Patents Examined by Don Zhao
  • Patent number: 9071580
    Abstract: A method and system for securing data of a mobile communications device. The method includes: determining that first application data is data associated with a first server; encrypting the first application data with an encryption key stored in the mobile communications device; storing the encrypted first application data on a memory; receiving a request to access the first application data from an application or a service implemented from the mobile communications device; determining that the application or service is authorized to access the first application data; and in response to said determining, decrypting the first application data with the encryption key.
    Type: Grant
    Filed: September 2, 2011
    Date of Patent: June 30, 2015
    Assignee: BlackBerry Limited
    Inventors: Nicole Pigeon, Van Quy Tu
  • Patent number: 9060268
    Abstract: A method for negotiating security capabilities during movement of a User Equipment (UE) includes the following steps: a target network entity receives a Routing Area Update (RAU) Request from the UE; the entity obtains Authentication Vector (AV)-related keys deduced according to a root key, and sends the selected security algorithm to the UE; and the UE deduces the AV-related keys according to the root key of the UE. A system, SGSN, and MME for negotiating security capabilities during movement of a UE are also disclosed. The present invention is applicable to security capability negotiation between the UE and the network.
    Type: Grant
    Filed: March 4, 2010
    Date of Patent: June 16, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventor: Chengdong He
  • Patent number: 9049169
    Abstract: Email synchronization between a mobile device and a messaging server may be performed through a mobile email protection system. The mobile email protection system may parse network traffic for the email synchronization to retrieve an email element of an email. The mobile email protection system may scan the email element for protected content indicated in preconfigured compliance templates. The mobile email protection system may also scan the email element for prohibited content to prevent the prohibited content from being received by the messaging server.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: June 2, 2015
    Assignee: Trend Micro Incorporated
    Inventors: Yi Zhou, Richard Ku
  • Patent number: 9047489
    Abstract: Data may be masked on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group has access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.
    Type: Grant
    Filed: November 14, 2011
    Date of Patent: June 2, 2015
    Assignee: Wave Systems Corp.
    Inventors: Steven Sprague, Michael Sprague
  • Patent number: 9043866
    Abstract: Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: May 26, 2015
    Assignee: Wave Systems Corp.
    Inventors: Steven Sprague, Michael Sprague
  • Patent number: 9037852
    Abstract: A computer system storing parameters pertaining to the regulatory restrictions placed on a for-hire vehicle compares the parameters to a current operating environment of the for-hire vehicle. In some embodiments, the computer system acts as the meter (such as a taximeter) of the for-hire vehicle. The operating parameters may include expiration or exclusion parameters that define the scope of operation of the for-hire vehicle stemming from the for-hire vehicle's medallion or certificate of public convenience and necessity. The expiration or exclusion parameters may also correspond to a driver's permit or any general regulation enacted by the regulatory agency. If the current operating environment does not comply with the expiration or exclusion parameters, the computer system shuts down, or enters a standby mode, and may not accept additional passenger fares until the current operating environment complies with the expiration and exclusion parameters.
    Type: Grant
    Filed: September 2, 2011
    Date of Patent: May 19, 2015
    Assignee: IVSC IP LLC
    Inventors: Michael Collins Pinkus, Mark A. James, James Alan Wisniewski
  • Patent number: 9038141
    Abstract: First and second active optical modules that terminate first and second active optical cable segments, each of which having a respective active end and a respective passive end, can be authenticated by: reading information from active-end storage devices attached to the respective active ends of the first and second active optical modules; providing information read from the active-end storage devices to an aggregation point; reading information from passive-end storage devices attached to the respective passive ends of the first and second active optical cable segments; providing information read from passive-end storage devices to the aggregation point; and authenticating the first and second active optical modules using information provided to the aggregation point.
    Type: Grant
    Filed: December 7, 2012
    Date of Patent: May 19, 2015
    Assignee: ADC Telecommunications, Inc.
    Inventors: Kamlesh G. Patel, David Stone, Joseph C. Coffey
  • Patent number: 9031227
    Abstract: A method is described for defining a reserved pattern of symbols, receiving in a crypto-module an input stream including sequential input symbols, applying a cipher to the input stream in the crypto-module so as to generate an intermediate stream including sequential output symbols corresponding respectively to the input symbols, and converting the intermediate stream to an output stream from the crypto-module by comparing successive groups of the input symbols and the corresponding output symbols to the reserved pattern and, upon finding a match to the reserved pattern in a given group, substituting the input symbols in the group into the intermediate stream in place of the corresponding output symbols. Related hardware and systems are also described.
