapshot that captures logical state of the data store and recording a retrospective snapshot at a last valid log address offset prior to the first key upon a determination that the second snapshot exists based on determining at least one of: whether log address offsets from a first log entry of a log to a log entry of the log at the first key are contiguous and whether log address offsets from the second snapshot to the first key are contiguous.
    Type: Grant
    Filed: September 29, 2016
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Lawrence Y. Chiu, Aayush Gupta, Paul H. Muench, Sangeetha Seshadri
  • Patent number: 10545783
    Abstract: A data processing system with technology to secure a virtual machine control data structure (VMCDS) comprises random access memory (RAM) and a processor in communication with the RAM. The processor comprises virtualization technology that enables the processor to run a virtual machine monitor (VMM) in the data processing system and to run guest software in a virtual machine (VM) that is managed by the VMM. The VM is based at least in part on a VMCDS for the VM. An instruction decoder in the processor recognizes and dispatches a set-mask instruction. The set-mask instruction specifies access restrictions to be imposed on the VMM with respect to the VMCDS of the VM. The processor also comprises a mask enforcer to automatically enforce the access restrictions specified by the set-mask instruction, in response to an attempt by the VMM to access the VMCDS of the VM. Other embodiments are described and claimed.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: January 28, 2020
    Assignee: Intel Corporation
    Inventors: Prashant Dewan, Siddhartha Chhabra, Uttam Sengupta
  • Patent number: 10524003
    Abstract: Systems and methods for authorizing operations associated with blocked media assets using two-factor authentication. In some aspects, a media guidance application (e.g., executed by a set-top box or other user equipment used to store and display media assets) prompts a user for a password (e.g., a personal information number) in order to unlock the content for viewing. In response to receiving a second request from the user to perform an operation related to the media asset (e.g., delete), the media guidance application prompts the user for an additional factor confirming his or her identity, consistent with two-factor authentication protocol. If the user's identity is authenticated as a user that has authority to perform the operation related to the media asset (e.g., delete the stored media asset), the media guidance application performs the operation related to the media asset (e.g., deletes the media asset).
    Type: Grant
    Filed: November 14, 2016
    Date of Patent: December 31, 2019
    Assignee: Rovi Guides, Inc.
    Inventors: Harshith Kumar Gejjegondanahally Sreekanth, Ashwini Dharwa, Sourabh Kumar, Sukanya Agarwal
  • Patent number: 10510055
    Abstract: Facilitating exclusive access to a workflow of a service provider via a mobile wallet interface involves, within a client runtime environment, activating through the interface a service provider-specific application so that the service provider-specific application has exclusive access to a secure electronic transaction workflow of the service provider associated with at least one of the service provider-specific application and the wallet, while being denied access by the client runtime environment to any other service provider services or resources.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: December 17, 2019
    Assignee: MASTERCARD MOBILE TRANSACTIONS SOLUTIONS, INC.
    Inventors: Mehul Desai, Nehal Maniar
  • Patent number: 10491596
    Abstract: Examples described herein include systems and methods for controlling access to a server, such as an email server or a gateway, in situations where the identity of the requesting device is unknown or where the user device accesses the server using an unknown or unmanaged application. In one example, the system can utilize a user authentication credential included in the request to identify other devices belonging to the user that happen to be enrolled with the system. An out-of-band message can be sent to those enrolled devices, requesting confirmation from the user and, in conjunction with an authentication token, allowing the system to trust the previously unknown device. In the example of an unmanaged application attempting to access an email server, the system can confirm compliance of the requesting device and issue an authentication token that, along with an appropriate command sent to the email server, provides access.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: November 26, 2019
    Assignee: VMware, Inc.
    Inventors: Saravanan Pitchaimani, Vijay Pitchumani Kodaganallur, Craig Newell
  • Patent number: 10469186
    Abstract: A network node in a distributed network employs a surface immunoglobulin program to monitor other nodes in the distributed network and generate an alert upon detecting a suspicious activity; and pushes a free-antibody program to a requesting node petitioning to access the distributed network. The free-antibody program can include a software agent that monitors the requesting node. The free-antibody program reports detected malware and/or suspicious activity to the surface immunoglobulin program, which can enact countermeasures against the requesting node. The network node's role is based on a hierarchy of trustworthiness levels, wherein it performs at least one of monitoring other nodes, sending alerts when anomalous behavior is detected, transmitting the free-antibody software program to the requesting node, updating defensive programs, participating in consensus-based threat analysis with other nodes, identifying threats, tagging suspicious nodes, and performing countermeasures against identified threats.
