Patents Examined by Amare Tabor
-
Patent number: 8966616Abstract: Biometric authentication and touch differentiation embodiments are described which use a handheld mobile computing device having a signal injection site that injects a signal into a user's hand for a prescribed period of time, and at least one signal sensing site each of which captures a signal emanating from a finger of either of the user's hands that is touching the signal sensing site during at least the period of time the signal is injected. The captured signal or signals are analyzed to determine whether they match, to a prescribed degree, a pre-established signal model that is indicative of a signal or signals expected to be captured. The signal matching determination can be employed to authenticate a user, or identify which finger of a user's hand is touching the computing device.Type: GrantFiled: April 1, 2013Date of Patent: February 24, 2015Assignee: Microsoft CorporationInventors: Dimitrios Lymberopoulos, Oriana Riva, Gerald DeJean, Jie Liu, Nissanka Arachchige Bodhi Priyantha
-
Patent number: 8015414Abstract: An approach provides detection of unauthorized use of data services. A determination is made as to whether connections supporting remote access to a data network are completed. The number of completed connections associated with a selected attribute is tracked over a time period. It is then determined whether the number of completed connections satisfies a connection frequency threshold. A fraud alert is generated if the connection frequency threshold is satisfied.Type: GrantFiled: May 31, 2005Date of Patent: September 6, 2011Assignee: Verizon Business Global LLCInventors: Saralyn M. Mahone, Matthew J. Gilbert, Thomas E. Stepp, Arthur L. Springer, John Hans Van Arkel
-
Patent number: 8011011Abstract: A data processing apparatus for processing and protecting data stored in a removable storage medium, including a medium monitoring unit configured to monitor the state of the removable storage medium, an information storage unit configured to store information, and a controller configured to move the data from the removable storage medium to the information storage unit in accordance with the monitoring result of the medium monitoring unit.Type: GrantFiled: December 8, 2004Date of Patent: August 30, 2011Assignee: Canon Kabushiki KaishaInventor: Kazuhiro Sakaguchi
-
Patent number: 8006097Abstract: Presently disclosed herein are a method, system, and computer-readable medium for managing a user-defined genre-based password. In one embodiment, the method includes steps for creating a genre-based tree that can be used to prompt a user in remembering a user-created password.Type: GrantFiled: January 31, 2007Date of Patent: August 23, 2011Assignee: International Business Machines CorporationInventors: David B. Kumhyr, Pamela A. Nesbitt
-
Patent number: 7996906Abstract: A system and method for automatically altering device functionality based on the occurrence of certain predetermined conditions. A link may be established between a device and a trusted server to provide an association between various conditions that may be detected at the device and actions that are to be taken on the device. In particular, software traps can be set up and linked to device functionality such that execution of the trap may automatically disable or enable certain device capabilities. Some aspects of the invention are directed to a system and method for remotely setting software traps for detecting software viruses and, upon execution of the traps, several methods for establishing a quarantine on infected devices.Type: GrantFiled: November 6, 2009Date of Patent: August 9, 2011Assignee: Mformation Technologies, Inc.Inventors: Badri Nath, Rakesh Kushwaha, Mark Edwards
-
Patent number: 7992199Abstract: A communications scheme enables a central communications station to assist two communications systems located behind firewalls that prevent communication initiated from an external data network to establish direct communication with each other. In one embodiment, the systems separately establish communications with the central communications station and obtain from it the connection information (e.g., IP address, port, etc.) of the other. The systems then directly communicate with each other using the obtained connection information while pretending to be the central communications station. In another embodiment in which the firewalls include NAT devices that implement network address translation, the systems exchange connection information for establishing a new connection through the central communications station and then complete a three-way handshake with the assistance of the central communications station, thereby allowing the central communications station to remove itself from the communication.Type: GrantFiled: December 31, 2003Date of Patent: August 2, 2011Assignee: Honeywell International Inc.Inventors: Steven J. Winick, William R. Blum, Piotr Romanczyk
-
Patent number: 7984485Abstract: Aspects of the present invention may be seen in a method and system for the ingestion of update package containers (or other types of containers, in general) into a distribution network. In an embodiment of the present invention, update package containers (UPC) from several different sources may be transferred into a distribution network such as a carrier network via a standardized SOAP interface. A logical repository may be assumed to exist in the distribution network. A standardized interface to such a logical repository may facilitate the integration of ingestion methods from several software originators into such a distribution network.Type: GrantFiled: January 31, 2005Date of Patent: July 19, 2011Assignee: Hewlett-Packard Development Company, L.P.Inventors: Bindu R. Rao, Vivek Kapadekar
-