    Type: Grant
    Filed: December 28, 2009
    Date of Patent: May 12, 2015
    Assignee: Cisco Technology Inc.
    Inventors: Yaacov Belenky, Chaim D. Shen-Orr
  • Patent number: 9015857
    Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: April 21, 2015
    Assignee: Wave Systems Corp.
    Inventors: Steven Sprague, Michael Sprague
  • Patent number: 9003479
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for generating a secure sandbox environment. A computer identifies components of a production environment that utilizes sensitive information during operation. The components of the production environment can include one or more server computers, one or more storage devices, and one or more applications. The computer receives a security policy that defines what constitutes sensitive information, and in response identifies the sensitive information of the production environment. The computer modifies the sensitive information such that the production environment can utilize the sensitive information without error, and such that the sensitive information cannot be identified from the modified sensitive information. The computer generates the sandbox environment, based at least in part, on the identified components of the production environment and the modified sensitive information.
    Type: Grant
    Filed: December 11, 2012
    Date of Patent: April 7, 2015
    Assignee: International Business Machines Corporation
    Inventors: Annemarie R. Fitterer, Nicholas S. Lloyd, Rama Mohan Thulasi Reddy, Aruna Yedavilli
  • Patent number: 9003483
    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for generating a secure sandbox environment. A computer identifies components of a production environment that utilizes sensitive information during operation. The components of the production environment can include one or more server computers, one or more storage devices, and one or more applications. The computer receives a security policy that defines what constitutes sensitive information, and in response identifies the sensitive information of the production environment. The computer modifies the sensitive information such that the production environment can utilize the sensitive information without error, and such that the sensitive information cannot be identified from the modified sensitive information. The computer generates the sandbox environment, based at least in part, on the identified components of the production environment and the modified sensitive information.
    Type: Grant
    Filed: November 6, 2013
    Date of Patent: April 7, 2015
    Assignee: International Business Machines Corporation
    Inventors: Annemarie R. Fitterer, Nicholas S. Lloyd, Rama Mohan Thulasi Reddy, Aruna Yedavilli
  • Patent number: 8984608
    Abstract: An information processing apparatus includes a first session managing unit configured to manage a transaction including a request and a response over a network and a second session managing unit configured to manage authentication identification information of an authenticated user. The information processing apparatus also includes a token generating unit configured to acquire authentication identification information of a requesting user and generate a token value to be included in a first response using an internally managed value, in response to a first request, and a token validating unit configured to acquire the authentication identification information of the requesting user in response to a second request and validate correctness of a token value included in the second request by comparing the token value with a token value calculated using the managed value.
    Type: Grant
    Filed: December 11, 2012
    Date of Patent: March 17, 2015
    Assignee: Ricoh Company, Limited
    Inventors: Yumi Sanno, Sachiyo Terada
  • Patent number: 8959634
    Abstract: Methods and systems reduce exposure to a dictionary attack while verifying whether data transmitted over a computer network is a password. In one aspect, a method includes performing a search of network traffic based, at least in part, on a weak validation using a Bloom filter based on an organizational password file, determining the existence of a password in the network traffic based only on the weak validation, and determining whether to block, alert, or quarantine the network traffic based at least in part on the existence of the password in the network traffic.
    Type: Grant
    Filed: March 22, 2013
    Date of Patent: February 17, 2015
    Assignee: Websense, Inc.
    Inventor: Lidror Troyansky
  • Patent number: 8955065
    Abstract: Disclosed are various embodiments for recovery and other management functions relating to security credentials which may be centrally managed. Account data, which includes multiple security credentials for multiple network sites for a user, is stored by a service in an encrypted form. A request for the account data is obtained from a client. The request specifies a security credential for accessing the account data. The account data is sent to the client in response to determining that the client corresponds to a preauthorized client and in response to determining that the security credential for accessing the account data is valid.
    Type: Grant
    Filed: February 1, 2012
    Date of Patent: February 10, 2015
    Assignee: Amazon technologies, Inc.
