By Authorizing Data Patents (Class 726/30)
  • Patent number: 11120013
    Abstract: A digital asset is represented and verified as a set of related digital asset or other content objects. Related metadata is stored on an immutable distributed ledger separately from the content objects themselves. For example, a transaction object includes metadata such as identifiers for two or more content objects, fingerprints for the content objects. The content objects may be stored in a local or cloud object repository. Validation of a later identified content object may include determining a fingerprint for the later identified content object, mapping that fingerprint to an address within the immutable distributed ledger to retrieve metadata previously mapped, and comparing the two fingerprints. Visual validation may be provided when the first and second fingerprints match, such as by displaying a positive icon adjacent the later identified object.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: September 14, 2021
    Assignee: Attestiv Inc.
    Inventors: John W. Bates, Thomas Mark Morley, Emmanuel Parasirakis, Nicos Vekiarides
  • Patent number: 11120035
    Abstract: An information provision method includes accumulating, in a first database, a first identifier identifying each of one or more service providers, and first device information indicating an electrical device to be designated by each of the one or more service providers in association with each other; accumulating, in a second database, a second identifier identifying each of one or more users, and second device information indicating an electrical device to be used by the one or more users in association with each other; extracting a service provider associated with the first device information when the second device information is updated by addition of a new electrical device to be used by one of the one or more users, and when the new electrical device is included in the electrical devices indicated by the first device information.
    Type: Grant
    Filed: July 19, 2019
    Date of Patent: September 14, 2021
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Yuji Unagami, Natsume Matsuzaki
  • Patent number: 11095435
    Abstract: A keystroke dynamics anonymization technique that includes: receiving a plain-text password from a computer user; providing at least the plain-text password as a seed to a pseudorandom mapping function; applying the pseudorandom mapping function to keycodes that are produced by the computer responsive to keystrokes of the computer user, to map the keycodes to a set of mapped, anonymized keycodes; and providing the set of mapped, anonymized keycodes to a keystroke dynamics algorithm, to enable the keystroke dynamics algorithm to (a) learn a keystroke dynamics model of the computer user, and (b) authenticate an identity of the computer user.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: August 17, 2021
    Assignee: International Business Machines Corporation
    Inventors: Itay Hazan, Eitan Menahem
  • Patent number: 11088856
    Abstract: A memory storage system is provided according to an exemplary embodiment of the disclosure. The memory storage system includes a host system and a memory storage device. In a first handshake operation, the memory storage device transmits first encrypted information corresponding to first authentication information to the host system, and the host system transmits second encrypted information corresponding to the first authentication information to the memory storage device. In a second handshake operation, the memory storage device transmits third encrypted information corresponding to second authentication information to the host system, and the host system transmits fourth encrypted information corresponding to third authentication information to the memory storage device based on the third encrypted information. The third authentication information is configured to encrypt data transmitted between the host system and the memory storage device in a developer command transmission stage.
    Type: Grant
    Filed: March 19, 2018
    Date of Patent: August 10, 2021
    Assignee: PHISON ELECTRONICS CORP.
    Inventor: Liang-Wei Chen
  • Patent number: 11082405
    Abstract: A method, and associated system, for security processing of a request for a resource in a network security system. The request for the resource and a duplicate of request for the resource are forwarded to a first proxy server and a second proxy server, respectively. A first output including the received request, and a second output including the duplicate of the received request, are received from first proxy server and the second proxy server, respectively. A determination is made that the first output and the second output differ and in response, a first alarm is generated and transmission to the web server of the received request and the duplicate of the received request is blocked.
    Type: Grant
    Filed: January 9, 2020
    Date of Patent: August 3, 2021
    Assignee: International Business Machines Corporation
    Inventor: Ian Robertson
  • Patent number: 11080268
    Abstract: Techniques are disclosed for serializing assertion-triggering transactions by locking special purpose resources (i.e. other than rows or tables), which enables a high level of concurrency for these transactions while at the same time ensuring correctness of the SQL assertion validation code. The techniques involve creating objects referred to therein as “Assertion-Locking Memory-Objects” or “ALMOs”. The database server causes each assertion-triggering transaction to obtain locks on one or more ALMOs prior to determining whether the changes made by assertion-triggering transaction violates the assertion. Because locks on the ALMOs are finer than the table locks, fewer transactions are blocked by ALMO locks.