Patent number: 7965846Abstract: When an SIP interface unit of a server apparatus receives an SIP message for call connection from a client apparatus and an SIP message analyzing unit can confirm that the SIP message is normal, a call controller recognizes that an RTP communication is carried out between the client apparatus and another client apparatus and instructs an encrypting capability management unit to determine RTP encrypting information which is used between the client apparatuses. The encrypting capability management unit determines the RTP encrypting information between these client apparatuses based on the instruction. With this arrangement, there can be provided a client-server distributed system that can realize an encrypting security function without requiring a certificate authentification function at a low cost in order to deliver an encrypting key as well as without necessity of holding or managing a certificate and preparing an authenticating server in a system.Type: GrantFiled: July 23, 2007Date of Patent: June 21, 2011Assignee: NEC Infrontia CorporationInventors: Mao Masuhiro, Yasuhiro Watanabe
-
Patent number: 7958544Abstract: A computer-implemented method of assisting in establishing a secure communication is disclosed. The method includes obtaining an encryption key that is shared with a credentialing device, receiving from a client device an encrypted session identifier that encodes a password, decrypting the session identifier with the key to extract the password, and authenticating a communication session for the device using a challenge-response protocol.Type: GrantFiled: July 23, 2007Date of Patent: June 7, 2011Assignee: Google Inc.Inventors: Kai Chen, Marius C. Milner, Shioupyn Shen, Tsuwei Chen
-
Patent number: 7950050Abstract: An authentication system includes: a first information processor; a second information processor; an authentication-service-providing device; and an authentication device, wherein the authentication-service-providing device has: an unit that receives second authentication information for authenticating a user from the second information processor and executes a second authentication based on the second authentication information; and an unit that issues third authentication information to the second information processor when the second authentication is successful; and the authentication device has: an unit that receives first authentication information for authenticating the user from the first information processor and executes a first authentication based on the first authentication information; and an unit that receives, from the first information processor, third authentication information obtained by the second information processor and input to the first information processor and cooperates with the aType: GrantFiled: May 22, 2007Date of Patent: May 24, 2011Assignee: Fuji Xerox Co., Ltd.Inventors: Takeo Yoshida, Ryuichi Aoki
-
Patent number: 7949879Abstract: Secure password entry is facilitated by displaying a password prompt comprising a changing stream of random characters, where a particular character within the stream of random characters is displayed at a visibly detectable higher frequency. A user selects a password character by entering input to increment or decrement the particular high frequency character to reach the password character, such that any unauthorized keystroke logging to detect said password is ineffective. Once the user reaches the password character, the user provides another input indicating a selection of the current high frequency character as the password character. Once the user has selected all the characters of the password, the user enters an input indicating the password is complete and the password entry controller then passes the password to the calling layer.Type: GrantFiled: April 22, 2009Date of Patent: May 24, 2011Assignee: International Business Machines CorporationInventor: Amos P Waterland
-
Patent number: 7941837Abstract: Techniques are described to enable two or more layer two (L2) firewall devices to be configured as a high availability (HA) cluster in an active-active configuration. A first layer two (L2) firewall and a second L2 firewall are positioned within the same L2 network. The first L2 firewall and the second L2 firewall are concurrently configured with active virtual security devices (VSDs) within the L2 network, and concurrently apply L2 firewall services to packets within the L2 network. A VSD of one of the L2 firewalls automatically switches to an active VSD status for a VSD group in place of a VSD of another L2 firewall when the other L2 firewall fails.Type: GrantFiled: May 22, 2007Date of Patent: May 10, 2011Assignee: Juniper Networks, Inc.Inventors: Dongyi Jiang, Chih-Wei Chao, Rakesh Nair, Daniel Hirschberg
-
Patent number: 7941832Abstract: At startup, divided data blocks are received from other authentication devices and are assembled together with the local divided data block to reconstitute first authentication data. After a prescribed time interval, divided data blocks are again received from other authentication devices and are assembled together with the local divided data block to reconstitute second authentication data.Type: GrantFiled: May 18, 2007Date of Patent: May 10, 2011Assignee: Hitachi-Omron Terminal Solutions, Corp.Inventors: Tatsumi Tsutsui, Mitsutoshi Himaga, Tsukasa Yasue
-
Patent number: 7925023Abstract: One embodiment of the present invention provides a system for managing keys. During operation, the system authenticates a client at a key manager. Next, the system receives a token from the client at the key manager, wherein the token is associated with a customer key, and includes a token authenticator. This token authenticator comprises one-half of an authenticator pair which is used to determine if the client is the owner of the customer key. Next, the system decrypts the token using a master key. The system then verifies a client authenticator, which comprises the other half of the authenticator pair which is used to determine if the client is the owner of the customer key. If the client is the owner of the customer key, the system sends the customer key to the client, which enables the client to encrypt/decrypt data. Finally, the client deletes the customer key.Type: GrantFiled: March 3, 2006Date of Patent: April 12, 2011Assignee: Oracle International CorporationInventors: Paul Youn, Daniel ManHung Wong, Min-Hank Ho, Chon Hei Lei
