Patents Examined by Gary Gracia
-
Patent number: 8464347Abstract: Provided is a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules receives, from an external server (200), a replacement protection control module (121) for updating a protection control module (120) having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified, by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations.Type: GrantFiled: November 6, 2008Date of Patent: June 11, 2013Assignee: Panasonic CorporationInventors: Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka, Yuji Unagami, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Marika Minagawa
-
Patent number: 8452961Abstract: A method and system for authentication between electronic devices with reduced user intervention is provided. An authentication process for electronic devices (e.g., CE devices) establishes ownership for secure communication, with reduced user involvement. Device ownership trust establishment allows secured/authenticated communication between electronic devices. The process binds a device to an owner such that the authentication only verifies the authenticity of a device, and verifies the ownership of the device to ensure authentication. This ensures that a device is a valid device that has not been tampered with, and ensures a device has a trusted owner. Ownership binding to a device can be verified and established by trusted third parties without user intervention.Type: GrantFiled: March 1, 2007Date of Patent: May 28, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Yu Song, Doreen Cheng, Alan Messer
-
Patent number: 8379842Abstract: A cryptographic method for a cryptographic system may include receiving a basic point on an elliptic curve and a scalar k; initializing primary variables with the basic point; iterating through a plurality of operations using a repetitive operation variable; identifying a fault, in one or more of setting secondary variables corresponding to the primary variables, resetting the primary and secondary variables, and calculating a scalar product in a multiplier of the cryptographic system, the identifying of the fault using the primary and secondary variables based on a portion of the scalar k, the fault identified by one of determining that values of at least two of the secondary variables are different and determining that at least one of the secondary variables is different from at least one of the primary variables; and outputting the scalar product if there is no fault identified.Type: GrantFiled: March 2, 2007Date of Patent: February 19, 2013Assignee: Samsung Electronics Co., Ltd.Inventor: Ihor Vasyltsov
-
Patent number: 8363658Abstract: A system is provided comprising a computer system, a configuration database, and a dynamic network interfaces application that receives a message from a network access component containing a request to authenticate a client device accessing a network service, determines that a policy requires the client device to be associated with a virtual local area network to access the network service, and authenticates the client device for association with the virtual local area network. The dynamic network interfaces application also searches the configuration database for configuration information to provision the virtual local area network, assigns the configuration information to the client device, the network access component, and a firewall component, and sends a reply containing the configuration information to the network access component and the firewall component in response to the request, wherein the configuration information comprises settings to provision the virtual local area network.Type: GrantFiled: November 13, 2008Date of Patent: January 29, 2013Assignee: Sprint Communications Company L.P.Inventors: Jason R. Delker, John M. Everson, James W. Norris, Carol A. Ross, Jason K. Whitney
-
Patent number: 8341409Abstract: A content server apparatus (10) includes: a unique information holding unit (103) which holds unique information of an on-vehicle player apparatus (20), a content obtaining unit (101) which obtains a content from outside, an encrypting unit (104) which encrypts the obtained content, prior to a transmission request from the on-vehicle player apparatus (20), onto an encrypted content using the unique information, a storing unit (105) which stores the encrypted content, and a transmitting unit (107) which transmits the stored encrypted content in response to the transmission request from the on-vehicle player apparatus (20). The on-vehicle player apparatus includes a storage medium (208) which stores the received encrypted content, and a decrypting unit (209) which decrypts the stored encrypted content in response to a reproduction request given from outside.Type: GrantFiled: June 20, 2006Date of Patent: December 25, 2012Assignee: Panasonic CorporationInventors: Satoru Itani, Yuji Mizuguchi
-
Patent number: 8341701Abstract: The conventional data transmitting/receiving system has problems: that a correct measurement cannot be performed because a measurement result is an addition of a verification processing time and a transmission time; that an authentication processing which is necessary for a transmission time measurement processing needs to be separately required; and that an unnecessary key exchange processing is executed.Type: GrantFiled: September 6, 2005Date of Patent: December 25, 2012Assignee: Panasonic CorporationInventors: Yasushi Ayaki, Hiroyuki Iitsuka, Naoshi Usuki
-
Patent number: 8332627Abstract: Mutual authentication systems and methods are described that comprise an authenticating server that is available across a network and capable of authenticating a user based on credentials provided by the user. An embeddable object provided by the authenticating server and containing a passphrase that identifies the server to the user. A credentials entry mechanism identifies the user to the authenticating server. A user device displays an Outer Page that can request authentication. The authenticating server verifies the source of the request and provides the passphrase to the user device. The display of the passphrase confirms the identity of the authenticating server to the user. The source of the request can be verified using a secure cookie. The embeddable object can be provided in a second page and can prevent display of the passphrase if user input is not directed to the second page.Type: GrantFiled: February 8, 2007Date of Patent: December 11, 2012Assignee: Cisco Technology, Inc.Inventors: Brian L. Matthews, Cayce M. Ullman, Schuyler Ullman, Scott Olechowski, Ashish Warty
-