    Type: Grant
    Filed: February 18, 2019
    Date of Patent: November 5, 2019
    Assignee: Department 13, Inc.
    Inventors: Steve J Shattil, Robi Sen
  • Patent number: 10448253
    Abstract: The present invention provides a communication method in a wireless communication network in which a first wireless terminal establishes a peer-to-peer wireless connection with a second wireless terminal. The first terminal determines whether or not the second wireless terminal is a universal terminal on the basis of information received from the second wireless terminal. The first wireless terminal controls access to a resource in the first wireless terminal by the second wireless terminal after a connection is established in accordance with the result of the determination.
    Type: Grant
    Filed: January 6, 2016
    Date of Patent: October 15, 2019
    Assignee: NEC CORPORATION
    Inventors: Masato Yasuda, Kazuaki Nakajima
  • Patent number: 10445784
    Abstract: Methods and apparatus for generating and delivering selected primary content and contextually-related, targeted secondary content to users of a network. In an exemplary embodiment, the network comprises a packet-switched data (e.g., IP) network such as the Internet, and the primary content comprises video or media clips that are user-selectable via a network site or web page. The primary content carries with it descriptive metadata that is accessed by a distribution server and forwarded to a secondary content source. The secondary content source (or its proxy) utilizes the metadata to identify and return contextually-related secondary content such as advertising links. This secondary content is then presented to the user in conjunction with the primary content, such as in a common display window and in a seamless fashion, thereby avoiding distractions to the user associated with generating ancillary windows or other display mechanisms, and providing the user with highly relevant secondary content choices.
    Type: Grant
    Filed: July 23, 2018
    Date of Patent: October 15, 2019
    Assignee: Time Warner Cable Enterprises LLC
    Inventor: Christopher Marsh
  • Patent number: 10423342
    Abstract: Scaling events may be detected for hosting hierarchical data structures. Scaling events may be detected to modify the capacity of a data store for hierarchical data structures to handle changing write workloads, read workloads, or storage capacity. Hierarchical data structures may be moved from one group of storage hosts to another group of storage hosts according to a filtered snapshot that includes the hierarchical data structures to be moved that is provided to the destination storage hosts. Changes made to the hierarchical data structures made at the source storage hosts during the move can be applied to the filtered snapshot so that the hierarchical data structures may be made available at the destination storage hosts inclusive of the changes.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: September 24, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Mahendra Manshi Chheda, Srikanth Mandadi, Alazel Acheson, Christopher Ryan Baker, Matthew William Berry, Jr.
  • Patent number: 10387441
    Abstract: Described herein are various technologies pertaining to identifying boundaries of a substring in a log file, wherein the substring is to be extracted from the log file and used to construct a table. An indication is received that a user has selected a beginning boundary of the substring, and the ending boundary of the substring is automatically identified.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: August 20, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Vu Minh Le, Sumit Gulwani
  • Patent number: 10379876
    Abstract: Disclosed is a method of customizing an appliance. The method includes steps of pre-storing a public key in the appliance; connecting the appliance to an external storage device; and booting up the appliance to automatically proceed with the following customization process: obtaining a customization file from the external storage device; authenticating the customization file with the public key; and executing customization with the customization file if the authentication succeeds.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: August 13, 2019
    Assignee: International Business Machines Corporation
    Inventors: Chih-Wen Chao, Gregory L. Galloway, Cheng-Ta Lee, Ming-Hsun Wu, Rick M. F. Wu
  • Patent number: 10346224
    Abstract: Systems herein allow an email application to manage passcode-based encryption (“PBE”) operations on an operating system (OS) that deletes a user passcode from memory. The email application can utilize a lock safe component that implements OS lifecycle classes. The lock safe component can receive an OS event, such as an activity, fragment, service, or SyncManager event. Before causing the email application to handle the OS event, the lock safe component can check whether the user passcode exists in memory. If it does not, the lock safe component can queue services for later operation once the passcode exists. Likewise, the lock safe component can cause the email application to prompt for the user passcode before a user interface (“UI”) performs activities or fragments, and pass state information to the email application for performing the activities or fragments.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: July 9, 2019
    Assignee: VMware, Inc.
