Patents Examined by Don Zhao
-
Patent number: 9418211Abstract: According to one embodiment, an electronic device includes a content transmitter. The content transmitter is configured to output a content item including first data and second data to one transmission path, by applying a first copyright protection system to copyright protection of the first data and applying a second copyright protection system to copyright protection of the second data. The first copyright protection system involves encryption of data to be copyright-protected. The second copyright protection system involves no encryption of data to be copyright-protected.Type: GrantFiled: September 17, 2015Date of Patent: August 16, 2016Assignee: KABUSHIKI KAISHA TOSHIBAInventors: Noriyuki Hirayama, Takashi Kokubo
-
Patent number: 9407436Abstract: An immobilizer ECU generates an encryption key using key generating logic, from a SEED code included in an ID code signal sent from an electronic key, and registers the encryption key to the immobilizer ECU. The immobilizer ECU receives an instruction from a registration and deletion tool and sends, to the electronic key, a deletion request signal that requests the deletion of the SEED code. The electronic key deletes the SEED code from the electronic key if a deletion request signal has been received.Type: GrantFiled: January 18, 2013Date of Patent: August 2, 2016Assignee: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHOInventors: Daisuke Kawamura, Hideki Kawai, Tetsuya Egawa, Hiroaki Iwashita, Toshihiro Nagae, Takeo Endo
-
Patent number: 9405932Abstract: One or more techniques and/or systems are provided for dynamically maintaining user centric data. For example, a data provider app may have knowledge about user centric data associated with a user (e.g., a social network app may have contact information for a social network friend of the user). A user centric profile may be defined for the user centric data based upon information provided by the data provider app (e.g., a contact card may be generated for the social network friend). Responsive to receiving a request for the user centric profile from a requestor app (e.g., an event planning app), the user centric profile may be exposed to the user but not to the requestor app for security and/or privacy purposes. For example, an operating system may present at least some of the user centric profile within an operating system user interface.Type: GrantFiled: May 24, 2013Date of Patent: August 2, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Jacob Andrew Sabulsky, Christopher Scott Dickens, Zainab Hakim, Harris Syed, Axel Andrejs, John Saxon Morrow, Ranjib Singh Badh, Sarjana Sheth, Sermet Iskin, Manoj Kumar Biswas, Sashi Raghupathy, Jayaraman Kalyana Sundaram
-
Patent number: 9407611Abstract: Provided is a management server system that accepts a transition instruction for transition between tenants of an agent device, generates symmetric keys consisting of a first key and a second key, responds the second key to the agent device, and verifies signature information included in a transition request using the first key when the agent device makes a tenant transition request. Upon successful verification of signature information, the management server system transmits new authentication information for communication between the management server system and the agent device to the agent device. After transition of the tenant, the agent device communicates with the management server system using the new authentication information.Type: GrantFiled: September 19, 2014Date of Patent: August 2, 2016Assignee: CANON KABUSHIKI KAISHAInventor: Kazunori Kato
-
Patent number: 9405930Abstract: A system for managing personal information of a user includes: a personal information database including personal information records of the user including data associated with the user, wherein a user is associated with a data policy including at least one permission for an accessing party to interact with a personal information record; and a data access module that receives and responds to requests from an accessing party, wherein a request may be one of: a read request specifying a personal information record to be read; and a write request specifying a personal information to be written to a personal information record to be written, wherein in response to a write request, the data access module responds with the a personal information record to be read, or updates the personal information record to be written in the personal information database, if permitted by the personal information record the privacy policy.Type: GrantFiled: March 12, 2014Date of Patent: August 2, 2016Inventor: Jacqueline K. Vestevich
-
Patent number: 9401916Abstract: The invention relates to a method for providing a user with an authenticated remote access to a remote secure device (2), said remote access being initiated from a local accessing device (1), said remote secure device (2) embedding secure data related to a specific service, characterized in that it comprises establishing a mutual authentication between said remote secure device (2) and a local secure device (3) different from the local accessing device (1) so as the user of the local accessing device (3) is able to access to the secure data of the remote secure device (2).Type: GrantFiled: November 18, 2011Date of Patent: July 26, 2016Assignee: GEMALTO SAInventor: Herve Ganem
-
Patent number: 9392443Abstract: In some examples, a device may include a communication interface configured to exchange signals with another device, and a computing component configured to autonomously calculate a centroid of a plurality of devices of which the device is a part, based at least in part on relative distances between the device and others of the plurality of devices and relative distances among the others of the plurality of devices, and autonomously establish the centroid as a shared secret.Type: GrantFiled: July 31, 2014Date of Patent: July 12, 2016Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Michael John Roberts
-