Patent number: 8326119Abstract: An apparatus is described for recording an optical record carrier (40). The apparatus is arranged for recording a visually detectable pattern (LBL) at the record carrier in a ring shaped zone (RP). The apparatus is further arranged to record data (Data1, Data2) and a primary data organizing system (FS) wherein the data is organized. The primary data organizing system (FS) does not refer to a physical address within the ring shaped zone. The apparatus is further arranged for recording at least part of the data (Data2) or the primary data organizing system on the record carrier at an area peripherally arranged with respect to the ring shaped zone.Type: GrantFiled: August 7, 2008Date of Patent: December 4, 2012Assignee: Lite-On It CorporationInventors: Maarten Kuijper, Petrus Henricus Cornelius Bentvelsen, Mathias Martinus Maria Timmermans, Markus Wilhelmus Maria Coopmans
-
Patent number: 8281362Abstract: A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.Type: GrantFiled: July 12, 2006Date of Patent: October 2, 2012Assignee: Panasonic CorporationInventors: Minehisa Nagata, Senichi Onoda, Toshihisa Nakano, Masaya Yamamoto, Kaoru Murase, Masayuki Kozuka, Tateo Oishi, Yoshikazu Takashima, Takashi Yamanishi, Yoshitomo Osawa, Jun Yonemitsu, Katsumi Muramatsu
-
Patent number: 8276209Abstract: A method and system for determining the level of allowed communication between devices. By addition of one or more tamper-resistant proximity check server(s), round-trip time measurements to estimate the distance between the communication devices are performed in order to determine the amount of communication allowed between these devices. In one embodiment, a single tamper-resistant proximity server computes the distance between communication devices that are implemented as trusted applications on open platforms.Type: GrantFiled: September 5, 2005Date of Patent: September 25, 2012Assignee: Koninklijke Philips Electronics N.V.Inventors: Charles Leonardus Corenlius Maria Knibbeler, Antonius Adriaan Maria Staring, Menno Anne Treffers, Emmanuel David Lucas Michael Frimout, Johannes Arnoldus Cornelis Bernsen
-
Patent number: 8184953Abstract: Videos are received and indexed based on fingerprints generated for the videos, using lookup keys which correspond to sub portions of the reference fingerprints. Specifically, a set of lookup keys is selected such that the number of reference fingerprints such that the clumping associated with the associated each of the lookup keys is minimized. Clumping occurs when a number of reference identifiers associated with a lookup key exceeds a maximum value.Type: GrantFiled: February 23, 2009Date of Patent: May 22, 2012
-
Patent number: 8180195Abstract: A memory device for storing a plurality of macroblocks may include a plurality of memory banks. Each macroblock may include m*n pixel data, wherein m is a positive integer, and wherein n also is a positive integer. The plurality of memory banks is adapted to store the pixel data, and wherein each memory bank is sized to store rows of m pixel data. An image processing system may include: a memory adapted to store a plurality of macroblocks; and a video codec. The memory may include a plurality of memory banks. Each memory bank may be sized to store rows of m pixel data. The video codec may be adapted to encode pixel data read from the memory. The video codec also may be adapted to decode the pixel data read from the memory.Type: GrantFiled: February 27, 2008Date of Patent: May 15, 2012Assignee: Samsung Electronics Co., Ltd.Inventors: Yong-Mi Lee, Jung-Sun Kang
-
Patent number: 8160252Abstract: Disclosed is a method for generating a Short Term Key Message (STKM) for protection of a broadcast service being broadcasted to a terminal in a mobile broadcast system. The method includes transmitting, by a Broadcast Service Subscription Management (BSM) for managing subscription information, at least one key information for authentication of the broadcast service to a Broadcast Service Distribution/Adaptation (BSD/A) for transmitting the broadcast service, generating, by the BSD/A, a Traffic Encryption Key (TEK) for deciphering of the broadcast service in the terminal and inserting the TEK into a partially created STKM, and performing, by the BSD/A, Message Authentication Code (MAC) processing on the TEK-inserted STKM using the at least one key information, thereby generating a completed STKM.Type: GrantFiled: February 27, 2007Date of Patent: April 17, 2012Assignee: Samsung Electronics Co., LtdInventors: Byung-Rae Lee, Sung-Oh Hwang, Kook-Heui Lee
-
Patent number: 7936883Abstract: A quantum key distribution protocol is provided that reduces the maximum value of the leaked information amount over the same distance when an adversary makes a photon number splitting attack more than the reduction by the BB84 protocol and the SARG protocol, by making use of the advantages of the BB84 protocol and the SARG protocol. By properly proportioning the existing BB84 protocol and the SARG protocol in accordance with the rate determined by the communication distance between the sender and the receiver of the coherent light, a protocol that is more robust against photon number splitting attack than the known existing protocols can be realized, and long distance quantum key distribution, which was not possible until now, becomes possible.Type: GrantFiled: August 30, 2005Date of Patent: May 3, 2011Assignee: The Foundation for the Promotion of Industrial ScienceInventors: Hideki Imai, Manabu Hagiwara, Makoto Eguchi
-
Patent number: 7929690Abstract: An apparatus and method for implementing a secure quantum cryptography system using two non-orthogonal states. For each qubit, the to emitter station prepares a quantum system in one of two non-orthogonal quantum states in the time-basis to code bit values. Intra- and inter-qubit interference is then used to reveal eavesdropping attempts. Witness states are used to help reveal attacks performed across the quantum system separation.Type: GrantFiled: September 1, 2005Date of Patent: April 19, 2011Assignee: ID Quantique SAInventors: Nicolas Gisin, Grégoire Ribordy, Hugo Zbinden
-
Patent number: 7886339Abstract: A computer implemented method, apparatus, and computer program product for authenticating a user to a network. In response to receiving a request from a user to access a protected resource, the process sends a unique bit sequence into a network connection utilized by the user. Next, the process authenticates the user to access the protected resource in response to receiving a verification that the unique bit sequence was received by an access point that authenticated the user when the user logged on to the network.Type: GrantFiled: January 20, 2007Date of Patent: February 8, 2011Assignee: International Business Machines CorporationInventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh