Patents Examined by Carolyn B Kosowski
  • Patent number: 8793495
    Abstract: A method for authenticating a portable data carrier (10) to a terminal device employs a public key (PKG) and a secret key (SK1) of the data carrier (10) as well as a public session key (PKT) and a secret session key (SKT) of the terminal device. The data carrier (10) employs as a public key a public group key (PKG). As a secret key the data carrier (10) employs a key (SK1) that has been derived from a secret group key (SKG) associated with the public group key (PKG).
    Type: Grant
    Filed: August 19, 2011
    Date of Patent: July 29, 2014
    Assignee: Giesecke & Devrient GmbH
    Inventor: Gisela Meister
  • Patent number: 8788576
    Abstract: Systems and methods for transfer of data including establishing two separate connections, the two separate connections including a high speed connection and a high integrity connection. Blocks of data are exchanged over the high speed connection while the high integrity connection facilitates communication of descriptor data regarding data received over the high speed connection. As such, the data transfer speed of the high speed connection is utilized while communication via the high integrity connection allows for data reliability features not provided by the high speed connection. The systems and methods may include receiver side data handling such that data received chronologically out of order may be ordered at the receiver.
    Type: Grant
    Filed: September 27, 2010
    Date of Patent: July 22, 2014
    Assignee: Z124
    Inventor: Octavian Chincisan
  • Patent number: 8789205
    Abstract: A role-based Graphical User Interface (GUI) may be provided. First, information associated with an application user may be received. A role associated the application user may be then determined. The role may then be analyzed to determine which application elements are permitted to the user and which application elements are restricted from the application user. Next, the permitted application elements may be loaded with permissible GUI elements visible and restricted GUI elements hidden. The permissible GUI elements may be associated with the application elements permitted to the application user, while the restricted GUI elements may be associated with the application elements restricted from the user.
    Type: Grant
    Filed: April 21, 2010
    Date of Patent: July 22, 2014
    Assignee: Microsoft Corporation
    Inventors: Sanjay H. Ramaswamy, Yun-Rui SiMa, Yingtao Dong
  • Patent number: 8774405
    Abstract: The invention relates to a value-added service applied to the broadcasting of video programs or content and more particularly to mobile television (Mobile TV). The invention promotes service continuity during the broadcasting of programs having an undefined duration and the broadcasting of which has been subject to a Pay-Per-View type purchase.
    Type: Grant
    Filed: December 4, 2008
    Date of Patent: July 8, 2014
    Assignee: Gemalto SA
    Inventor: Anne-Marie Praden
  • Patent number: 8769069
    Abstract: A data collection apparatus includes an information storing unit which stores application information collected from a server providing a service by running an application and includes detail information indicating a detail of the application, an information collecting unit which collects the application information from the server, an information identifying unit which identifies application information in which an abnormality has occurred and application information, affected by the abnormality, a first comparing unit which compares, as to the application information identified by the information identifying unit, all application information including the detail information and all application information including the detail information collected in the previous point, and extracts application information different from the application information collected in a previous point, and an information sending unit which sends the application information, extracted by the first comparing unit, to a data manageme
    Type: Grant
    Filed: September 28, 2010
    Date of Patent: July 1, 2014
    Assignee: Fujitsu Limited
    Inventors: Kazuyuki Sakai, Yasushi Kobayashi, Yuuki Tada, Tomoyuki Kobayashi
  • Patent number: 8769622
    Abstract: An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Messaoud Benantar, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 8767954
    Abstract: A cryptographic framework embodies modular methods for securing data, both at rest and in motion, via an extensible encryption method. Key derivation and synchronization methods are defined. Using a small set of initialization values (keys), a multi-dimensional geometric form from which two or more entities (participants) may derive the same discrete set of public and secret keys. Participants can initialize a random number generation method of practically infinite non-repeating length. Furthermore, the random number generator can be used as a One Time Pad synchronized between participants, without ever exchanging said One Time Pad. Furthermore, a method for ciphering and deciphering data including a method for splitting the encrypted data into multiple files or streams and for recombining the original data back.
    Type: Grant
    Filed: December 1, 2011
    Date of Patent: July 1, 2014
    Assignee: Colloid, LLC
    Inventor: Joseph P. Chiarella
  • Patent number: 8745361
    Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.
