Authorization Patents (Class 726/4)
  • Patent number: 10664605
    Abstract: Systems and methods here include providing ways for a third party to obtain authorization via electronic form to interact with a utility on a utility account holder's behalf, locate and collect the account holder's energy usage and billing data and process and store the data using high security measures. This system is able to dynamically generate and process different types of authorization and varied scope for interacting with public utilities.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: May 26, 2020
    Assignee: UtilityAPI
    Inventor: Daniel Roesler
  • Patent number: 10664205
    Abstract: In an image processing apparatus, a processor transmits to the server a first registration request including incapability information. The incapability information indicates that any of a plurality of settings for an image process is incapable of being designated. The processor receives from the server a first function execution instruction including the account information, and first relation information which is related to a fact that no setting for the image process is specified. The processor acquires from a memory setting specification information correlated with the account information. The processor displays a specification screen for prompting a user to specify one setting from among one or more settings for the image process specified by the acquired setting specification information. In a case where the user specifies a first setting via the specification screen, the processor controls an image processing execution unit to execute the image process in accordance with the first setting.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: May 26, 2020
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Yongyong Ren
  • Patent number: 10667127
    Abstract: An exemplary mobile computing device includes an interface configured to wirelessly receive a control policy from an antenna; a processor configured to enforce the received control policy; and memory configured to store the received control policy and retain a last-received control policy for enforcement by the processor when the interface is outside an antenna range to wirelessly receive any control policy.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: May 26, 2020
    Assignee: BOOZ ALLEN HAMILTON INC.
    Inventors: Gary Jason Myers, Matthias Welsh, Robert Wayne Knight, Timothy Schaefer
  • Patent number: 10659465
    Abstract: Embodiments described herein relate to a server computer operable to provide a proof of knowledge service. In some embodiments, the server computer includes processor(s) and memory containing instructions executable by the processor(s) such that the server computer is operable to authenticate a user on behalf of a relying party server. The server computer is further operable to obtain results of one or more tests from a client device of the user. The server computer is further operable to send one or more instructions to the relying party server in accordance with the results of the one or more tests, where the one or more instructions have been predefined by the user and define one or more actions to be taken by the relying party server in an event where the user does not pass the one or more tests.
    Type: Grant
    Filed: July 16, 2018
    Date of Patent: May 19, 2020
    Assignee: Antique Books, Inc.
    Inventors: Robert H. Thibadeau, Sr., Justin D. Donnell, Robert Thibadeau, Jr.
  • Patent number: 10659299
    Abstract: In one embodiment, a method includes receiving an indication of a trigger action associated with a first user and with respect to a particular entity, sending to the first user a content-update interface for updating privacy settings associated with multiple content objects associated with the first user or the particular entity, receiving, from the first user via the content-update interface, settings updates for the content objects, and applying the settings updates to the privacy settings associated with the content objects.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: May 19, 2020
    Assignee: Facebook, Inc.
    Inventors: Kelly B. Winters, Brian Jay Thomas, Daniel Gregory Muriello, Emily Grace Albert
  • Patent number: 10657264
    Abstract: Methods, apparatus, and systems for characterizing vulnerabilities of an application source code are disclosed. Steps for characterizing vulnerabilities include traversing a representation of the application source code, generating a signature of a potential vulnerability of the application source code, and determining characteristics of the potential vulnerability based on a correlation between the generated signature of the potential vulnerability and previously stored signatures of potential vulnerabilities.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: May 19, 2020
    Assignee: WHITEHAT SECURITY, INC.
    Inventor: Eric Sheridan
  • Patent number: 10659466
    Abstract: The techniques and systems described herein improve security and improve connection reliability by providing a framework for an application to communicate its intent to an authority service so that the authority service can enforce networking security requirements. In various examples, an intent to access a resource over a network is received and queries are sent to resolve a network connection that enables access to the resource. Information for the resource is then collected and stored together in a trusted and secure environment. For instance, the information can include proxy data or can include hostname data. A ticket can be created based on the information. The ticket can be used to establish and maintain a secure network connection to the resource.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: May 19, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gerardo Diaz-Cuellar, Benjamin M. Schultz, Ivan Dimitrov Pashov
  • Patent number: 10657227
    Abstract: A streamlined workflow for digital rights management (DRM) licensing for content such as media assets is achieved via an authentication server establishing an authenticated session that is referenced by other processes, whereby a content grant may include a key to desired encrypted content with a portion of the content or content meta-data. The authentication server verifies the user's identity and provides a session grant including a session security mechanism, such as a token, session key, or negotiated secret. The session grant may be used to obtain a content authorization from a content router. The content authorization includes an address at which the content may be found and may be decorated with security mechanisms. The session grant and/or content authorization may include an entitlement record reflecting the user's entitlements to access content. The session grant and/or content authorization may be used to obtain a content grant from a content server.