    Type: Grant
    Filed: January 14, 2019
    Date of Patent: August 3, 2021
    Assignee: Oracle International Corporation
    Inventor: Toon Koppelaars
  • Patent number: 11082424
    Abstract: Embodiments are directed to securing data using attribute-based encryption. In an embodiment, a computer system encrypts a portion of data with an attribute-based encryption, including associating the encrypted portion of data with one or more encryption attributes. The computer system sends the encrypted portion of data and the one or more encryption attributes to a data store, which stores the first portion of data along with the one or more encryption attributes. The computer system also defines one or more access controls for the portion of data that include an identity of at least one user permitted to access the portion of data. The attribute-based encryption allows the encrypted portion of data to be provided by the data store upon request by the identified user when the request includes one or more search attributes that are relevant to the one or more encryption attributes.
    Type: Grant
    Filed: August 30, 2019
    Date of Patent: August 3, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Roy Peter D'Souza, Omkant Pandey
  • Patent number: 11068580
    Abstract: In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a security layer that includes a whitelist of permitted processes on the controller, the whitelist including (i) signatures for processes that are authorized to be executed and (ii) context information identifying permitted controller contexts within which the processes are authorized to be executed; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the determined signature with a verified signature for the particular process from the whitelist; identifying, by the security layer, a current context for the controller; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the current context with one or more permitted controller contexts for the particular process from the whitelist.
    Type: Grant
    Filed: September 7, 2016
    Date of Patent: July 20, 2021
    Assignee: Karamba Security Ltd.
    Inventors: Tal Efraim Ben David, Assaf Harel, Amiram Dotan, David Barzilai
  • Patent number: 11055006
    Abstract: A method, system and program is described for providing virtual storage domains for content addressable system. At least one tenant data storage policy is configured for at least one tenant in a storage system. A virtual storage domain is created based on the tenant data storage policy, each virtual storage domain having a unique identifier (ID). The corresponding virtual storage domain ID is tagged to a data request based on a data set policy when data belonging to a data set gets written to the storage system. A hash signature is calculated for the data taking the data content and the storage domain ID as inputs to calculate the hash signature.
    Type: Grant
    Filed: October 30, 2017
    Date of Patent: July 6, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Xiangping Chen, Anton Kucherov, Junping Zhao, Kevin Xu
  • Patent number: 11048956
    Abstract: A system provides intelligent gallery management for biometrics. A first gallery is obtained that includes biometric and/or other information on a population of people. An application is identified. A subset of the population of people is identified based on the application. A second gallery is derived from the first gallery by pulling the information for the subset of the population of people without pulling the information for the population of people not in the subset. Biometric identification (such as facial recognition) for the application may then be performed using the second gallery rather than the first gallery. In this way, the system is improved as less time is required for biometric identification, fewer device resources are used, and so on.
    Type: Grant
    Filed: December 31, 2019
    Date of Patent: June 29, 2021
    Assignee: ALCLEAR, LLC
    Inventor: Kevin Lupowitz
  • Patent number: 11044077
    Abstract: Particular embodiments described herein provide for a system that can be configured to receive a notification that a client device is requesting, to modify original data associated with an online application, wherein the original data is stored in encrypted format in a cloud; decrypt the original data using a first client encryption key; store the decrypted data in a location accessible by the online application; enable editing capability of the decrypted data; receive a notification that the client device is finished modifying the data in decrypted format; determine whether the original data in decrypted format was modified; encrypt, based on a determination that the original data was modified, the modified data using a second client encryption key; and upload the modified data in encrypted format to the cloud.
    Type: Grant
    Filed: September 25, 2018
    Date of Patent: June 22, 2021
    Assignee: McAfee, LLC
    Inventor: Roy Douglas Hopkins
  • Patent number: 11030343
    Abstract: Sharing data in a data exchange across multiple cloud computing platforms and/or cloud computing platform regions is described. An example computer-implemented method can include receiving listing information to create a listing in a data exchange, wherein the listing information includes a data set identifier for a data set hosted by a first cloud computing entity and a set of cloud computing entities for the listing. The method may also further include creating, by a processing device, the listing in the data exchange, wherein the data set can be shared from the first cloud computing entity with the set of second cloud computing entities using at least a provider corresponding account of that second cloud computing entity.
    Type: Grant
    Filed: March 10, 2020
    Date of Patent: June 8, 2021
    Assignee: Snowflake Inc.
    Inventors: Pui Kei Johnston Chu, Benoit Dageville, Matthew Glickman, Christian Kleinerman, Prasanna Krishnan, Justin Langseth
  • Patent number: 11030302
    Abstract: Examples of the present disclosure describe systems and methods for restricting access to application programming interfaces (APIs). For example, when a process calls an API, the API call may be intercepted by a security system for evaluation of its trustfulness before the API is allowed to run. Upon intercepting an API call, the process calling the API may be evaluated to determine if the process is known to the security system, such that known processes that are untrusted may be blocked from calling the API. Further, when the security system cannot identify the process calling the API, the security service may evaluate a call stack associated with the call operation to determine if attributes of the call operation are known to the security system. If the call operation is known to the security system as untrusted, the call operation may be blocked from calling the API.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: June 8, 2021
    Assignee: Webroot Inc.
    Inventors: Andrew L. Sandoval, John R. Shaw, II
  • Patent number: 11027196
    Abstract: A system and method for detecting and managing electronic transactions and providing a domain specific collection of remotely callable functions in a video game environment.
    Type: Grant
    Filed: September 4, 2019
    Date of Patent: June 8, 2021
    Assignee: TAKE-TWO INTERACTIVE SOFTWARE, INC.
    Inventors: Kevin Baca, Chris Mueller
  • Patent number: 11023777
    Abstract: A method for training an obfuscation network capable of performing distinct concealing processes for distinct regions of an original image is provided. The method includes steps of: a learning device (a) inputting a training image into the obfuscation network to generate an obfuscated training image by performing a 1-st to an n-th concealing process respectively on a 1-st to an n-th training region of the training image; (b) inputting the obfuscated training image into a 1-st to an n-th discriminator to respectively generate a 1-st to an n-th obfuscated image score on determining whether the obfuscated training image is real or fake, and inputting the obfuscated training image into an image recognition network to apply learning operation on the obfuscated training image to generate feature information for training; and (c) training the obfuscation network such that an accumulated loss is maximized, and an accuracy loss is minimized.
    Type: Grant
    Filed: December 18, 2020
    Date of Patent: June 1, 2021
    Assignee: DEEPING SOURCE INC.
    Inventor: Bon Hun Koo
  • Patent number: 11017090
    Abstract: A method of certifying a state of a platform includes receiving one or more software elements of a software stack of the platform by an authentication module and performing a hash algorithm on the software stack to generate one or more hash values. The software stack uniquely determines a software state of the platform. The method includes generating creation data, a creation hash, and a creation ticket, corresponding to the hash values and sending the creation ticket to the platform. The method also includes receiving the creation ticket by the authentication module and certifying the creation data and the creation hash based on the creation ticket. The method further includes generating a certified structure based on the creation data and performing the hash algorithm on the certified structure to generate a hash of the certified structure. The certified structure uniquely determines the software state of the platform.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: May 25, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Ludovic Emmanuel Paul Noel Jacquin, Hamza Attak, Nigel Edwards
  • Patent number: 10997285
    Abstract: The loading of a privileged application can be selectively blocked. An application restrictor can be configured to register for notifications whenever an application image is loaded. Then, whenever the application restrictor receives a notification, the application restrictor can evaluate whether the application image that is being loaded is a privileged application. If so, the application restrictor can evaluate the current process's parent tree to determine if an untrusted application is present at any level of the parent tree. The application restrictor will then allow the privileged application to load only when all applications in the parent tree are trusted applications. In this way, untrusted applications can be blocked from accessing a privileged application without blocking trusted applications from accessing the privileged application.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: May 4, 2021
    Assignee: Dell Products L.P.
    Inventors: Gokul Thiruchengode Vajravel, Sandeep K S, Ramanujam Kaniyar Venkatesh, Harish Agrawal
  • Patent number: 10992657
    Abstract: A plurality of attributes associated with a user of an account making a request is determined based on the received request. One or more operations to grant the user access to the one or more resources of the second account are determined based on the attributes. Access is provided to one or more resources of the second account according to the one or more operations to fulfill the request.
    Type: Grant
    Filed: April 30, 2018
    Date of Patent: April 27, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Joshua Eugene Stevens, Bijendra Singh
  • Patent number: 10979529
    Abstract: This application relates to embodiments for providing a content stream to a device from a content server based on a protocol that is established between the device and an account server. The account server can initiate a session with the device and provide the device with a list of channels available for a user account associated with the device. When a channel is selected at the device, conditional access information can be provided from the account server to the device, which can thereafter relay the conditional access information to the content server. The content server can use the conditional access information to verify that the device has the appropriate permission to receive streaming content. In this way, because the conditional access information originates at the account server, permission to access streaming content can be managed by correspondence between the account server and the device, rather than the content server.
