Patents Examined by Courtney Fields
-
Patent number: 9282490Abstract: A method, an apparatus, and a system for solving and managing security problems, which may occur during a handover of a User Equipment (UE) between PLMNs in a mobile communication network, by using a Non-Access Stratum (NAS) protocol are provided. By the method, a UE can perform a security mode command and an authentication with a network. Further, the method can prevent interruption of communication due to authentication or security during a handover of a UE between Public Land Mobile Networks (PLMNs).Type: GrantFiled: October 6, 2015Date of Patent: March 8, 2016Assignee: Samsung Electronics Co., Ltd.Inventors: Kyung-Joo Suh, Chae-Gwon Lim
-
Patent number: 9277463Abstract: A method, an apparatus, and a system for solving and managing security problems, which may occur during a handover of a User Equipment (UE) between PLMNs in a mobile communication network, by using a Non-Access Stratum (NAS) protocol are provided. By the method, a UE can perform a security mode command and an authentication with a network. Further, the method can prevent interruption of communication due to authentication or security during a handover of a UE between Public Land Mobile Networks (PLMNs).Type: GrantFiled: October 6, 2015Date of Patent: March 1, 2016Assignee: Samsung Electronics Co., Ltd.Inventors: Kyung-Joo Suh, Chae-Gwon Lim
-
Patent number: 9276754Abstract: A material set, such as an asymmetric keypair, is processed using an associated workflow to prepare the material set for activation and/or use. In one embodiment, a material set is generated and information about the material set is communicated to a workflow manager. Based at least on the information, the workflow manager generates a workflow that when accomplished will allow the material set to be activated and/or used. In another embodiment, a service provider provides a key manager, workflow manager and destination for the key, such as a load balancer that terminates SSL connections. A key can be generated by the key manager, sent through the workflow manager for processing (potentially communicated to third parties such as a certificate authority, if needed) and installed at a destination.Type: GrantFiled: December 8, 2014Date of Patent: March 1, 2016Assignee: Amazon Technologies, Inc.Inventors: Graeme D. Baer, David M. Hulme, Benjamin E. Seidenberg
-
Patent number: 9271200Abstract: A method, an apparatus, and a system for solving and managing security problems, which may occur during a handover of a User Equipment (UE) between PLMNs in a mobile communication network, by using a Non-Access Stratum (NAS) protocol are provided. By the method, a UE can perform a security mode command and an authentication with a network. Further, the method can prevent interruption of communication due to authentication or security during a handover of a UE between Public Land Mobile Networks (PLMNs).Type: GrantFiled: September 3, 2015Date of Patent: February 23, 2016Assignee: Samsung Electronics Co., Ltd.Inventors: Kyung-Joo Suh, Chae-Gwon Lim
-
Patent number: 9271201Abstract: A method, an apparatus, and a system for solving and managing security problems, which may occur during a handover of a User Equipment (UE) between PLMNs in a mobile communication network, by using a Non-Access Stratum (NAS) protocol are provided. By the method, a UE can perform a security mode command and an authentication with a network. Further, the method can prevent interruption of communication due to authentication or security during a handover of a UE between Public Land Mobile Networks (PLMNs).Type: GrantFiled: October 6, 2015Date of Patent: February 23, 2016Assignee: Samsung Electronics Co., Ltd.Inventors: Kyung-Joo Suh, Chae-Gwon Lim
-
Patent number: 9270647Abstract: In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define one or more objects and one or more operations that are based, at least in part, on the one or more objects; generating, in memory, one or more data structures that correspond to the one or more objects; performing the one or more operations on the one or more data structures; updating the one or more data structures, in response to performing the one or more operations, to produce one or more updated data structures; rendering a second set of instructions, which when executed by a remote client computer cause the remote client computer to generate the updated data structures in memory on the remote client computer, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the remote client computer.Type: GrantFiled: December 6, 2013Date of Patent: February 23, 2016Assignee: Shape Security, Inc.Inventor: Justin Call
-
Patent number: 9264949Abstract: A method, an apparatus, and a system for solving and managing security problems, which may occur during a handover of a User Equipment (UE) between PLMNs in a mobile communication network, by using a Non-Access Stratum (NAS) protocol are provided. By the method, a UE can perform a security mode command and an authentication with a network. Further, the method can prevent interruption of communication due to authentication or security during a handover of a UE between Public Land Mobile Networks (PLMNs).Type: GrantFiled: October 6, 2015Date of Patent: February 16, 2016Assignee: Samsung Electronics Co., Ltd.Inventors: Kyung-Joo Suh, Chae-Gwon Lim
-