    Type: Grant
    Filed: November 14, 2018
    Date of Patent: May 19, 2020
    Assignee: Comcast Cable Communications, LLC
    Inventor: Kyong Park
  • Patent number: 10657254
    Abstract: There are disclosed devices, system and methods for feeding identification data of malicious creatives existing in internet advertisements to a supply side platform (SSP) by receiving reports of unwanted actions without user action by malicious creatives of internet advertisements (ads) requested from the SSP by webpages being displayed to users. The reports include a creative identification (ID), a malicious code chain of events, and a demand side platform (DSP) ID or a seat ID. The reports are pre-processed by classifying the unwanted action attempts based on the chain of events. The pre-processed reports are parsed to extract the creative IDs, the SSP IDs and the DSP IDs; and then stored in a searchable database. The stored parsed pre-processed reports are feed to SSPs based on the SSP identifications. The feed includes the creative IDs, the SSP IDs, the DSP IDs, timestamps of the unwanted action attempt and the classifications.
    Type: Grant
    Filed: December 31, 2019
    Date of Patent: May 19, 2020
    Assignee: CLEAN.IO, INC.
    Inventors: Alexey Stoletny, Seth Demsey, Iván Soroka
  • Patent number: 10650133
    Abstract: Systems, methods, and non-transitory computer-readable media can detect an operation that causes a challenge response process to be initiated. An image category associated with a recognized category label can be identified. At least one image associated with the image category can be displayed during the challenge response process. The operation can be executed when the challenge response process, based on the at least one image, is successfully completed.
    Type: Grant
    Filed: January 23, 2019
    Date of Patent: May 12, 2020
    Assignee: Facebook, Inc.
    Inventors: Nikhil Johri, Trevor M. Pottinger, Balamanohar Paluri
  • Patent number: 10652264
    Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for real-time generation and deployment of specific user information security vulnerability levels based on vulnerability assessments for the user. The invention utilizes a two-component system to detect security vulnerabilities for a user, generate a coherent vulnerability level for the user in real-time, and provides user specific mitigation actions depending on each user vulnerability assessment. The first component of the system is an information threat assessment engine, which identifies and/or receives external and internal data regarding users to determine information security threats. The second component is an analytics engine, which is configured to generate vulnerability levels and specific mitigation actions for the user based on threat patterning.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: May 12, 2020
    Assignee: BANK OF AMERICA CORPORATION
    Inventor: David Michael Steele
  • Patent number: 10650127
    Abstract: In general, an indication is received through a user interface of an intention of a potential rider to use an autonomous vehicle. In response to the receipt of the indication, a hailing request is sent by a signaling mode to at least one autonomous vehicle that can receive the hailing request directly in accordance with the signaling mode.
    Type: Grant
    Filed: April 23, 2019
    Date of Patent: May 12, 2020
    Assignee: LIFETRACK MEDICAL SYSTEMS PRIVATE LTD.
    Inventors: Eric Schulze, Brendan Philip Rees
  • Patent number: 10645076
    Abstract: Disclosed herein are system, method, and computer program product embodiments for updating identification information of a user with service providers. An embodiment operates by a computing device sending a first piece of identification information describing a user to a service provider requiring a credential to update a user profile unique to the user. Upon receiving an indication that the piece of identification information sufficiently describes the user, the computing device generates an identifier unique to the particular user to identify the user when the computing device communicates with the service provider. Thereafter, the computing device sends an instruction to the service provider to update their user profile with a second piece of identification information. With the request, the computing device sends the identifier unique to the user, which allows the service provider to bypass the user credential and update the user profile with the second piece of identification information.
