Patents Examined by Don Zhao
  • Patent number: 9253642
    Abstract: The present invention is related to method and system for online activation of a wireless internet service, which are capable of automatically transferring a MAC address required for an online activation of wireless internet services to an online activation server, thereby eliminating the subscriber burden of having to know the MAC address and preventing incorrect input of the MAC address.
    Type: Grant
    Filed: November 29, 2011
    Date of Patent: February 2, 2016
    Assignee: KT CORPORATION
    Inventor: Jong-Han Park
  • Patent number: 9245101
    Abstract: An electronic device includes a touch screen. When the electronic device wakes up and works in a locked state, a notification interface including a predetermined unlocking area is displayed on the touch screen. A user pattern formed by at least two fingers of a user located within the predetermined unlocking area is detected. The electronic device is unlocked if the user pattern matches a predetermined unlocking pattern.
    Type: Grant
    Filed: January 20, 2014
    Date of Patent: January 26, 2016
    Assignees: Fu Tai Hua Industry (Shenzhen) Co., Ltd., HON HAI PRECISION INDUSTRY CO., LTD.
    Inventor: Jian-Jun Zhou
  • Patent number: 9230285
    Abstract: Methods and apparatus for arranging event opportunities are disclosed. For example, the method detects the event opportunity that matches user profiles of at least two users who are unassociated with one another, verifies a safety parameter for one of the at least two users, wherein the safety parameter is defined by the one of the at least two users, and if the safety parameter is satisfied, sending an invitation to the event opportunity to each of the at least two users.
    Type: Grant
    Filed: December 1, 2011
    Date of Patent: January 5, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Randolph Wohlert, James Pratt
  • Patent number: 9230128
    Abstract: A system and method are provided for restricting various operations in a file system based on security contexts. An object security context including permissible roles and defining a set of access permissions associated with each of the permissible roles is assigned to a file system object. A user security context is assigned to a user based on authentication information from the user, and the user security context identifies a user role for the user. An executable security context is assigned to an executable program. When the user has launched the executable program, a process is created and assigned the user security context and the executable security context. Responsive to the process attempting to access the file system object, at least one of the user security context and executable security context is verified against the object security context to determine if the attempted access should be allowed.
    Type: Grant
    Filed: March 10, 2014
    Date of Patent: January 5, 2016
    Assignee: Protegrity Corporation
    Inventors: Yigal Rozenberg, Ulf Mattsson, Raul Ortega
  • Patent number: 9220012
    Abstract: In a method, implemented by a first device connected to a wireless network, for assisting in provisioning a second device for connection to the wireless network, the first device receives, via the wireless network and from a remote server, a public key corresponding to a private key stored in the second device. The first device uses the public key to encrypt network security information stored in the first device, the network security information including information that is useable to securely connect to the first wireless network. The first device wirelessly transmits, for reception by the second device, a signal carrying the encrypted network security information.
    Type: Grant
    Filed: January 15, 2014
    Date of Patent: December 22, 2015
    Assignee: MARVELL INTERNATIONAL LTD.
    Inventor: Amey Dattatray Inamdar
  • Patent number: 9219714
    Abstract: Provided are an identity (ID)-based encryption and signature method and a terminal that use an ID of a transmitter or a receiver as a part of the filename or the extension of a file transmitted to the receiver by the transmitter. Accordingly, it is possible to enable a user to visually recognize that the file has been provided with security. Also, it is possible to designate an associated program for the extension, and the user can easily decrypt or verify the file through the designated associated program.
    Type: Grant
    Filed: May 31, 2012
    Date of Patent: December 22, 2015
    Assignees: SAMSUNG SDS CO., LTD., SNU R&DB FOUNDATION
    Inventors: Hyo Jin Yoon, Seon Young Lee, Tae Kyoung Kwon, Soo Yeon Shin, Jung Hee Cheon
  • Patent number: 9189617
    Abstract: An apparatus and method for zero knowledge proof security techniques within a computing platform. One embodiment includes a security module executed on a processing core to establish a domain of trust among a plurality of layers by sending a challenge from a verification layer to a first prover layer, the challenge comprising an indication of at least one selected option; in response to receiving the challenge, generating first verification information at the first prover layer based on the secret and the indication of the selected option; sending the first verification information to at least a second prover layer, the second prover layer generating second verification information based on the first verification information and the indication of the selected option; and performing a verification operation at the verification layer using the second verification information based on the selected option.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: November 17, 2015
    Assignee: INTEL CORPORATION
    Inventor: Brent M. Sherman
  • Patent number: 9184921
    Abstract: Input challenge based authentication techniques are described in which data regarding a user's input signature is employed for authentication of the user to access resources. Different users have distinct input signatures that are indicative of the manner in which each individual user provides input including at least typing characteristics and timing data. Data regarding input signatures may be captured from user interaction with computing devices and associated with user accounts. Once sufficient data regarding a user's input signature is captured, access to a user account may be controlled at least in part based on the input signature. To do so, an input challenge that indicates a non-secret pattern of input is presented to the user in connection with an authentication sequence. The user reproduces the non-secret pattern of input and selective access to the user account is granted depending upon whether or not the reproduction matches the input signature.