Patent number: 9262256Abstract: Dark-bit masking technologies for physically unclonable function (PUF) components are described. A computing system includes a processor core and a secure key manager component coupled to the processor core. The secure key manager includes the PUF component, and a dark-bit masking circuit coupled to the PUF component. The dark-bit masking circuit is to measure a PUF value of the PUF component multiple times during a dark-bit window to detect whether the PUF value of the PUF component is a dark bit. The dark bit indicates that the PUF value of the PUF component is unstable during the dark-bit window. The dark-bit masking circuit is to output the PUF value as an output PUF bit of the PUF component when the PUF value is not the dark bit and set the output PUF bit to be a specified value when the PUF value of the PUF component is the dark bit.Type: GrantFiled: December 24, 2013Date of Patent: February 16, 2016Assignee: Intel CorporationInventors: Sanu K. Mathew, Sudhir K. Satpathy, Patrick Koeberl, Jiangtao Li, Ram K. Krishnamurthy, Anand Rajan
-
Patent number: 9258712Abstract: Example method, apparatus, and computer program product embodiments are disclosed to improve user experience and security in sharing wireless network configurations. An embodiment comprises reading, by a guest wireless device, data from a machine readable medium, including accessing information, to enable the guest device to obtain credentials from an access rights server, to access an access point or network, based on the accessing information; transmitting by the guest device, a wireless message to the access rights server, requesting credentials to enable accessing the access point or network, the request including the accessing information addressing a storage partition in a database associated with the access rights server, the storage partition being accessible with the accessing information; and receiving by the guest device from the access rights server, the credentials to enable the guest device to gain access to the access point or network by using the credentials.Type: GrantFiled: September 4, 2012Date of Patent: February 9, 2016Assignee: Nokia Technologies OyInventors: Niko Kiukkonen, Janne Marin, Jukka Reunamäki
-
Patent number: 9235697Abstract: Protecting the security of an entity by using passcodes is disclosed. A user's passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator. In these embodiments, there are asymmetric secrets stored on the passcode device and by the administrator. This adds more security so that if the backend servers are breached, the adversary cannot generate valid passcodes. In some embodiments, the passcode depends on the rounded time.Type: GrantFiled: March 5, 2013Date of Patent: January 12, 2016Assignee: Biogy, Inc.Inventor: Michael Stephen Fiske
-
Patent number: 9231763Abstract: A system and method for providing secure communications between remote computing devices and servers. A network device sends characteristics of a client computing device over the network. A network device receives characteristics of a client computing device over the network. A plurality of credentials are generated where at least one of the plurality of credentials based on both the received characteristics of the client computing device and a unique client key, and at least one of the plurality of credentials based on both the received characteristics of the client computing device and a generic key. A network device sends the plurality of credentials over the network. A network device receives the plurality of credentials via the network.Type: GrantFiled: August 23, 2010Date of Patent: January 5, 2016Assignee: QUALCOMM IncorporatedInventors: Laurence Lundblade, Ivan Hugh McLean, Gerald Charles Horel
-
Patent number: 9225982Abstract: The present invention discloses an encoding apparatus using a Discrete Cosine Transform (DCT) scanning, which includes a mode selection means for selecting an optimal mode for intra prediction; an intra prediction means for performing intra prediction onto video inputted based on the mode selected in the mode selection means; a DCT and quantization means for performing DCT and quantization onto residual coefficients of a block outputted from the intra prediction means; and an entropy encoding means for performing entropy encoding onto DCT coefficients acquired from the DCT and quantization by using a scanning mode decided based on pixel similarity of the residual coefficients.Type: GrantFiled: August 23, 2013Date of Patent: December 29, 2015Assignees: Electronics and Telecommunications Research Institute, Kwangwoon University Research Insitute of Industry Cooperation, Industry-Academia Cooperation Group of Sejong UniversityInventors: Se-Yoon Jeong, Hae-Chul Choi, Jeong-Il Seo, Seung-Kwon Beack, In-Seon Jang, Jae-Gon Kim, Kyung-Ae Moon, Dae-Young Jang, Jin-Woo Hong, Jin-Woong Kim, Yung-Lyul Lee, Dong-Gyu Sim, Seoung-Jun Oh, Chang-Beom Ahn, Dae-Yeon Kim, Dong-Kyun Kim
-
Patent number: 9223964Abstract: By injecting bytecode into a predetermined method of a sandbox environment, an application that uses an exploit to attempt to escape from the sandbox environment may be detected without knowledge of the application or the exploit used to attempt to escape from the sandbox environment. Upon indicating that the application has escaped the sandbox, the application may be terminated or the escape may be reported, allowing further monitoring of the application.Type: GrantFiled: December 5, 2013Date of Patent: December 29, 2015Inventors: Bing Sun, Xiaobo Chen, Chong Xu, Hirosh Joseph
-
