Patents Examined by Gilberto Barron, Jr.
  • Patent number: 8869249
    Abstract: In one embodiment, a method includes receiving, for a user, first user authentication information for a first authentication method and receiving, for the user, second user authentication information for a second authentication method. The second authentication method is different from the first authentication method. Upon authenticating the first user authentication information and the second user authentication information, the method moves a subset of data stored on a back-end storage device to a front-end storage device. The front-end storage device is directly connected to the user via a network and the back-end storage device not being directly connected to the network. The method then allows access to the subset of data for a period of time, wherein after the period of time expires, the subset of data is removed from the front-end storage device.
    Type: Grant
    Filed: April 23, 2012
    Date of Patent: October 21, 2014
    Assignee: PeopleChart Corporation
    Inventors: R. David Holvey, Arthur Douglas Jopling
  • Patent number: 8868912
    Abstract: A method for establishing a security association between a client and a service node for the purpose of pushing information from the service node to the client, where the client and a key server share a base secret. The method comprises sending a request for generation and provision of a service key from the service node to a key server, the request identifying the client and the service node, generating a service key at the key server using the identities of the client and the service node, the base secret, and additional information, and sending the service key to the service node together with said additional information, forwarding said additional information from the service node to the client, and at the client, generating said service key using the received additional information and the base key. A similar approach may be used to provide p2p key management.
    Type: Grant
    Filed: January 11, 2012
    Date of Patent: October 21, 2014
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Rolf Blom, Karl Norrman
  • Patent number: 8861725
    Abstract: A random bit stream generator includes a plurality of feedback shift registers configured to store a plurality of bit values that represent an internal state of the random bit stream generator. Each feedback shift register includes a register input and a register output. The random bit stream generator further includes a Boolean output function configured to receive the plurality of register outputs from the plurality of feedback registers, to perform a first Boolean combination of the plurality of register outputs, and to provide a corresponding output bit, wherein a plurality of successive output bits forms a random bit stream. A feedback loop is configured to perform a second Boolean combination of the output bit with at least one register feedback bit of at least one of the feedback shift registers, so that the register input of the at least one feedback shift register is a function of the output bit.
    Type: Grant
    Filed: July 10, 2012
    Date of Patent: October 14, 2014
    Assignee: Infineon Technologies AG
    Inventors: Rainer Goettfert, Berndt Gammel, Markus Gail, Wieland Fischer
  • Patent number: 8863266
    Abstract: A lightweight throttling mechanism allows for dynamic control of access to resources in a distributed environment. Each request received by a server of a server group is parsed to determine tokens in the request, which are compared with designated rules to determine whether to process or reject the request based on usage data associated with an aspect of the request, the token values, and the rule(s) specified for the request. The receiving of each request can be broadcast to throttling components for each server such that the global state of the system is known to each server. The system then can monitor usage and dynamically throttle requests based on real time data in a distributed environment.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: October 14, 2014
    Assignee: Amazon Technologies, Inc.
    Inventors: Soumya Sanyal, Ernest S. Powers, III, Mack Zhou, Matthew T. Tavis, Stephen A. Slotnick, John Wai Yam Hui, Charles Porter Schermerhorn
  • Patent number: 8855307
    Abstract: A method, system, and medium are provided for validating the identity or authority of a user of a wireless device to consent to providing geographic locations of their respective wireless device to a third-party application. Upon receiving a request to validate the authority of a user to consent to providing of geographic locations, the user is automatically redirected to a validation service portal. The validation service portal verifies the identity or authority of the user to consent by requiring the user to provide identification information. The identification information is compared to identification information in one or more databases to determine if the user has the authority to consent. An indication is provided by the validation service portal to the third-party application of whether the user has the authority to consent. The third-party application then initiates location-based services based on the indication.
    Type: Grant
    Filed: September 4, 2013
    Date of Patent: October 7, 2014
    Assignee: Sprint Communications Company L.P.