    Inventors: Daniel W. Hitchcock, Brad Lee Campbell
  • Patent number: 8955160
    Abstract: In a method for detecting anomalies in a circuit protected by differential logic and which processes logic variables represented by a pair of components, a first network of cells carrying out logic functions on the first component of said pairs, a second network of dual cells operating in complementary logic on the second component, the logic functions being carried out by each pair of cells in a pre-charge phase placing the variables in a known state on input to the cells and followed by an evaluation phase where a calculation is performed by the cells, the method includes detecting an anomaly by at least one non-consistent state.
    Type: Grant
    Filed: July 30, 2009
    Date of Patent: February 10, 2015
    Assignee: Institut Telecom-Telecom Paris Tech
    Inventors: Jean-Luc Danger, Sylvain Guilley, Florent Flament
  • Patent number: 8943568
    Abstract: Methods and apparatuses, including computer program products, are described for secure video conferencing to conduct financial transactions. A server computing device receives a request to establish a video conference from a first client device associated with a user of the first client device. The server computing device authenticates the first client device using credential information. The server computing device establishes a video conference between the first client device and a second client device associated with a customer representative of a financial institution. The server computing device transmits video images associated with one or more cameras coupled to the first client device to the second client device, the video images comprising a view of the user and an area surrounding the user. The server computing device determines whether any persons other than the user are present in the area surrounding the user.
    Type: Grant
    Filed: March 25, 2014
    Date of Patent: January 27, 2015
    Assignee: FMR LLC
    Inventors: Jonathan Hromi, John C. McDonough, Dmitry Bisikalo, Hadley Rupert Stern
  • Patent number: 8924738
    Abstract: An information processing device and method include storing encrypted content, storing a key for decrypting the encrypted content stored, decrypting the encrypted content stored using the key, storing a deletion table storing information indicating whether or not the key stored is to be deleted when a transition from an operating state to one of other states is made, the information corresponding to the other states, and checking the information in the deletion table corresponding to the one of the other states and deleting the key when the information indicates that the key is to be deleted.
    Type: Grant
    Filed: March 9, 2010
    Date of Patent: December 30, 2014
    Assignee: Fujitsu Limited
    Inventors: Kazuaki Nimura, Yousuke Nakamura, Fumio Honda, Isamu Yamada
  • Patent number: 8914869
    Abstract: A gateway system for implementing access to various media is provided in the invention, and the gateway system includes: a communication media access module, for establishing a communication link with the corresponding media access network; a Media Independent Handover Functions module, for seamless handover between accesses to various media; and a handover decision module, for selecting a target network for the seamless handover. The gateway system may also include an authentication module, for sharing the authentication information of the User Equipment. Two methods for implementing access to various media are further disclosed in the invention. By the provided gateway system and methods, the User Equipment can access various media via the gateway system, seamlessly hand over between accesses to various media and achieve the access to a service network using the shared authentication information.
    Type: Grant
    Filed: December 23, 2008
    Date of Patent: December 16, 2014
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Guiming Shu, Hui Zhong
  • Patent number: 8903964
    Abstract: Methods, systems, computer-readable media, and devices for automatically configuring a network captured traffic distribution device communicatively coupled to a stacked topology of network captured traffic distribution devices are described. The automatic configuration may include an exchange of configuration information between a first and second network captured traffic distribution device included in a stacked topology. The configuration information of a network captured traffic distribution device may also be automatically updated when, for example, a change is detected in the stacked topology or on a periodic or as needed basis.
    Type: Grant
    Filed: October 5, 2010
    Date of Patent: December 2, 2014
    Assignee: VSS Monitoring, Inc.
    Inventors: Terence M. Breslin, David Kucharczyk, Jan Allen Hinshaw
  • Patent number: 8898796
    Abstract: A method, system or computer usable program product for masking communication data using context based rules including intercepting a communication between a server and a client by an intermediary, the communication having a recipient, parsing the communication by the intermediary to determine whether a context based alteration rule should be applied, responsive to an affirmative determination, applying the rule to the communication to produce an altered communication with altered data, and sending the altered communication to the recipient so that the altered data in the communication is utilized in a masked manner.
    Type: Grant
    Filed: February 14, 2012
    Date of Patent: November 25, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ron Ben-Natan, Tamar Domany, Ariel Farkash, Igor Gokhman, Abigail Goldsteen, Yuval Hager, Ksenya Kveler, Boris Rozenberg, Ury Segal