    Type: Grant
    Filed: December 2, 2008
    Date of Patent: June 3, 2014
    Assignee: Microsoft Corporation
    Inventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
  • Patent number: 8738931
    Abstract: A semantics engine is described that produces a semantically-impaired but equivalent version of the original source code that can be compiled and executed using conventional tools for commonly used programming languages. This semantically-impaired source code and the compiled assemblies it produces are incomprehensible to anyone who would attempt to read them. The semantics-impairing process is irreversible both at the source and the assembly levels and the machine code generated by the semantically-impaired source code is exactly the same as that produced by the original source code. The semantics engine achieves confidentiality without using encryption or compression. All protective modifications are made directly to copies of the original source code thereby introducing no intermediate forms of the code.
    Type: Grant
    Filed: October 21, 2013
    Date of Patent: May 27, 2014
    Inventor: Conley Jack Funk
  • Patent number: 8732829
    Abstract: In certain embodiments, a method for monitoring and securing a baseboard management processor is provided. The method includes coupling to a baseboard management controller of a computer system via a console port, maintaining a persistent connection to the baseboard management controller, monitoring data from the console port, determining from the data whether an unauthorized access has occurred, and sending an alert if the unauthorized access has occurred.
    Type: Grant
    Filed: April 14, 2008
    Date of Patent: May 20, 2014
    Assignee: TDI Technologies, Inc.
    Inventors: William D. Johnson, Darel R. Stokes, Barry L. Moore
  • Patent number: 8732798
    Abstract: To reduce automatically a number of enabled connection profiles in a mobile station, for example, while the number of enabled connection profiles is at its maximum, a mobile station automatically selects one of the existing enabled connection profiles to disable and automatically disables the auto-selected connection profile.
    Type: Grant
    Filed: August 3, 2011
    Date of Patent: May 20, 2014
    Assignee: BlackBerry Limited
    Inventors: Ethan Kwang-Soo Kim, Andrey Leonov
  • Patent number: 8726358
    Abstract: Systems, computer-implemented methods, and computer-readable media for establishing an online account with a resource provider are provided. An authentication token including identification of a user from an authentication server is received. The identification of the user from the authentication token is utilized to establish an online account for the user with the resource provider. Additional credentialing information from the user for the online account is received. The additional information received from the user is associated with the online account for the user with the resource provider.
    Type: Grant
    Filed: April 14, 2008
    Date of Patent: May 13, 2014
    Assignee: Microsoft Corporation
    Inventors: Yordan I. Rouskov, Tore Sundelin, Mrigankka Fotedar, Sarah Faulkner, Pui-Yin Winfred Wong, Wei-Quiang Michael Guo, Lynn Ayres
  • Patent number: 8719586
    Abstract: This disclosure describes systems and associated processes that provide digital rights management for applications. In some embodiments, these system and processes couple DRM protection with individual applications, rather than with a centralized service. For instance, these systems and processes can be implemented in the context of an application store or distribution service that distributes applications for purchase or for free to user devices. Developers can submit applications to the application distribution service for distribution to end users. In response to receiving an application from a developer, the application distribution service can modify the application to include DRM features. The application distribution service can accomplish this modification without input from or the knowledge of the developer. The DRM features included in the modified application can prevent or otherwise reduce copying or modifying of the application.
    Type: Grant
    Filed: March 9, 2011
    Date of Patent: May 6, 2014
    Assignee: Amazon Technologies, Inc.
    Inventors: Ameesh Paleja, Yael Peled, Mekka C. Okereke, Timothy E. Finer
  • Patent number: 8701171
    Abstract: An information processing apparatus includes an authentication unit configured to identify a user who uses a data processing apparatus, a storage unit configured to store user identification information for identifying the user who is identified by the authentication unit and is identified as not having ended using the data processing apparatus, and an acquisition unit configured to, in accordance with the user identification information stored in the storage unit, acquire from the data processing apparatus information about using of the data processing apparatus by the user identified with the user identification information that has not been acquired during the state in which communication with the data processing apparatus is unavailable.