    Type: Grant
    Filed: August 13, 2019
    Date of Patent: April 13, 2021
    Assignee: Apple Inc.
    Inventors: Srinivas Vedula, Daniel P. Carter, Gianpaolo Fasoli, Augustin J. Farrugia, Eugene Jivotovski
  • Patent number: 10970532
    Abstract: The disclosed computer-implemented method for preventing sharing of sensitive content in image data on a closed computing platform may include (i) detecting initiation of a network connection for sending network traffic data to a data storage service on the closed computing platform, (ii) monitoring the sending of the network traffic data to identify a target traffic indicator associated with image data, (iii) interrupting the sending of the network traffic data upon identifying the target traffic indicator, (iv) analyzing the image data to identify sensitive content, and (v) performing a security action that protects against the sensitive content being shared to the data storage service on the closed computing platform. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 6, 2019
    Date of Patent: April 6, 2021
    Assignee: CA, Inc.
    Inventors: QuBo Song, Joseph Chen, Oksoon Jeong, Zhe Liu, Chris Houston
  • Patent number: 10958689
    Abstract: In an embodiment, another general aspect includes a method including, by a compliance bot deployed on a computer system including a system of bots, monitoring the system of bots for deployment activity. The method also includes, responsive to the monitoring, identifying activity indicative of deployment of a particular bot. The method also includes determining an automation type of the particular bot. The method also includes retrieving compliance rules corresponding to the automation type of the particular bot. The method also includes retrieving data from the particular bot. The method also includes automatically checking compliance of the particular bot with the compliance rules based on the retrieved data. The method also includes, responsive to a determination that the particular bot is noncompliant, automatically invalidating the particular bot.
    Type: Grant
    Filed: February 26, 2019
    Date of Patent: March 23, 2021
    Assignee: NTT DATA Services, LLC
    Inventors: Dhurai Ganesan, Aananthanarayanan Pandian, Sankar Chandrasekaran
  • Patent number: 10937506
    Abstract: Systems and methods of memory operation that provide a hardware-based reset of an unresponsive memory device are disclosed. In one embodiment, an exemplary system may comprise a semiconductor memory device having a memory array, a controller that may include a firmware component for controlling memory operations, and a reset circuit including power-up circuitry and timeout circuitry. The reset circuit may be configured to detect when the memory device is in a non-responsive state and reset the memory device without using any internal controller components potentially impacted/affected by the non-responsive state.
    Type: Grant
    Filed: August 16, 2019
    Date of Patent: March 2, 2021
    Assignee: Micron Technology, Inc.
    Inventors: Vipul Patel, Theodore Pekny
  • Patent number: 10915630
    Abstract: A method includes identifying an impersonating message, transmitted over a Controller Area Network (CAN) bus by an attacking node connected to the bus, that appears to originate from a source other than the attacking node. The method further includes, in response to identifying the impersonating message, driving the attacking node into an error-passive state in which an ability of the attacking node to communicate over the bus is limited, relative to before entering the error-passive state. The method further includes, subsequently to driving the attacking node into the error-passive state, driving the attacking node into a bus-off state in which the attacking node cannot communicate over the bus, by transmitting, over the bus, a plurality of passive-error-flag-trumping messages that collide with, and trump, respective instances of a passive-error flag that the attacking node transmits over the bus. Other embodiments are also described.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: February 9, 2021
    Assignee: RAMOT AT TEL-AVIV UNIVERSITY LTD.