Patent number: 9391982Abstract: A network authentication system and method is described for authenticating multiple profile accesses from a single remote device. A device remote from a web server, yet connected to the web server via, for example, the Internet, can allow multiple users to register their profiles within the device. The profiles are registered using a pre-existing user ID and password corresponding to, for example, the user's financial accounts. Multiple profiles and, specifically, the indicia of those profiles, can appear on the display of the remote device allowing each user the ability to select their own registered profile. Access to a profile is granted when the user enters their private PIN. Once the PIN is entered, the private information such as financial account information will be securely forwarded from the web server to the remote device.Type: GrantFiled: February 27, 2014Date of Patent: July 12, 2016Assignee: Cullen/Frost Bankers, Inc.Inventors: James M. Stead, Arun Muthukrishnan, Michael R. Johnson, Laurie A. Rivera, Selina D. Bilyeu
-
Patent number: 9385871Abstract: An apparatus and method for authenticating a Non-Volatile Memory (NVM) device are provided. A host device that authenticates the NVM device transmits challenge information for authentication to the NVM device, receives pieces of authentication information in response to the challenge information from the NVM device, and authenticates the NVM device using the pieces of authentication information by the host device. The pieces of authentication information are generated based on the challenge information and secret key information stored in the NVM device.Type: GrantFiled: May 23, 2012Date of Patent: July 5, 2016Assignee: Samsung Electronics Co., LtdInventors: Bo-Gyeong Kang, Moon-Sang Kwon
-
Patent number: 9378378Abstract: An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of connecting to a wireless network. The apparatus includes a download module that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area. The apparatus includes a copy module that copies the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area and a deletion module that deletes the file from the mobile device in response to the boundary module determining that the mobile device has left the secure area and in response to the copy module completing copying the file from the mobile device to the secure server.Type: GrantFiled: July 28, 2014Date of Patent: June 28, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert T Arenburg, Franck Barillaud, Shivnath Dutta, Alfredo V Mendoza
-
Patent number: 9350745Abstract: Disclosed is a method and system of managing user security permissions for access to resources accessible over a communications network, to participate in a designated task or conversation relating to the resources. The method and system include: assembling resources relating to the designated task or conversation into a collection and allocating security permissions for users to access said resources in the collection over the network based on whether the users are active or passive participants in the task or the conversation. Active participants have been invited to participate in the task or the conversation and passive participants have not been invited to participate in the task or the conversation, and security permissions allocated for each of the users to access said resources in the collection to the providers of the resources are communicated, such that the providers set the security permissions for each of the users to access the resources.Type: GrantFiled: September 27, 2013Date of Patent: May 24, 2016Assignee: COGWARE PTY LTDInventor: Jon Windust
-
Patent number: 9342687Abstract: Detecting synthetic keystrokes by maintaining a record of one or more keystrokes of physical keyboard input detected by an operating system of a computer, detecting a keystroke received at a computer application process that is executed by the computer, determining that the keystroke received at the computer application process is absent from the record of keystrokes of physical keyboard input, and identifying the keystroke received by the computer application process as being a synthetic keystroke.Type: GrantFiled: August 7, 2014Date of Patent: May 17, 2016Assignee: International Business Machines CorporationInventor: Mickey Boodaei
-
Patent number: 9342661Abstract: Methods and apparatus for providing access to content across a plurality of devices and environments. In one embodiment, a downloadable rights profile is utilized in order for a user device to determine whether to provide content to a subscriber. The user device is first registered to content delivery the network; the device then requests a rights profile indicating the rights of the subscriber associated with the device to access content. The rights profile is transmitted to the device. The rights profile may be configured to be valid only for a pre-determined time, thus enabling a subscriber's rights to be updated (including revoked). Security mechanisms may also be utilized to ensure access to content is limited only to authorized subscribers. In another embodiment, a user-based authentication procedure is utilized, thereby making the rights determination and content provision process completely agnostic to the underlying hardware.Type: GrantFiled: March 2, 2010Date of Patent: May 17, 2016Assignee: TIME WARNER CABLE ENTERPRISES LLCInventors: Chris Cholas, Jeffrey P. Markley, Vipul Patel, Christopher Marsh
-
Patent number: 9323892Abstract: A computer-implemented method includes producing medical information that characterizes a group of individuals from a set of private data representing pre or post-encounter characteristics of the individuals, wherein the individuals have had encounters with a healthcare facility. The identity of the individuals is unattainable from the produced medical information. The method also includes providing the produced medical information to report the pre or post-encounter characteristics of the group.Type: GrantFiled: November 18, 2013Date of Patent: April 26, 2016Assignee: Vigilytics LLCInventor: Andrew L. Paris, III
-
Patent number: 9325676Abstract: Systems and methods for protecting communications between at least two nodes protect the identity of a node requesting information, provide content of communications being sent and/or obscuring a type of communications being sent. Varying degrees of protection options including encryption, intermediate node termination and direct node communications are provided.Type: GrantFiled: May 24, 2012Date of Patent: April 26, 2016Assignee: IP Ghoster, Inc.Inventor: Kenneth C. Tola, Jr.