    Type: Grant
    Filed: July 27, 2007
    Date of Patent: April 15, 2014
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kei Sato
  • Patent number: 8661527
    Abstract: According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (NKey) that is hidden, includes a memory configured to store second key information (HKey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to generate a session key (SKey) by using the second key information (HKey) and the random number information. The authenticator is configured such that the second key information (HKey) is generated from the first key information (NKey) but the first key information (NKey) is not generated from the second key information (HKey).
    Type: Grant
    Filed: June 1, 2012
    Date of Patent: February 25, 2014
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Taku Kato, Tatsuyuki Matsushita, Yuji Nagai, Fangming Zhao
  • Patent number: 8645396
    Abstract: Methods, computer program products and systems are described for online-content management. Online content from multiple contributors is received at one or more first computers for public online display. An authentication score is determined for a contributor of the multiple contributors. The contributor's name and a representation of the contributor's authentication score is published online for display on one or more second computers in association with the online content received from the contributor.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: February 4, 2014
    Assignee: Google Inc.
    Inventors: Michael David McNally, Nathan Stoll, Scott Barta, Krishna Bharat, Ming Lei, Justin Lawyer
  • Patent number: 8625780
    Abstract: A cryptography device which reduces side channel information including a first computing block adapted to either encrypt or decrypt received first input data and to output the encrypted or decrypted first input data as first output data at a first data output, a second computing block adapted to either encrypt or decrypt received second input data and to output the encrypted or decrypted second input data as second output data at a second data output, and a control unit connected to the first and second computing blocks and adapted in a first operating condition on the one hand to partially or completely assign the first output data to the first computing block as the first input data and on the other hand to completely or partially assign the first output data to the second computing block as part of the second input data.
    Type: Grant
    Filed: February 8, 2008
    Date of Patent: January 7, 2014
    Assignee: IHP GmbH—Innovations for High Performance, Microelectronics
    Inventors: Steffen Peter, Michael Methfessel, Peter Langendorfer, Frank Vater
  • Patent number: 8621237
    Abstract: A technique protects source code and is performed in an electronic device. The technique involves performing, on the source code, a scanning operation which provides a scanning result indicating whether the source code includes a cryptographic key. The technique further involves performing a remedial operation (e.g., alerting an administrator, deleting the key, replacing the key, combinations thereof, etc.) to prevent undesired exposure of the cryptographic key when the scanning result indicates that the source code includes a cryptographic key. The technique further involves refraining from performing the remedial operation when the scanning result indicates that the source code does not include a cryptographic key.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: December 31, 2013
    Assignee: EMC Corporation
    Inventors: Daniel V. Bailey, Aaron Katz, Craig R. Paradis, Robert D. Hopley
  • Patent number: 8621575
    Abstract: Methods of securely performing online transactions are described which involve two independently controlled web servers. In order to complete a transaction, a user interacts concurrently with each of the two web servers and authentication may occur between the user and each web server and between web servers. Each of the two web servers provide data which is used to complete the transaction and the data provided by the first web server is communicated directly to the second web server for use in the transaction. In an embodiment, the first web server provides a web page which enables a user to specify a variable which is used in the transaction. This is communicated to the second web server which processes the transaction along with an identifier for the message. The identifier may be used in validating the variable before it is used in processing the transaction. Following completion of a transaction this may be reported in real time to the first web server.
    Type: Grant
    Filed: April 24, 2009
    Date of Patent: December 31, 2013
    Assignee: Ice Organisation Ltd
    Inventors: Nick Wiseman, Paul Reeves, Kumar Duwari, Colin Franks, George Launchbury, Jayne Lee, Jude Thorne, Jacek Stawicki
  • Patent number: 8621570
    Abstract: When setting up communication from a user equipment UE (1), such as for providing IP access for the UE in order to allow it to use some service, information or an indication or at least one network properly relating to a first network, e.g. the current access network (3, 3?), is sent to the UE from a node (13) in a sue and network such as the home network (5) of the subscriber ask UE. The information or indication can be sent in a first stage of an authentication procedure being part of the setting up of a connection from the UE. In particular, the network property can indicate whether the access network (3, 3?) is trusted or not.
    Type: Grant
    Filed: November 5, 2008
    Date of Patent: December 31, 2013
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Mats Naslund, Jari Arkko, Rolf Blom, Vesa Lehtovirta, Karl Norrman, Stefan Rommer, Bengt Sahlin