    Type: Grant
    Filed: August 7, 2019
    Date of Patent: May 5, 2020
    Assignee: Capital One Services, LLC
    Inventors: Matthew Carson, Kevin Nieman, Michael Chen, Kelly Ripple, Seth Wilton Cottle
  • Patent number: 10644875
    Abstract: One embodiment provides a method for pre-authorizing public key infrastructure communication between entities, the method comprising: utilizing at least one processor to execute computer code that performs the steps of: determining if pre-authorization is required from a remote device to establish a communication channel between a first entity and a second entity; establishing a shared secret value between the first entity and the remote device; receiving, at the second entity, from the remote device, proof of pre-authorization, thereby pre-authorizing communication between the first and second entity, wherein the pre-authorization is based on the shared secret value; and storing the proof of pre-authorization for any subsequent communication with the first entity. Other aspects are described and claimed.
    Type: Grant
    Filed: April 28, 2016
    Date of Patent: May 5, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: David William Kravitz
  • Patent number: 10637836
    Abstract: Existing approaches to security within network, for instance one M2M networks, are limited. For example, content might only be protected while the content is in transit between entities that trust each other. Here, the integrity and the confidentiality of content in an M2M network are protected. Such content may be “at rest,” such that the content is stored at a hosting node. Only authorized entities may store and retrieve the data that is stored at the hosting node, and the data may be protected from a confidentiality perspective and an integrity perspective.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: April 28, 2020
    Assignee: Convida Wireless, LLC
    Inventors: Vinod Kumar Choyi, Yogendra C. Shah, Dale N. Seed, Michael F. Starsinic, Shamim Akbar Rahman, Quang Ly, Zhuo Chen, William Robert Flynn, IV
  • Patent number: 10637938
    Abstract: A multi-tenant media communication platform system and methods. The platform system includes media communication micro-services and micro-service configuration for a plurality of entities configured for use of the platform system. Enrolling an entity in the platform system includes setting entity configuration for use of the platform system by the entity. A micro-service request is processed according to the entity configuration. The micro-service request is a request for use of at least one micro-service of the platform system on behalf of the entity. Use of each micro-service is accounted for on behalf of the entity. Billing information for the entity is generated based on the accounting for the use of each micro-service on behalf of the entity. Entity configuration includes micro-service configuration, and micro-service configuration specifies at least one of: an endpoint mapping to at least one application logic URI, an event callback URI, and an event application logic URI.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: April 28, 2020
    Assignee: Twilio Inc.
    Inventors: Jeffrey Lawson, John Wolthius
  • Patent number: 10638090
    Abstract: A digital content conference sharing system for use with portable user computing devices, a wireless communication subsystem and a processor programmed to perform the steps of (i) when a portable computing device is detected within the first sensing zone, associating the portable computing device with the first sensing zone and enabling an interface for sharing content from the associated portable computing device on the common display screen and (ii) when a portable computing device is detected within the second sensing zone, associating the portable computing device with the second sensing zone and enabling an interface for sharing content from the associated portable computing device on the common display screen.
    Type: Grant
    Filed: January 14, 2019
    Date of Patent: April 28, 2020
    Assignee: STEELCASE INC.
    Inventor: Darrin Sculley
  • Patent number: 10638323
    Abstract: A wireless communication device including: a processor configured to: serve a wireless network with one or more other wireless communication devices, the wireless communication device and the one or more other wireless communication devices wirelessly publishing a specified identifier of the wireless network in common and wirelessly communicating with a wireless terminal when receiving a request, for coupling to the wireless network, transmitted based on the specified identifier from the wireless terminal, transmit to the other wireless communication device, when the wireless communication device detects that a scanned wireless signal from another wireless communication device publishes the specified identifier, a specified request for coupling to the wireless network, and determine whether the other wireless communication device is one of the one or more other wireless communication device or not based on a response, originating with the specified request, from the other wireless communication device.