    Inventors: Tsvika Dagan, Avishai Wool
  • Patent number: 10913353
    Abstract: An operation control method for a vehicle infotainment system for enabling phone projection to be automatically executed during a connection between a head unit of a vehicle and a smart device, and the method comprises: a phone projection setting step of allowing any one of a plurality of phone projections mounted on a head unit of a vehicle to be set; a step of connecting a first smart device to the head unit of a vehicle; a step of determining whether the first smart device connected to the head unit of a vehicle supports the phone projection set in the phone projection setting step; and a step of executing the set phone projection if the first smart device supports the set phone projection, according to the determination result.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: February 9, 2021
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Jin Kim, Heewon Lee
  • Patent number: 10878078
    Abstract: A system notification service control method, apparatus, a terminal device, and a storage medium are described. The system notification service control method may include detecting whether an application initiates a registration for a system notification reading permission; in response to detecting that the application initiates the registration for the system notification reading permission, determining whether the application meets a registration condition; and prohibiting the application from registering for the system notification reading permission when the application does not meet the registration condition.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: December 29, 2020
    Assignee: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventors: Zhiyong Lin, Bing Du
  • Patent number: 10878123
    Abstract: Examples associated with application approval are described. One example includes receiving an application package. The application package contains an application from a service provider and a privacy description for the application from a review provider. The application operates on private data controlled by a user. The application package is validated to ensure components of the application package is properly credentialed. An application summary for the user is generated from the privacy description. The application summary describes what portions of private data will be accessed by the application and how portions of the private data will be transmitted. An authorization is received from the user, and execution of the application is controlled based on the authorization of the user.
    Type: Grant
    Filed: April 10, 2016
    Date of Patent: December 29, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jonathan Griffin, Adrian J. Baldwin
  • Patent number: 10846019
    Abstract: A semiconductor device includes: a memory device; and a storage controller. The storage controller includes a flash controller performing data operations on the memory device, and a processor executing a real-time operating system (RTOS) for controlling the flash controller, wherein the RTOS receives expiration time information of data from a host and performs at least one of the data operations using a scheduler based on the expiration time information.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: November 24, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jung Hoon Kim, Young-Sik Lee, Kang Ho Roh
  • Patent number: 10831927
    Abstract: A first set of data associated with one or more data stores is received. A distance from a representation of a subset of the first set of data to at least a second representation of another set of data in vector space is identified. In response to the identifying of the distance, the first set of data is anonymized. The anonymizing includes adding noise to at least some of the first set of data.
    Type: Grant
    Filed: November 22, 2017
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Supriyo Chakraborty, Mudhakar Srivatsa
  • Patent number: 10819829
    Abstract: Embodiments provides a method for facilitating a client-server communication using cyclic tokens. The method includes receiving a request for token generation from a client device, generating a token in response to the request for token generation, and sending the token and a number of sub-tokens to be formed from the token to client device. The method includes establishing a cyclic token by token server for client device, where establishing includes generating a plurality of sub-tokens from the token based on the number of sub-tokens. Method further includes sending the plurality of sub-tokens of token to client device in an order defined by a sequence, and recording the plurality of sub-tokens in an order defined by the sequence as cyclic token. The method further includes facilitating validation of cyclic token upon receipt of sub-tokens in order of sequence as part of token validation request from an application server for client device.
    Type: Grant
    Filed: July 30, 2019
    Date of Patent: October 27, 2020
    Assignee: Mastercard International Incorporated
    Inventors: Girish Ramesh Khemani, Vickhram Sanap
  • Patent number: 10805350
    Abstract: In accordance with an embodiment, described herein is a system and method for providing security services using a security configuration template in a multi-tenant environment. The system can load a security configuration template in memory when the multi-tenant environment starts, and can use the security configuration template to create a multi-headed tree to represent tenant-specific security configurations. Each head of the multi-headed tree can represent a root node of either the security configuration template or a tenant-specific security configuration. Each tenant-specific security configuration can reuse one or more nodes in the security configuration template by referencing those nodes, and can include one or more new nodes created from the security configuration template by replacing each placeholder therein with tenant-specific values.
    Type: Grant
    Filed: February 15, 2018
    Date of Patent: October 13, 2020
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Rohit Koul, Vineet Garg, Dongguang Zhou, Amit Agarwal, Yu Long Cao
  • Patent number: 10795880
    Abstract: A system for communication between two or more computer programs is disclosed. The system includes a memory, an interface, and a processor. The memory stores a first file, expected metadata for the first file, and expected metadata for one or more fields in the first file. The interface receives a file from a computer program. The file comprises fields that each comprise information provided by one or more sources. The processor executes a second computer program which extracts a first set of file metadata from the received file, compares the extracted first set of file metadata to the expected metadata, and determines if the extracted first set of file metadata corresponds to the expected metadata. If the extracted first set of file metadata corresponds to the expected metadata for the first file, then the processor performs analogous comparisons at a field level and stores the first file in the memory.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: October 6, 2020
    Assignee: Bank of America Corporation
    Inventors: Brad E. Romano, Shashi Thanikella
  • Patent number: 10776510
    Abstract: A method for managing personal data of a user of a user device is provided. The user device is adapted to have installed thereon an application (APP). The APP is configured to require access to the personal data when running on the user device. The method comprises creating a certification for the APP, the certification being based on a corresponding statement providing information regarding the relationship between the APP and personal data; associating the certification to the APP for certifying the APP; allowing the user to provide user-defined policies about exploiting the user personal data; checking whether the user-defined policies provided by the user are compatible with requirements of the APP defined in the corresponding statement. If the user-defined policies are compatible with the requirements of the APP defined in the statement, the method executes operations when the APP running on the user device requires to access personal data.