    Inventors: Daniel Ochoa, Karishma Babu, Kris Wong
  • Patent number: 10303564
    Abstract: A distributed database system may implement reduced transaction I/O. In various embodiments, a plurality of log records may be stored in persistent storage for a plurality of pages of a log-structured storage system. A coalesce operation may be performed for at least some of the plurality of data pages for the log-structured storage system. The coalesce operation may, in some embodiments, coalesce two or more log records for one of the plurality of pages to generate an instance of the page and store the instance of the page to a new location in the persistent storage. Log records for one or more of the plurality of pages may be excluded from the coalesce operation. These excluded log records may not be dependent on a prior version of the page or portion of the page corresponding to the log record. Excluded log records may include one or more of redo records, undo records, or transaction table records.
    Type: Grant
    Filed: May 23, 2013
    Date of Patent: May 28, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Anurag Windlass Gupta, Samuel James McKelvie
  • Patent number: 10282428
    Abstract: The invention relates to a computer installation for the management of a set of files, comprising a network including a server and a workstation, said installation further comprising a graphical user interface that is adapted to: —display a virtual space (1) as well as a first icon that represents one of said files (A) of the set of files, said first icon being placed within said virtual space (1), —enable a user of said workstation to control, by interaction of the control peripheral with said first icon, the display of a first interactive tool enabling said user to record on said server the existence of a link between said first file and at least another one of said files of the set of files. Computer installation for the management of a set of files.
    Type: Grant
    Filed: September 5, 2012
    Date of Patent: May 7, 2019
    Assignee: ESPERAR
    Inventor: Bertrand Jean Szymkowiak
  • Patent number: 10262115
    Abstract: An embodiment of the invention provides a method including accessing a portal pursuant to instructions from a digital media device and identifying the digital media device to the portal to enable the portal to obtain a security code. Information having the security code is received; and, it is confirmed that the security code corresponds to a security key stored in the digital media device. The information is provided to a secure application environment in the digital media device if the security code corresponds to the security key. A copy of the security key is sent to a clearinghouse; and, the security code is received from the clearinghouse. The security code is sent to a provider of the information if the information satisfies a predetermined criteria.
    Type: Grant
    Filed: September 20, 2017
    Date of Patent: April 16, 2019
    Assignee: International Business Machines Corporation
    Inventors: Stephen S. Burnett, Martin G Kienzle, Paul J. Ledak
  • Patent number: 10212166
    Abstract: The present invention discloses a file downloading method, a server, a download access node, and a distributed storage system, which pertains to the field of communications technologies, and is designed to resolve a problem in the prior art that load on the server increases, and an authentication speed and a response speed for downloading a file are reduced. The file downloading method includes: acquiring, by a server, download permission that is set, and generating an access control list parameter of the download permission; and releasing, by the server, a download link that includes the access control list parameter, so that a terminal acquires the download link and generates a download request that includes the access control list parameter.
    Type: Grant
    Filed: March 24, 2014
    Date of Patent: February 19, 2019
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Qingdong Xie, Kaifu Xu, Xiaoming Li
  • Patent number: 10169551
    Abstract: A method is provided that includes receiving a command for reading out content from a non-transitory recording medium, and identifying first version information indicating a version of a content copyright protection method. The method includes identifying second version information indicating a version of a protocol used in authentication of the host apparatus, and determining whether the authentication is to be approved or not. The method also includes authenticating the host apparatus according to a result of the determination, reading out medium-specific information, and sending the medium-specific information to the authenticated host apparatus. The method further includes reading out the encrypted content and sending the encrypted content to the authenticated host apparatus, wherein the first version information is identified based on disk information that is meta data stored at a beginning of the recording medium formed in a disk shape in the identifying first version information.