-
Patent number: 9319392Abstract: A credential management system is described that provides a way to disable and/or rotate credentials, such as when a credential is suspected to have been compromised, while minimizing potential impact to various systems that may depend on such credentials. The credentials may be disabled temporarily at first and the availability of various resources is monitored for changes. If no significant drop of availability in the resources has occurred, the credential may be disabled for a longer period of time. In this manner, the credentials may be disabled and re-enabled for increasingly longer time intervals until it is determined with sufficient confidence/certainty that disabling the credential will not adversely impact critical systems, at which point the credential can be rotated and/or permanently disabled. This process also enables the system to determine which systems are affected by a credential in cases where such information is not known.Type: GrantFiled: September 27, 2013Date of Patent: April 19, 2016Assignee: Amazon Technologies, Inc.Inventors: James Leon Irving, Jr., Andrew Paul Mikulski, Gregory Branchek Roth, William Frederick Kruse
-
Patent number: 9276958Abstract: Systems, apparatuses and methods are provided for managing information technology devices in an information technology environment in which at least some of the devices are connected to a network, and access of each user in the information technology environment is customized in a convenient manner.Type: GrantFiled: February 4, 2013Date of Patent: March 1, 2016Assignee: RICOH COMPANY, LTD.Inventors: Kenji Hagiwara, Jim Vopni, Shun Tanaka
-
Patent number: 9258122Abstract: A computer-implemented method for securing data at third-party storage services may include (1) receiving, at a server-side computing system, a request to provide a user with access to a file that is encrypted, (2) determining, in response to the request, whether a transitory symmetric key of the user is available to encrypt a decryption key with which the file may be decrypted, (3) encrypting the decryption key with the transitory symmetric key of the user if the transitory symmetric key of the user is available or encrypting the decryption key with the public key of an asymmetric key pair designated for the user if the transitory symmetric key of the user is unavailable, and (4) storing the encrypted decryption key. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 6, 2014Date of Patent: February 9, 2016Assignee: Symantec CorporationInventors: Haibin Zhang, Scott Schneider, Walter Bogorad, Sharada Sundaram
-
Patent number: 9258307Abstract: An exemplary technique is provided for use in a decentralized electronic transfer system. A first digital code that represents a first transaction is generated from a first user's secure repository to the first user's unsecure repository. The first digital code is sent to a secure storage memory related to the unsecure repository to be stored in an area of the memory. A processor related to the unsecure repository generates a second digital code that represents a second transaction from the unsecure repository to the second user's repository. The processor retrieves the first digital code stored in the secure storage memory and publishes the retrieved digital code to validate the first transaction. In addition, the processor publishes the second digital code to validate the second transaction.Type: GrantFiled: February 25, 2013Date of Patent: February 9, 2016Assignee: Alcatel LucentInventors: Fabio Pianese, Noah Evans
-
Patent number: 9258316Abstract: An exemplary computer-implemented method for generating reputation ratings for URLs may include (1) identifying a URL that identifies the location of at least one web resource, (2) identifying the computing health of at least one member of a computing community that has accessed the URL, (3) generating, based at least in part on the computing health of the member(s) that accessed the URL, a reputation rating for the URL that indicates whether the URL represents a potential security risk, and then (4) providing the reputation rating for the URL to at least one additional computing device to enable the additional computing device to evaluate whether the URL represents a potential security risk. In addition, a client-side, computer-implemented method for determining whether a URL represents a potential security risk may be based at least in part on such a reputation rating. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 29, 2014Date of Patent: February 9, 2016Assignee: Symantec CorporationInventor: Himanshu Dubey