    Type: Grant
    Filed: March 10, 2017
    Date of Patent: April 28, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Tomoya Kitano, Hiroyuki Tanaka, Toshihito Nozawa, Manabu Fujimori, Yasuhiro Sasagawa, Tetsuo Ishihara, Hidenori Kanazawa
  • Patent number: 10635840
    Abstract: Aspects of the disclosure relates to systems and methods for locking a display device of a host computer remotely using a management controller, and providing a banner notification on the locked display device. The system includes a computing device as the host computer, which has a display device, and a management controller. When the management controller receives a locking command, the management controller, in response to the locking command, performs the following operations: generating a locking instruction, and sending the locking instruction to the computing device to lock the display device; and generating a message display instruction including a message to be displayed, and sending the message display instruction to the display device of the computing device, in order to display the message on the display device. Thus, a local user at the computing device may be notified by the message that the display device is locked.
    Type: Grant
    Filed: July 8, 2016
    Date of Patent: April 28, 2020
    Assignee: AMERICAN MEGATRENDS INTERNATIONAL, LLC
    Inventors: Arunprasad Rajaiah, Preethi Kalaiselvam, Ramachandran Arumugham, Vinothkumar Manickavelu
  • Patent number: 10631042
    Abstract: Methods and systems for selecting and delivering content are provided. More particularly, content can be delivered to an output device from a user device through a device adaptor, such as an over-the-top (OTT) device. The OTT device or devices available to the user device are determined by a communication server. In particular, the OTT device or devices available to the user device are limited to those OTT devices associated with an output device in the user's room, or that the user is otherwise authorized to access.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: April 21, 2020
    Assignee: SONIFI SOLUTIONS, INC.
    Inventors: Derin Michael Zerr, Joel Walter Zdepski, Shaun Eugene Marko, Chad J. Schroeder, Andy Loren Anderson, Christopher Paul Wollmann
  • Patent number: 10630673
    Abstract: The present disclosure relates to generating composite user identities in a distributed computing system. According to one embodiment, an example method generally includes transmitting, to a plurality of identity providers, a request for user identity information. A service provider receives, from a subset of the plurality of identity providers, the user identity information and selects a subset of the received user identity information to be used in verifying an identity of a user based, at least in part, on a reputation score associated with each identity provider in the subset of identity providers. The service provider generates a composite user identity based on the selected subset of the received user identity information. The service provider takes one or more actions to enable use of a service based on the generated composite user identity.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: April 21, 2020
    Assignee: INTUIT INC.
    Inventors: Parikshit Lingampally, Glenn Scott, Michael R. Gabriel
  • Patent number: 10630677
    Abstract: The disclosed computer-implemented method for protecting users may include (i) receiving, at an online social network from a first member of the online social network, a request to delegate an access right to an Internet-of-Things device possessed by the first member to a second member within the online social network to which the first member is connected as a social contact and (ii) granting, through the online social network, the request to delegate the access right to the Internet-of-Things device to the second member to provide the second member with at least a limited ability to interact with the Internet-of-Things device possessed by the first member of the online social network. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 12, 2019
    Date of Patent: April 21, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Qing Li, Samir Kapuria
  • Patent number: 10630694
    Abstract: A method includes receiving an access feature request for utilization of a feature in a computing system, determining a system requestor associated with the access feature request, determining an achievement associated with the feature, accessing a plurality of first document types associated with the system requestor, determining that a document of the plurality of first document types reflects successful completion of the achievement, and providing a system access to the feature based on a determination that the document reflects successful completion of the achievement.
    Type: Grant
    Filed: September 20, 2017
    Date of Patent: April 21, 2020
    Assignee: Express Scripts Strategic Development, Inc.
    Inventors: Leah Sterman-Kabrt, Melissa Orlando, Laurie Littlecreek, Corinne Bradley-Pollack, David Hutchison, Kevin Mulligan
  • Patent number: 10625694
    Abstract: A cyber security module for providing security to an in-vehicle communication network having a bus, at least one node connected to the bus, and at least one communications device coupled to the in-vehicle communication network configured to interface the in-vehicle network with an external communication network, the cyber security module comprising: a communication port configured to receive a message from the communication device that the communication device generates based on a message that the communication device receives from the external communication network; at least one communication port coupled to the bus; an authentication module configured to authenticate whether or not the message originated from an authorized source; and a processor configured to operate to prevent content of the message from being operated on if the authentication module determines that the source of the message received by the communication device is not from an authorized source.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: April 21, 2020
    Assignee: Argus Cyber Security Ltd.