    Type: Grant
    Filed: March 1, 2018
    Date of Patent: January 1, 2019
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Masaya Yamamoto, Kaoru Murase
  • Patent number: 10110697
    Abstract: The environment within which IoT devices are operating is determining based on sets of fingerprints collected from the IoT devices. The set of fingerprints for each respective IoT device contains at least one fingerprint corresponding to a sensed IoT device in communication with the respective IoT device. A similarity score is generated for pairs of IoT devices by comparing their respective sets of fingerprints to identify matching fingerprints. The IoT devices are grouped into a common environment based on the similarity scores. In some embodiments, content is provided over one or more communications networks to a user associated with an IoT device based on the IoT device being grouped into the common environment with one or more other IoT devices.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: October 23, 2018
    Assignee: Adobe Systems Incorporated
    Inventor: Peter Fransen
  • Patent number: 10074085
    Abstract: The present invention relates to a token device for securely executing a data transaction. The token device comprises: a secure element; a web server module configured within the secure element and arranged to transmit data messages over a network; a terminal application module configured within the web server module; and an application module configured within the secure element. The terminal application module and the application module are arranged to execute the data transaction protocol as one or more data exchanges therebetween within the secure element, upon receipt of a service request data message, received over the network at the web server module from an authorized remotely located Point of Sale (POS) terminal. The web server module is subsequently arranged to generate a transaction response data message for transmission to the remotely located POS terminal, on successful completion of the transaction protocol.
    Type: Grant
    Filed: October 10, 2014
    Date of Patent: September 11, 2018
    Assignee: Mastercard International Incorporated
    Inventors: Cristian Radu, David A. Roberts
  • Patent number: 10032436
    Abstract: Provided is an image displaying method of a display device. In the image displaying method, a menu screen is displayed, an image output mode is set on the menu screen, code information corresponding to the set image output mode is transmitted to a computer main body, an image corresponding to the set image output mode is received from the computer main body, and the received image is displayed.
    Type: Grant
    Filed: September 5, 2012
    Date of Patent: July 24, 2018
    Assignee: LG ELECTRONICS INC.
    Inventor: Junghyun Lee
  • Patent number: 10020942
    Abstract: In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to a data storage service. The data storage service generates a token that is representative of the sensitive data and stores the sensitive data as secure data. The data storage service may deliver the token to an entity that also receives the nonsensitive data, and the entity may use the token in place of the sensitive data. In some implementations, different tokens are generated each time the same piece of sensitive data is submitted for storage as secure data. Further, in some implementations, An expiration time may be assigned to sensitive data, and expired data and associated tokens may be deleted.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: July 10, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Jonathan Kozolchyk, Darren E. Canavor, Jeffrey J. Fielding, Vaibhav Mallya, Darin Keith McAdams
  • Patent number: 10013535
    Abstract: A program controller is arranged to automatically authorize or configure or upgrade a program for a customer replaceable card of a system, the controller being arranged to manage the program automatically, according to a licence agreement, and according to a stored history of use of the hardware module. A supplier can track customer changes and enforce more easily different conditions for authorizing the program on, different modules from different sources, having different levels of capability. There can be less interaction with the supplier to get specific authorizations. The history can be stored on the module. It can be used to ease inventory tracking and generate billing information.
    Type: Grant
    Filed: November 21, 2003
    Date of Patent: July 3, 2018
    Assignee: Ciena Corporation
    Inventors: Andrew James Thomas, Mark Skrebels, Stewart Irvine
  • Patent number: 10007941
    Abstract: A device is provided to receive, from a first device, a request for a product or service, determine a first geographic location of the first device, and identify a second device that is located in a geographic region associated with the first geographic location. The second device may be associated with a user that is capable of providing the product or service. The device may provide, to the first device, information regarding a second geographic location of the second device. The information may specify an obfuscated second geographic location without revealing the second geographic location. The device may also receive, from the first device, an instruction to provide the request to the second device, provide the request to the second device, receive an acceptance of the request from the second device, and provide, to the second device, data indicating the first geographic location of the first device.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: June 26, 2018
    Assignee: Capital One Services, LLC
    Inventors: Zhe Liu, Jeremy Phillips, Hannah Volfson
  • Patent number: 9998907
    Abstract: A system and method for identifying mobile users in a site includes: receiving, in real time, data packets from wireless access points; identifying unique device identifications from the received data packets, and time stamping each identified unique device identification; determining repetitive or false unique device identifications in the identified unique device identification; and eliminating the repetitive or false unique device identifications in the identified unique device identification to obtain a plurality of accurate unique device identifications.