    Type: Grant
    Filed: December 14, 2012
    Date of Patent: November 10, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Mark F. Novak
  • Patent number: 9179303
    Abstract: Devices, methods, and systems capable of an enabling transmission and receipt of secure and non-secure data are discussed in this document. According to some embodiments, a network apparatus can transmit ciphered and unciphered data. The network apparatus transmits a first signal indicating a cipher to be used and transmits a second signal indicating that non-secure data is to be transmitted and received unciphered. The network apparatus can cipher secure data and transmits ciphered-secure data and unciphered-non-secure data. A wireless terminal can receive the first and second signals, the ciphered secure data, and the unciphered non-secure data. The wireless terminal can deciphers the received secure data and does not decipher the received non-secure data. System embodiments can include both network-side and network terminal components. Embodiments of the present invention enable secure transmission of data in concert with efficient processing.
    Type: Grant
    Filed: November 10, 2011
    Date of Patent: November 3, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Mungal Singh Dhanda, Simon James Walke, Philip J. Children
  • Patent number: 9167293
    Abstract: According to one embodiment, an electronic device includes a content transmitter. The content transmitter is configured to output a content item including first data and second data to one transmission path, by applying a first copyright protection system to copyright protection of the first data and applying a second copyright protection system to copyright protection of the second data. The first copyright protection system involves encryption of data to be copyright-protected. The second copyright protection system involves no encryption of data to be copyright-protected.
    Type: Grant
    Filed: November 9, 2011
    Date of Patent: October 20, 2015
    Assignee: KABUSHIKI KAISHA TOSHIBA
    Inventors: Noriyuki Hirayama, Takashi Kokubo
  • Patent number: 9166945
    Abstract: Methods and systems for using and providing trustworthy DNS resolutions are provided. A method for using trustworthy DNS resolutions may include obtaining a DNS resolution listing for a domain name and validating the listing's plausibility using a plausible range list. The method may also include selecting a DNS resolution from the DNS resolution listing based on a requested host associated with the domain name. The method may further include initiating a connection to the host using the selected DNS resolution. A method for providing trustworthy DNS resolutions may include obtaining a plurality of potential DNS resolutions for a domain name. The method may also include generating a DNS resolution listing for a domain name and providing the DNS resolution listing. A system may include a DNS resolution selection module and a connection module. Another system may include a DNS resolution inquiry module and a DNS resolution listing provision module.
    Type: Grant
    Filed: September 5, 2014
    Date of Patent: October 20, 2015
    Assignee: GOOGLE INC.
    Inventors: James Roskind, Mike Belshe
  • Patent number: 9160742
    Abstract: An improved technique involves sending a user's authentication information to a local authentication device that computes a risk score and sends the risk score to a remote authentication server that determines whether the user is able to be authenticated. When the user makes an authentication or transaction request from an electronic device such as a computer or smartphone, the electronic device sends predictor values such as geo location and wireless signal strength to the local authentication device. The local authentication device then computes a risk score based on the received predictor values and historical predictor values. The local authentication device sends this risk score to a remote authentication server which determines from this risk score and other factors whether the user is able to be authenticated.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: October 13, 2015
    Assignee: EMC Corporation
    Inventors: Karl Ackerman, Edward W Vipond, Daniel A Wilder, Yong Qiao
  • Patent number: 9141758
    Abstract: The present invention relates to a method and a system for collecting and providing reports of activities of medical service providers, while encrypting confidential information. Specifically, the present invention provides systems and methods for collecting and providing information from medical claim transactions without information for specifically identifying the particular medical service provider. The present invention also allows for correlation of medical claim transactions with providers' information without using information that can be used to specifically identify the particular medical service provider (provider identifier).