    Inventors: Ofer Ben Noon, Yaron Galula, Oron Lavi
  • Patent number: 10623414
    Abstract: Embodiments include method, systems and computer program products for validating a user logon credential. The method includes providing a verification artifact. The method also includes determining an existence of a user post of the verification artifact on the third party system. The method further includes validating the user logon credential based on the user post of the verification artifact on the third party system.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: April 14, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Christopher J. Hardee, Steven R. Joroff, Pamela A. Nesbitt, Scott E. Schneider
  • Patent number: 10621839
    Abstract: Methods and systems are described for the detection and identification of a cellular device that crosses a perimeter associated with a premises that is installed with a monitoring system. Subsequently, a determination of an intruder crossing the perimeter and/or entering a building within the premises may be made based on receiving unique identification values for the cellular device and/or information associated with a user of the cellular device. One or more sensors present within or near the premises may be configured to send alert information when tripped. The monitoring system may be configured to determine a location of the cellular device, an identity of the user of the cellular device, additional information stored, transmitted or received by the cellular device, and safe escape routes that may be sent to one or more user devices registered with the monitoring system.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: April 14, 2020
    Assignee: Comcast Cable Communications, LLC
    Inventor: Deven Vazirani
  • Patent number: 10623522
    Abstract: Embodiments of the present application relate to a method, apparatus, and system for uploading a form attachment file. The method includes receiving, from a second terminal, a request for an attachment upload address. In response to receiving the request for the attachment upload address, sending a form attachment upload address to the second terminal, receiving, from a first terminal, an attachment upload page access request, and receiving a form attachment from the first terminal.
    Type: Grant
    Filed: May 26, 2017
    Date of Patent: April 14, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Xingnan Ou
  • Patent number: 10615974
    Abstract: The present invention relates to a security authentication system for generating a secure key by combining authentication elements of multi-users and a security authentication method thereof, and more particularly, to a security authentication system for generating a secure key by combining authentication elements of multi-users and a security authentication method so as to collect information from multi-users in a smart terminal-based security authentication environment and generate a secure key by combining the collected information of multi-users as authentication elements.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: April 7, 2020
    Assignee: FNS Value Co., Ltd.
    Inventor: Seung Ju Jeon
  • Patent number: 10613892
    Abstract: Novel tools and techniques might provide for implementing applications management, based at least in part on operations, administration, and management (“OAM”) information. A host computing system might comprise a dedicated OAM management agent. While normal application frame flow might be sent or received by VMs running on the host computing system, OAM frame flow might be sent or received by the OAM management agent, which might also serve as an OAM frame generator. Alternatively, or additionally, based on a determination that at least one OAM frame has changed (in response to a change in address of far-end and/or near-end OAM server functions), the OAM management agent might update a list associating the at least one OAM frame that has changed with corresponding at least one VM of the one or more VMs, without restarting any of the at least one VM, the OAM management agent, and/or the host computing system.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: April 7, 2020
    Assignee: CenturyLink Intellectual Property LLC
    Inventor: Michael K. Bugenhagen
  • Patent number: 10616182
    Abstract: A method of tunneling through a network separation device such as a firewall or a Network Address Translator comprising establishing via a custom socket factory coupled with a host device, a connection with a cloud server by tunneling through a network separation device; maintaining, via the custom socket factory, the connection with the cloud server through the network separation device; receiving, via the connection between the custom socket factory and the cloud server, connection information; and directly connecting, via the custom socket factory, to a client device using the connection information received from the cloud server.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: April 7, 2020
    Assignee: Progress Software Corporation
    Inventor: John Alan Hensley
  • Patent number: 10616094
    Abstract: Example embodiments relate to redirecting data packets. The examples disclosed herein receive a first packet from a first device. The first packet is qualified as a flow control packet. In response to the first packet being qualified as a flow control packet, examples herein then redirect the first packet from being delivered to a second device to being delivered to a third device.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: April 7, 2020
    Assignee: Trend Micro Incorporated
    Inventor: Piers E. Hendrie
  • Patent number: 10616210
    Abstract: Cloud-based storage services are provided for storing data across multiple devices, where access to the data is subject to a first authentication process. Embodiments are directed to a data protection feature to prevent accidental deletion or modification of the data stored at the cloud via unintended user actions on the clients or actions by nefarious software or hackers. For example, a data protection feature for a portion of data stored at the storage service may be selected, where the feature includes elevation of the first authentication process. An attempted operation performed on the portion of data may be detected. If the attempted operation is deletion or modification of the portion of data, a second authentication process may be prompted to enable the attempted operation to be performed on the portion of data at the storage service. The second authentication process may be elevated compared to the first authentication process.