    Type: Grant
    Filed: May 26, 2014
    Date of Patent: September 15, 2020
    Assignee: Telecom Italia S.p.A.
    Inventors: Fabrizio Antonelli, Corrado Moiso, Mattia Pasolli, Michele Vescovi
  • Patent number: 10733825
    Abstract: A method for creating a secure document, registering the secure document and verifying the authenticity of the secure document includes receiving a print object that has content. A security feature, including an identifier, is created and is associated with the content. The identifier may be a barcode. The barcode may represent a character string. The security feature may include the identifier barcode and a decoy barcode that is not associated with the content. The identifier barcode (or the character string represented by the barcode) and the content are transmitted to a database for storage. Once stored, the identifier and the content are considered to be registered. A print object that includes the security feature and the content is then transmitted to a printer for printing.
    Type: Grant
    Filed: March 20, 2019
    Date of Patent: August 4, 2020
    Assignee: TROY GROUP, INC.
    Inventors: Brian Lewis, Xiaorong Cai, Michael R. Riley, David Altfeder
  • Patent number: 10725667
    Abstract: Disclosed herein are a method of transferring data in a parallel system including a main device and at least one accelerator, and a parallel system for performing the method. The method of transferring data in a heterogeneous system including a main device and at least one accelerator includes: turning off a write permission for a first main memory area corresponding to a first accelerator memory area where input data for a computation task is stored; performing the computation task by using the at least one accelerator; and turning off a read permission for a second main memory area corresponding to a second accelerator memory area where output data for the computation task is stored, in the state in which data of the second accelerator memory area has not been transferred to the second main memory area.
    Type: Grant
    Filed: January 18, 2018
    Date of Patent: July 28, 2020
    Assignee: SEOUL NATIONAL UNIVERSITY R&DB FOUNDATION
    Inventors: Jaejin Lee, Gangwon Jo
  • Patent number: 10701079
    Abstract: Customized data management may include an example method which provides identifying data being accessed by at least one user device, retrieving a user profile associated with the user device, identifying access rights associated with the user profile, modifying the data by obscuring at least a portion of the data based on the access rights of the user profile.
    Type: Grant
    Filed: December 15, 2016
    Date of Patent: June 30, 2020
    Assignee: Open Invention Network LLC
    Inventor: David Gerard Ledet
  • Patent number: 10657019
    Abstract: According to some embodiment, a microservice architecture is instantiated in accordance with a predefined framework to perform monitoring services of a first system and a second system. The microservice architecture includes one or more microservices. The microservice architecture is segmented into groups of microservices. Each group of microservices is represented by a subset of the predefined framework. A first group of microservices is deployed to the first system. A second group of microservices is deployed to the second system.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: May 19, 2020
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Shelesh Chopra, Gururaj Kulkarni, Harish Jayaram, Ramkumar Seetharaman
  • Patent number: 10652603
    Abstract: In one embodiment, a method includes identifying a plurality of segments of media content, each of the plurality of segments including a plurality of media frames, generating segment metadata for each of the plurality of segments, the segment metadata including a segment identifier, transmitting a broadcast stream including the plurality of segments and the segment metadata for each of the plurality of segments, and making the plurality of segments available for retrieval via a unicast stream using the segment identifiers.
    Type: Grant
    Filed: July 9, 2015
    Date of Patent: May 12, 2020
    Assignee: TRITON US VP ACQUISION CO.
    Inventors: Keith Millar, Robert Edward May
  • Patent number: 10614241
    Abstract: Managing data in a file system with a verification engine that may obtain a user identifier associated with a user, an object identifier, and a target object. The verification engine may determine target identities associated with two or more file system protocols based on the user identifier. The verification engine may determine permission entries associated with the two or more file system protocols associated and the target object. The verification engine may employ the target identities and the permission entries to directly verify access rights to the target object for the user. Accordingly, the verification engine may provide a report that includes the target identities, the permission entries, or the access rights.