-
Patent number: 7908484Abstract: Disclosed is a method and system to discourage a MITM attacker in a data communications system that includes client and a server. The method includes, in a Digest Authentication and Key Agreement (AKA) challenge sent to the client from the server, setting an “algorithm” field to ‘algorithm=“AKAv1-HMAC-MD5”’ for directing the client to use the HMAC-MD5 keyed hash function when producing Digest credentials; and using at least one of an AKA Integrity Key (IK) or an AKA Cipher Key (CK) in the keyed hash function.Type: GrantFiled: August 18, 2004Date of Patent: March 15, 2011Assignee: Nokia CorporationInventors: Tao Haukka, Aki Niemi
-
Patent number: 7904712Abstract: A technique is disclosed that allows different computers in a network to create an identifier that uniquely identifies the network. The technique allows the unique identifier to be consistently created over time, regardless of the particular make up of the computing devices in the network at any particular point time. In some implementation, a computer within the network hosts the identification creation tool. In order to create a unique identifier for the network, the tool identifies each network adapter used by the host computer. Using this information, the tool identifies a gateway device used by the network adapter or adapters, and then determines the physical network address of that gateway device. For example, if the network is an Ethernet network, the tool will determine the medial access control (MAC) address for the gateway device. The tool then creates a unique identifier for the network based upon the physical address.Type: GrantFiled: August 10, 2004Date of Patent: March 8, 2011Assignee: Cisco Technology, Inc.Inventors: Steve M. Bush, Dan R. Kerns, Thomas C. Butcher, Harry J. Heymann, Roxanne C. Skelly
-
Patent number: 7895642Abstract: A system, a method and computer-readable media for supporting multiple security tiers in a network. A system is provided that includes an access terminal. The access terminal includes multiple virtual machines, which are each associated with a different security profile. The system further includes an access network that validates the virtual machines. The access network also assigns security procedures for use with the various virtual machines by referencing their associated security profiles. The system further includes a core network. The core network also enforces the various security profiles, and references the profiles in the selection of services used in the handling of communications from the virtual machines.Type: GrantFiled: May 22, 2007Date of Patent: February 22, 2011Assignee: Sprint Communications Company L.P.Inventors: John Nathan Larson, Mark Evans, Travis Edward Dawson
-
Patent number: 7895435Abstract: A computer implemented method, computer program product, and system for managing objects. Responsive to receiving a find-rule method, and a path-rule table, wherein the path-rule table contains a set of paths, wherein each path references an object, wherein a file system locates the object using the path, and wherein the object has at least one attribute not known to the file system, a path-rule table identifier is created. The path-rule table is associated with the path-rule table identifier to form an associated path-rule table. The find-rule method is associated with the path-rule table identifier to form an associated find-rule method. The path-rule table identifier, the associated path-rule table, and the associated find-rule method are stored. The path-rule table identifier is returned.Type: GrantFiled: May 21, 2007Date of Patent: February 22, 2011Assignee: International Business Machines CorporationInventors: Saurabh Desai, Niteesh Kumar Dubey, Joefon Jann, Pratap Chandra Pattnaik, Ravi A. Shankar, Murali Vaddagiri
-
Patent number: 7876895Abstract: A unified broadcast encryption system divides a media key tree into S subtrees, divides digital content into segments, and converts some of the segments into variations; the number of segments and variations is q. The system subdivides each of the subtrees into q/|S| subdivided subtrees, assigns a key media variant to each of the subdivided subtrees, and generates a unified media key block (MKBu). The system decrypts digital content by obtaining required key media variants from the MKBu, using the key media variant to find an entry in a variant key table, decrypt a title key, and locate a variant number from the variant key table. The system uses the variant number to identify which of the variations may be decrypted by the title key and uses the title key to decrypt segments and variations.Type: GrantFiled: May 9, 2007Date of Patent: January 25, 2011Assignee: International Business Machines CorporationInventors: Hongxia Jin, Jeffrey Bruce Lotspiech
-
Patent number: 7873984Abstract: A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fiber Channel fabric. The network configuration device may control many functions. Foremost, it may control the recognition, operation and succession procedure for network configuration entities. It may also control user configurable options for the network, rules for interaction between other entities in the network, rules governing management-level access to the network, and rules governing management-level access to individual devices in the network. In addition, the network configuration entity may exploit policy sets to implement its control.Type: GrantFiled: January 31, 2002Date of Patent: January 18, 2011Assignee: Brocade Communications Systems, Inc.Inventors: Richard L. Hammons, James Kleinsteiber, Hung Nguyen, Shankar Balasubramanian, Vidya Renganarayanan