    Type: Grant
    Filed: January 8, 2010
    Date of Patent: September 22, 2015
    Assignee: IMS Health Incorporated
    Inventors: Andrew E. Kress, Steve E. Stevens, Ann R. Martin
  • Patent number: 9137223
    Abstract: Disclosed are a data transmission/reception apparatus and method. A secret key generation unit uses a user ID as a public key to generate a secret key corresponding to the user ID. An encryption/decryption unit sets a user ID intended to receive data as an input value to encrypt the data using a certain method and decrypt the encrypted data using a certain method on the basis of a secret key corresponding to a user ID of a receiver generated by the secret key generation unit. The transmission apparatus and method according to the present invention allow for secure communication between terminals without server intervention by encrypting data using an ID-based encryption technique for safe data communication and then communicating the encrypted data.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: September 15, 2015
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Seon Young Lee, Hyo Jin Yoon, Jung Hoon Sohn, Kyung Seung Lee
  • Patent number: 9135454
    Abstract: A system and method for enabling searchable encryption of encrypted documents stored by a client on one or more storage providers includes a broker server in communication with the client and the one or more storage providers. The broker server is adapted to transfer the encrypted documents between the client and the one or more storage providers and to maintain information indicating where the encrypted documents are transferred. The broker server further stores information for at least one encrypted index for the encrypted documents and a test function for a searchable encryption mechanism used to encrypt the at least one encrypted index.
    Type: Grant
    Filed: May 31, 2013
    Date of Patent: September 15, 2015
    Assignee: Alcatel Lucent
    Inventors: Abdullatif Shikfa, Serge Papillon
  • Patent number: 9130986
    Abstract: A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software.
    Type: Grant
    Filed: March 19, 2008
    Date of Patent: September 8, 2015
    Assignee: Websense, Inc.
    Inventor: Lidror Troyansky
  • Patent number: 9124641
    Abstract: A system for securing data and information transmitted via entails is disclosed. The system includes a sender-side device from which an email including a first code is transmitted. The first code comprises instructions for manipulating server-side processing of the email. The system includes a filter module which determines whether the first code is present within the email, and subsequently transmits the email to a processing server in case if the first code is present within the email. The system includes a processing server which processes the email in accordance with the instructions specified in the first code and generates a first link, thereby enabling the email sender to access and modify the access policy for the email. The processing server further authenticates the intended recipient of the email via an OTP before enabling the intended recipient to access the parts of the email.
    Type: Grant
    Filed: November 29, 2013
    Date of Patent: September 1, 2015
    Assignee: PRAKASH BASKARAN
    Inventor: Prakash Baskaran
  • Patent number: 9124572
    Abstract: Methods and apparatuses are described for secure video conferencing. A server computing device receives a request to establish a video conference for a sensitive transaction from a first device associated with a user. The server authenticates the first device. The server establishes a conference between the first device and a second device of a second party to the sensitive transaction. The server transmits video images associated with cameras coupled to the first device to the second device, the images comprising a view of the user and an area surrounding the user. The server determines whether persons other than the user are present in the area surrounding the user. The server transmits an alert to the second device if persons other than the user are present, where the alert includes a prompt on the second device for the second party to confirm with the user whether the other persons are authorized.
    Type: Grant
    Filed: January 9, 2015
    Date of Patent: September 1, 2015
    Assignee: FMR LLC
    Inventors: Jonathan Hromi, John C. McDonough, Dmitry Bisikalo, Hadley Rupert Stern
  • Patent number: 9124434
    Abstract: Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing device configured to conduct an initial portion of a mutual authentication session with an accessory device, and send information regarding the host computing device and the accessory device to a remote pairing service via a computer network. The host computing device is further configured to, in response, receive a pairing certificate from the remote pairing service, the pairing certificate being encrypted via a private key of the remote pairing service, and complete the mutual authentication with the accessory device using the pairing certificate from the remote pairing service.
    Type: Grant
    Filed: February 1, 2013
    Date of Patent: September 1, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Harish Krishnamurthy, Ming Zhu, Kurt Torben Nielsen, Matthew Morris
  • Patent number: 9077681
    Abstract: Web page loading time may be decreased with the use of a page-maintained storage cache on a client device. In various implementations, a server may receive a request for a web page from a web browser that is on the client device. The server may provide a chunk reassembler to the client device that determines whether any chunks in the web page are already stored on the client device. Subsequently, the server may send one or more chunk of the web page to the client device when the chunk reassembler determines that the one or more chunks of the web page are missing from the client device. The chunk reassembler may then instruct the web browser to assemble the one or more received chunks with the one or more chunks that are stored on the client device into the web page for presentation on the client device.
    Type: Grant
    Filed: October 5, 2010
    Date of Patent: July 7, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: James W. Mickens