    Type: Grant
    Filed: December 27, 2018
    Date of Patent: April 7, 2020
    Assignee: Qumulo, Inc.
    Inventors: Michael Patrick Kirby, Iain Michael Christopher Peet, Anthony Moon-Git Low, Aleksei Martynov, Jason Allan Sturgeon
  • Patent number: 10608882
    Abstract: A method of managing an active-passive topology in a distributed computing environment comprising a plurality of systems each having a token manager connected to a common resource accessible by all of the systems comprising a token pool of tokens. The token manager locks the token pool and checks the token pool for an available token. When a token is available, the token manager leases the available token and unlocks the token pool. The token manager designates the system as an active system and alters an owner of the token to the active system. The token manager of the active system updates a leasing time of the token leased during use of the token by the active system and in response to an active system deactivation or stoppage, the token manager locks the token pool to return the token to the token pool and unlocking the token pool.
    Type: Grant
    Filed: February 16, 2017
    Date of Patent: March 31, 2020
    Assignee: International Business Machines Corporation
    Inventors: Paul Chen, Philip Kurowski, Alex Luo
  • Patent number: 10599840
    Abstract: A processor is configured to identify a first impersonating message, transmitted over a Controller Area Network (CAN) bus by an attacking node connected to the bus, that appears to originate from a source other than the attacking node, to transmit via a transceiver, in response to identifying the first impersonating message, a stream of messages over the bus, until a defense message belonging to the stream collides with, and trumps, a second impersonating message from the attacking node, and to drive the attacking node, subsequently, into an error-passive state in which an ability of the attacking node to communicate over the bus is limited relative to before entering the error-passive state, by repeatedly retransmitting the defense message over the bus in sync with retransmissions of the second impersonating message by the attacking node, such that the defense message collides with, and trumps, multiple subsequent instances of the second impersonating message.
    Type: Grant
    Filed: July 20, 2017
    Date of Patent: March 24, 2020
    Assignee: RAMOT AT TEL AVIV UNIVERSITY LTD.
    Inventors: Tsvika Dagan, Avishai Wool
  • Patent number: 10587581
    Abstract: A method, and associated system, for security processing of a request for a resource in a network security system. The request for the resource and a duplicate of request for the resource are forwarded to a first proxy server and a second proxy server, respectively. A first output including the received request, and a second output including the duplicate of the received request, are received from first proxy server and the second proxy server, respectively. A determination is made of whether the first output and the second output differ; if not the received request or the duplicate of the received request is transmitted to a web server for satisfying the request; if so a first alarm is generated and transmission to the web server of the received request and the duplicate of the received request is blocked.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventor: Ian Robertson
  • Patent number: 10587610
    Abstract: A method for authorization management in an arrangement having multiple computer systems is disclosed.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: March 10, 2020
    Assignee: CISC SEMICONDUCTOR GMBH
    Inventors: Markus Pistauer, Manfred Jantscher, Stephan Gether
  • Patent number: 10567529
    Abstract: Methods and apparatuses are disclosed herein for unified tracking data management. An example method is performed at a device with a display and one or more input devices, the method including: displaying a user interface with two or more sets of tracking-data configuration options associated with a plurality of websites, the sets including: a first tracking-data configuration option that, when selected, causes the device to block all of the plurality of websites from storing tracking data; and a second tracking-data configuration option that, when selected, causes the computing device to limit receipt by all of the plurality of websites of information associated with device. While displaying the user interface, the method includes: receiving a selection of the first tracking-data configuration option; and, in response, causing the computing device to block all of the plurality of websites from storing tracking data of at least the first type on the computing device.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: February 18, 2020
    Assignee: APPLE INC.
    Inventors: Steven Jon Falkenburg, Darin Benjamin Adler, Jessie Leah Berlin, Jing Jin, Kevin W. Decker, Maciej Stachowiak
  • Patent number: 10558824
    Abstract: Methods, systems, and techniques for application isolation by remote-enabling applications are provided. Example embodiments provide an Adaptive Rendering Application Isolation System (“ARAIS”), which transparently and dynamically enables applications to run in an isolated execution environment yet be rendered locally in a manner that minimizes the amount of data to be transferred and the latency caused by expensive computation and/or by overburdening available bandwidth by remoting rendering using draw commands over rendering using pixel pushing or other techniques. In one embodiment, the ARAIS includes an orchestrator server which comprises remoting level determination logic and rules engine, pre-computed graphics libraries, connection support logic, data repositories for objects such as a render cache, whitelists, blacklists, client privileges, and application information, and one or more secure containers running remote application instances.