    Type: Grant
    Filed: August 19, 2016
    Date of Patent: April 7, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Steven Bailey, John D. Rodrigues, Filip Chelarescu
  • Patent number: 10616216
    Abstract: Systems and methods are provided for secure access to data actions. In one embodiment, a request to perform an action on electronic data is received from a client device. Primary authentication information is received from the client system, a secondary device, or both. The request is authenticated by: in response to the primary authentication information matching the expected primary authentication of the user profile associated with the primary authentication information, providing expected secondary authentication information to supplement the primary authentication to the client system, the secondary device, or both; receiving inputted secondary authentication information from the client system, the secondary device, or both; and authenticating the request only when the inputted secondary authentication information matches the expected secondary authentication information.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: April 7, 2020
    Assignee: United Services Automobile Association (USAA)
    Inventors: Bharat Prasad, Charles Lee Oakes, Gunjan C. Vijayvergia, Vijay Jayapalan, Thomas Bret Buckingham
  • Patent number: 10615975
    Abstract: The present invention relates to a security authentication method for generating a secure key by combining authentication elements of multi-users, and more particularly, to a security authentication method for generating a secure key by combining authentication elements of multi-users so as to collect information from multi-users in a smart terminal-based security authentication environment and generate a secure key by combining the collected information of multi-users as authentication elements, in which a new secure key is generated by multi-dimensionally cross-combining randomly authentication elements of multi-users.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: April 7, 2020
    Inventor: Seung Ju Jeon
  • Patent number: 10609046
    Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.
    Type: Grant
    Filed: February 8, 2018
    Date of Patent: March 31, 2020
    Assignee: Palantir Technologies Inc.
    Inventors: Juan Ricafort, Harkirat Singh, Philip Martin
  • Patent number: 10609255
    Abstract: An image forming apparatus that performs authentication of a user by a login program that operates on firmware and that, upon detection an abnormality of the login program, restricts execution of a job without causing the login program to terminate, and, while execution of the job is being restricted, controls to enable reception of an operation for disabling the login program via a reception unit for receiving an operation by a user via an operation unit, and, in accordance with the operation for disabling, causes the restricted job to be executed.
    Type: Grant
    Filed: November 8, 2017
    Date of Patent: March 31, 2020
    Assignee: CANON KABUSHIKI KAISHA
    Inventors: Hiroshi Oya, Yasunori Shimakawa, Atsushi Ikeda
  • Patent number: 10606983
    Abstract: Healthcare is administered to members/enrollees of a healthcare plan according to objective quality standards. A patient population of eligible members/enrollees is identified and for each member/enrollee, medical information is aggregated via a web-based compilation of medical data from multiple sources that is continuously updated so as to provide an accurate, up-to-date and readily accessible compilation of a member/enrollee past diagnoses, healthcare history, medical procedures, medications and the like. Such member/enrollees are continuously tracked, on an individual basis, and monitored to ensure healthcare is delivered for a variety of specific medical conditions pursuant to objective health program quality criteria.
    Type: Grant
    Filed: August 17, 2016
    Date of Patent: March 31, 2020
    Assignee: QUALITY STANDARDS, LLC
    Inventor: Debra Thesman
  • Patent number: 10609053
    Abstract: Apparatuses, methods and storage medium associated with techniques to identify suspicious network connections. In embodiments, an apparatus may include an analysis function to be operated by the one or more processors to receive a collection of network data records, and apply a latent factor model to the network data records to identify a subset of the network data records as suspicious network connections. Other embodiments may be disclosed or claimed.