Patent number: 9213653Abstract: Systems and methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in memory. In addition, a determination may be made as to whether the unencrypted data includes a random distribution of the plurality of bits. An integrity action may be implemented, for example, when the unencrypted data includes a random distribution of the plurality of bits.Type: GrantFiled: December 5, 2013Date of Patent: December 15, 2015Assignee: Intel CorporationInventors: David M. Durham, Men Long
-
Patent number: 9203853Abstract: Some embodiments of cloud-based gateway security scanning have been presented. In one embodiment, some data packets are received sequentially at a gateway device. The data packets constitute at least a part of a file being addressed to a client machine coupled to the gateway device. The gateway device forwards an identification of the file to a remote datacenter in parallel with forwarding the data packets to the client machine. The datacenter performs signature matching on the identification and returns a result of the signature matching to the gateway device. The gateway device determining whether to block the file from the client machine based on the result of the signature matching from the datacenter.Type: GrantFiled: June 27, 2014Date of Patent: December 1, 2015Assignee: Dell Software Inc.Inventors: Aleksandr Dubrovsky, Senthilkumar G. Cheetancheri, Boris Yanovsky
-
Patent number: 9203847Abstract: Concepts and technologies disclosed herein are for detecting and managing unauthorized use of cloud computing services from within an internal network of a business or other organization. A computer system may be configured to identify a plurality of Web resources that have been accessed by computing devices from within the internal network. The computer system may also be configured to obtain Internet protocol (“IP”) information from a network component of the internal network. The IP information may be used to determine whether each of the plurality of Web resources is a cloud computing service resource. The computer system may also be configured to block access to a cloud computing service resource of the plurality of Web resources upon determining that the IP information identifies the cloud computing service resource as being unauthorized.Type: GrantFiled: June 26, 2012Date of Patent: December 1, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Flemming Elleboe, Luis Francisco Albisu, Joseph Bentfield, Janet Kerns, Jonathan Sheriffs
-
Patent number: 9183400Abstract: According to one embodiment, an IC card includes a communication unit, data memory, selector, and inheriting unit. The communication unit performs data communication with an external apparatus. The data memory stores files managed by a hierarchical. structure, a folder as an upper layer of the files, and information concerning the inheritance of a security status between a plurality of folders. If information indicating the inheritance of a security status from the first folder to the second folder exists, the inheriting unit inherits, even while the second file is selected, the security status established while the first folder is selected.Type: GrantFiled: March 12, 2013Date of Patent: November 10, 2015Assignee: KABUSHIKI KAISHA TOSHIBAInventor: Aki Fukuda
-
Patent number: 9172480Abstract: The invention relates to a method for the radio-frequency communication of data, in which the receiving of and/or access to said data is controlled by control means, including an electronic microcircuit, on the basis of access rights. The transmitted data includes time information, and the access rights are controlled on the basis of said time information. The invention also relates to a device for controlling access rights as well as to a radio-frequency receiving device including same.Type: GrantFiled: October 22, 2010Date of Patent: October 27, 2015Assignee: GEMALTO SAInventors: Pascal Leroy, Joseph Leibenguth
-
Patent number: 9152578Abstract: A technique secures data in cloud storage. The technique involves receiving, by processing circuitry, an input/output (I/O) request which includes host data. The technique further involves encrypting, by the processing circuitry, the host data to form encrypted data and sending a block-based write transaction which includes the encrypted data to a replication storage array to store the encrypted data within the replication storage array. The technique further involves storing, by the processing circuitry, the host data within the production storage array. The encrypted host data is stored within the replication storage array to secure the host data which is also stored at the production storage array.Type: GrantFiled: March 12, 2013Date of Patent: October 6, 2015Assignee: EMC CorporationInventors: Yossi Saad, Assaf Natanzon, Yedidya Dotan
-
Patent number: 9148414Abstract: Customers accessing resources or services in a multi-tenant environment can obtain assurance that a provider of that environment will honor only requests associated with the customer and will reject any requests that might have been tampered with or otherwise falsely generated. Various endpoints or interfaces can be used, which can be located in the multi-tenant environment, in a customer environment, or in a separate location. These endpoints or interfaces can sign unsigned requests, or otherwise increase the credentials of a signed request, on behalf of a customer. In some embodiments, additional metadata can be added that can increase the authentication level of the requests. Such an approach can enable a customer to provide or delegate access to the resources without exposing the credentials outside a secure environment.Type: GrantFiled: November 14, 2012Date of Patent: September 29, 2015Assignee: Amazon Technologies, Inc.Inventors: Gregory Branchek Roth, Benjamin E. Seidenberg