    Type: Grant
    Filed: July 3, 2019
    Date of Patent: February 11, 2020
    Assignee: S2 Systems Corporation
    Inventors: Darren Remington, Trevor Sundberg, Killian Koenig, Benjamin Buzbee, Michael Conrad, David Harnett
  • Patent number: 10554690
    Abstract: An approach is provided in which an information handling system creates a container that includes security information. The information handling system deploys the container to a container group and, in turn, performs a security-related action based on the security information.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Lisa Seacat DeLuca, Nitin Gaur, Dana L. Price, Aaron J. Quirk
  • Patent number: 10552244
    Abstract: Methods, systems and computer program products automatically back-up data. Communication is established among a first device, a second device, and a network-based storage device. Key words associated with uniform resource locators are identified and stored in the network-based storage device. When corruption is detected of the data stored in the first device, the key words are automatically retrieved from the network-based storage device and listed in a user interface displayed at the second device.
    Type: Grant
    Filed: March 9, 2016
    Date of Patent: February 4, 2020
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Michael Denny, Hong Nguyen
  • Patent number: 10552639
    Abstract: Methods, systems, and techniques for application isolation by remote-enabling applications are provided. Example embodiments provide an Adaptive Rendering Application Isolation System (“ARAIS”), which transparently and dynamically enables applications to run in an isolated execution environment yet be rendered locally via a local isolator application having one or more cohesive application-isolation interfaces in a manner that facilitates providing the ARAIS indications of user actions that are otherwise lost and executing functions that are otherwise unavailable during fully secure isolation sessions absent one or more cohesive application-isolation interfaces.
    Type: Grant
    Filed: July 11, 2019
    Date of Patent: February 4, 2020
    Assignee: S2 Systems Corporation
    Inventors: Benjamin Buzbee, Killian Koenig, Trevor Sundberg, Michael Conrad, Darren Remington, David Harnett
  • Patent number: 10545755
    Abstract: A system, method, and non-transitory computer-readable storage medium for identifying customization changes have been disclosed. The system comprises a processor and a memory that includes instructions executable by the processor to cause the system to identify a baseline script of a plurality of baseline scripts from a baseline instance that corresponds to a custom script of a plurality of custom scripts from a customized instance. The customized instance is a customized version of the baseline instance. The instructions are executable to cause the system to compare the baseline script to the custom script to identify one or more changes between the baseline script and the custom script, to determine an amount of change using the one or more identified changes, and to generate a graphical user interface that includes an identifier of the baseline script, an identifier of the custom script, and a graphical indication of the amount of change.
    Type: Grant
    Filed: September 7, 2017
    Date of Patent: January 28, 2020
    Assignee: ServiceNow, Inc.
    Inventors: Ivan Garay, Royce Davis, Clint Sowada
  • Patent number: 10540500
    Abstract: A method of securely booting a computer system includes executing program code of at least one boot loader to load a kernel; verifying, during loading of the kernel, the program code of the boot loader after at least a part of the program code of the boot loader has been executed; and interrupting the booting if a result of the verifying of the program code of the boot loader indicates a manipulation of the program code of the boot loader.
    Type: Grant
    Filed: March 18, 2016
    Date of Patent: January 21, 2020
    Assignee: Fujitsu Client Computing Limited
    Inventors: Diana Filimon, Jürgen Atzkern, Thilo Cestonaro, Timo Bruderek
  • Patent number: 10528282
    Abstract: A method for execution by a storage unit of a dispersed storage network includes receiving a slice access request that includes a slice name. A first function is performed on the slice name to produce a bucket file identifier. A second function is performed on the slice name to produce a bucket identifier. A bucket file of a plurality of bucket files is accessed, where the bucket file is identified by utilizing the bucket file identifier. A bucket of a plurality of buckets within the bucket file is accessed, where the bucket is identified by utilizing the bucket identifier. It is determined to modify a number of buckets in the bucket file based on bucket utilization. An attribute of the second function is modified in response, where the attribute is associated with the number of buckets in the bucket file.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: January 7, 2020
    Assignee: PURE STORAGE, INC.
    Inventors: Joseph M. Kaczmarek, Ethan S. Wozniak, Ilya Volvovski