    Type: Grant
    Filed: March 30, 2016
    Date of Patent: March 31, 2020
    Assignee: Intel Corporation
    Inventors: Michael R. Alton, Grant Babb, Alan D. Ross
  • Patent number: 10599861
    Abstract: Disclosed are systems and method for controlling access to objects of an operating system using Access Control Lists (ACLs). An exemplary method comprises: generating, by a processor, one or more ACLs for objects of the operating system based on at least one access rule specifying the access mode to the object of the operating system to one or more users based on the one or more categories to which the objects belongs; intercepting a request from a user to access an object of the operating system; determining, by the processor, one or more ACLs associated with the requested object; and applying, by the processor, the determined one or more ACLs to decide whether to allow or deny access of the user to the requested object, wherein if one of the applied ACLs denies access to the object, the access will be blocked, otherwise the access will be allowed.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: March 24, 2020
    Assignee: AO Kaspersky Lab
    Inventors: Andrey Y. Solodovnikov, Maxim V. Klimenchuk, Maxim V. Yudin, Vasily N. Isakov
  • Patent number: 10601949
    Abstract: Updating a profile includes monitoring electronic communications between a target user and a number of other users in real-time, extracting communicated information available about the target user and the number of other users from the electronic communications, based on an analysis of the communicated information available about the target user and the number of other users identifying relevant information from the communicated information that is relevant for updating the profile of the target user on at least one social network, and updating the profile of the target user on the at least one social network using the relevant information derived from the analysis.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: March 24, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eric B. Libow, Walker L. Sherk, Thomas S. Wallace, Pu Yang
  • Patent number: 10601801
    Abstract: Embodiments of the present invention disclose an identity authentication method and apparatus. The NFV system includes a VNF including a first virtual network function component VNFC and a second VNFC. The method includes: generating a public key and a private key of the first VNFC and a public key and a private key of the second VNFC; writing or sending the private key of the first VNFC and the public key of the second VNFC to the first VNFC; and writing or sending the public key of the first VNFC and the private key of the second VNFC to the second VNFC, where the public key and the private key of the first VNFC and the public key and the private key of the second VNFC are used for identity authentication of the first VNFC and the second VNFC.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: March 24, 2020
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Jiangsheng Wang, Qingchun Lin
  • Patent number: 10599374
    Abstract: A printing method that ensures security of printed matter. A printing apparatus performs printing based on print data transmitted from a mobile terminal which a user operates. A distance between the mobile terminal and the printing apparatus is measured, and based on the measured distance, acceptance of an instruction to perform the printing from the user is restricted. When the measured distance is equal to or greater than a threshold value set in advance, acceptance of an instruction to perform the printing from the user is not permitted.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: March 24, 2020
    Assignee: CANON KABUSHIKI KAISHA
    Inventor: Taishi Tomihisa
  • Patent number: 10594610
    Abstract: Intelligent local management of data stream throttling in data movement operations, such as secondary-copy operations in a storage management system, is disclosed. A local throttling manager may intelligently interoperate with co-resident data agents and/or a media agent executing on any given local computing device, whether a client computing device or a secondary storage computing device. The local throttling manager may allocate and manage the available bandwidth for various jobs and their constituent data streams—across the data agents and/or media agent. Bandwidth is dynamically allocated and re-allocated to data streams used by ongoing jobs, in response to new jobs starting and old jobs completing, without having to pause and restart ongoing jobs to accommodate bandwidth adjustments.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: March 17, 2020
    Assignee: Commvault Systems, Inc.
    Inventor: Vijayan Thanasekaran
  • Patent number: 10594700
    Abstract: A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at a manufacturer of building control devices, where the user account may be associated with one or more of the user's building control devices from the manufacturer. The third party may be a demand response provider, an aggregator of building control devices, or a different entity. The building control devices may be connected to a network. The system may be implemented over one or more networks with a server, an application programming interface (API), and/or a service bus.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: March 17, 2020
    Assignee: Ademco Inc.
    Inventors: Sorabh Khurana, Ivo Kubita, Thomas Yang
  • Patent number: 10594495
    Abstract: A method for ensuring that a computer readable information is authentic, including: generating a public key associated with the computer readable information, hashing the computer readable information to obtain a hashed computer readable information, encrypting the hashed computer readable information with a private key to create a digital signature, wherein the hashed computer readable information and the digital signature are stored on a block of a blockchain, authenticating the user computing device in response to a request from the user computing device to download the computer readable information, transmitting the public key and the digital signature to an authenticated user computing device, and instructing the authenticated user computing device to decrypt the digital signature using the public key to obtain the hashed computer readable information, and download the hashed computer readable information to the authenticated user computing system to retrieve the computer readable information.