    Type: Grant
    Filed: July 24, 2017
    Date of Patent: June 12, 2018
    Assignee: KIANA ANALYTICS INC.
    Inventors: Glenn R. Seidman, Nader Fathi, Klaus ten Hagen, Sebastian Andreatta
  • Patent number: 9979701
    Abstract: Disclosed is a content management system comprising: a server; a content database, configured within the server, within which are stored one or more channels, each channel comprising one or more stories, each story comprising a title and one or more files; and one or more user devices connected to the network, each user device being associated with a user, each user device being configured to allow the associated user to view one or more stories from a channel to which the associated user has viewing rights. The title of each story and the names of the files contained in the story are stored obfuscated in the content database, and the files are stored encrypted in the content database.
    Type: Grant
    Filed: November 1, 2012
    Date of Patent: May 22, 2018
    Assignee: BigTinCan Holdings Limited
    Inventor: David Malcolm Keane
  • Patent number: 9967139
    Abstract: Various examples of the present technology provide a method for remotely controlling zone management of a storage system that comprises generating and initializing a network service for a remote device and a new thread for handing commands from the remote device, determining, for each port of a plurality of ports associated with storage devices of a storage system, a corresponding zone group based at least upon zone IDs of the plurality of ports, setting a zoning configuration parameter corresponding to each group of the plurality of zoning groups using a serial protocol (e.g., SAS management protocol (SMP)), and configuring a zone and port mapping table and a zone permission table based at least upon the zoning configuration parameter.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: May 8, 2018
    Assignee: QUANTA COMPUTER INC.
    Inventors: Yang-Li Chiu, Tsu-Tai Kung
  • Patent number: 9959236
    Abstract: Methods and apparatus relating to observing an internal link via an existing port for System On Chip (SOC) devices are described. In one embodiment, a logic within an SOC device may allow an external logic analyzer to observe communication between a first and second component of the SOC through an existing (e.g., shared and/or non-dedicated) interface. Other embodiments are also disclosed.
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: May 1, 2018
    Assignee: Intel Corporation
    Inventor: Syed Z. Islam
  • Patent number: 9959396
    Abstract: System and methods for obtaining digital multimedia files from a server based on optically scanned digital rights management information tag imprinted on physical media is described. A greeting card or gift card can be provided with indicia containing a code printed thereon. Then the code can be optically scanned by client device. The code can then be provided by the client device to a remote server for retrieval of multimedia files identified by the code if the code authorizes multimedia file retrieval from the remote server by the client device. Then the client device retrieves multimedia files identified by the code from the remote server following authorization of multimedia file retrieval by the remote server based on the code.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: May 1, 2018
    Assignee: Ortiz and Associates Consulting, LLC
    Inventors: Sofia A. Ortiz, Sharon G. Ortiz, Luis M. Ortiz
  • Patent number: 9860220
    Abstract: A key distributor node for a network includes a memory device with at least one first key, at least one data communication device that can exchange data with first and second access nodes for a terminal integrated wirelessly into the network, at least one processor connected to the memory device and the data communication device, wherein functions are provided for the processor(s) that allow authentication of the terminal at the second access node in response to a key request received by the second access node, a derivation of a second key from the first key, and triggered transmission of the second key through the data communication device to the second access node. Connections to the network's first and second access nodes with security relationships can be provided for the key distributor node when using the first key.
    Type: Grant
    Filed: September 18, 2015
    Date of Patent: January 2, 2018
    Assignee: Unify GmbH & Co. KG
    Inventors: Thomas Gamer, Matthias Roth, Michael Bahr, Christian Schwingenschlogl