    Type: Grant
    Filed: December 13, 2017
    Date of Patent: March 17, 2020
    Assignee: Walmart Apollo, LLC
    Inventors: Donald R. High, Bruce Walter Wilkinson, Todd Mattingly, Brian Gerard McHale, John J. O'Brien, V, Robert Cantrell, Joseph Jurich
  • Patent number: 10587400
    Abstract: A system, apparatus, and method for sharing network credentials. One embodiment of a method comprises: establishing a Bluetooth connection between a first Internet of Things (IoT) device and a mobile device of a first user having an IoT app installed, the mobile device to couple the first IoT device to an IoT service; receiving a request from a user from the mobile device to configure the first IoT device using network credentials from a second IoT device, the second IoT device registered with an account of the user on the IoT service and configured to connect to a secure network of the user with the network credentials; establishing a communication channel between the first IoT device and the second IoT device through the IoT service and the mobile device to obtain the network credentials; and using the network credentials at the first IoT device to securely connect to the secure network.
    Type: Grant
    Filed: February 12, 2018
    Date of Patent: March 10, 2020
    Assignee: Afero, Inc.
    Inventors: Scott Zimmerman, Joe Britt
  • Patent number: 10584893
    Abstract: A control apparatus and control method which enable equipment to be controlled adaptively to a user who gives a response in a scene where a request is made from outside. A control apparatus including a judging unit that determines control content of equipment in accordance with a request from outside, an inquiry unit that presents information in accordance with the request from the outside to a first user and make an inquiry to the first user as to approval regarding the control content judged by the judging unit, and an equipment control unit that controls the equipment in accordance with a response to the inquiry and information relating to the first user.
    Type: Grant
    Filed: September 26, 2016
    Date of Patent: March 10, 2020
    Assignee: SONY CORPORATION
    Inventor: Hideo Nagasaka
  • Patent number: 10587432
    Abstract: A hardware component, a method for a remote terminal to access a local network, a corresponding service gateway, access authorization method and computer program are provided. The hardware component is configured to allow a remote terminal to access a local area communication network. The local area communication network is connected to a wide area communication network via a service gateway, referred to as source gateway. The hardware component includes at least one memory unit including an area for non-volatile storage of at least one identifier for accessing the source gateway, and is configured to connect to the wide area communication network and to the terminal, and to request opening of a secure communication tunnel with the source gateway, from the at least one identifier for accessing the source gateway.
    Type: Grant
    Filed: June 3, 2016
    Date of Patent: March 10, 2020
    Assignee: ORANGE
    Inventors: Herve Marchand, Simon Gloanec
  • Patent number: 10587616
    Abstract: Methods, systems, and media for authentication of user devices to a display device are provided. In some implementations, the method comprises: authenticating a first user device to a display device, where the first user device is provided with media playback control on the display device in response to the authentication; identifying a second user device in proximity to the first user device; transmitting, from the first user device to the second user device, an invitation message to authenticate the second user device to the display device; and transmitting, from the first user device to the second user device, an authentication token that causes the second user device to request authentication to the display device from the server, where the second user device is provided with media playback control on the display device in response to authenticating with the display device.
    Type: Grant
    Filed: September 16, 2016
    Date of Patent: March 10, 2020
    Assignee: Google LLC
    Inventors: Justin Lewis, Scott Davies
  • Patent number: 10586059
    Abstract: A system to control an access right to apparatus log information of a plurality of output apparatuses includes a memory to store group hierarchical information indicating a hierarchical relationship of a plurality of service-use groups including at least a first service-use group where a first service user belongs, and a second service-use group where a second service user belongs, and group relationship information associating the first service-use group with at least one service provider group where one service provider person belongs, and associating the second service-use group with at least another one service provider group where another service provider person belongs, and circuitry to determine the access right to the apparatus log information of any one of the plurality of output apparatuses for the first service user, the second service user, the one service provider person, and the another one service provider group selectively.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: March 10, 2020
    Assignee: Ricoh Company, Ltd.
    Inventor: Akira Nagamori