    Inventors: John R Schuler, Rodney Dewaine Nelson, Michael Patrick McMullen, Geetha R Thati
  • Patent number: 8856929
    Abstract: In a wireless communication device, first micro-processing circuitry drives a user interface and drives a wireless transceiver to exchange IP communications. A detection system detects a malicious condition related to the IP communications and responsively generates a circuit transfer signal. Switching circuitry de-couples the first micro-processing circuitry from the user interface and from the wireless transceiver responsive to the circuit transfer signal. Second micro-processing circuitry then drives the user interface and drives the wireless transceiver to exchange non-IP communications.
    Type: Grant
    Filed: March 13, 2012
    Date of Patent: October 7, 2014
    Assignee: Sprint Communications Company L.P.
    Inventors: Lyle Walter Paczkowski, Stephen J. Bye, Matthew C. Schlesener
  • Patent number: 8856927
    Abstract: A system, method and computer program product for identifying malicious code running on a computer, including an operating system running on the computer with a data storage device; and a trusted software component running simultaneously with the operating system. An online snapshot process of a current state of the data storage device copies data blocks from the storage device to intermediate storage. Processes running under the control of the operating system have access to the data storage device. A scanning procedure runs under control of the trusted software component that has access to data representing the snapshot of the data storage device from the trusted software component. The scanning procedure analyzes the snapshot of the data storage device for the malicious code, and, in response to a “write” directed to a data block in the snapshot area of the storage device, that data block is written to the intermediate storage.
    Type: Grant
    Filed: November 24, 2010
    Date of Patent: October 7, 2014
    Assignee: Acronis International GmbH
    Inventors: Serguei M. Beloussov, Maxim V. Lyadvinsky
  • Patent number: 8856935
    Abstract: Performing security analysis on a computer program under test (CPUT). The CPUT can be analyzed to identify data pertinent to potential security vulnerabilities of the CPUT. At least a first unit test configured to test a particular unit of program code within the CPUT can be automatically synthesized. The first unit test can be configured to initialize at least one parameter used by the particular unit of program code within the CPUT, and can be provided at least a first test payload configured to exploit at least one potential security vulnerability of the CPUT. The first unit test can be dynamically processed to communicate the first test payload to the particular unit of program code within the CPUT. Whether the first test payload exploits an actual security vulnerability of the CPUT can be determined, and a security analysis report can be output.
    Type: Grant
    Filed: February 7, 2012
    Date of Patent: October 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Daniel Kalman, Ory Segal, Omer Tripp, Omri Weisman
  • Patent number: 8850214
    Abstract: Systems and methods are provided for determining a presence of a watermark in electronic data. In certain embodiments, a plurality of keys is generated, and a plurality of payloads are retrieved from electronic data using the keys. A statistical indicia of randomness is generated based on the payloads, and the presence of a watermark is determined when the indicia is below a threshold.
    Type: Grant
    Filed: May 10, 2013
    Date of Patent: September 30, 2014
    Assignee: Intertrust Technologies Corporation
    Inventors: Xavier Serret-Avila, Gilles Boccon-Gibod
  • Patent number: 8850227
    Abstract: Aspects of the subject technology relate to systems, methods, and machine-readable media for performing a cryptographic operation. A system can be configured to submit a request, to a security device, for a decrypted user encryption key, wherein the security device is configured to decrypt the user encryption key by unbinding the user encryption key using a user authorization key. The system can receive, in response to the submitted request, the decrypted user encryption key and decrypt authorization data for a cryptographic key using the decrypted user encryption key. The system can submit a request for the security device to load the cryptographic key, wherein authorization data is used to authorize the request, and submit a request for the security device to perform a cryptographic operation using the loaded cryptographic key.
    Type: Grant
    Filed: September 5, 2012
    Date of Patent: September 30, 2014
    Assignee: Google Inc.
    Inventors: Darren Krahn, Sumit Gwalani
  • Patent number: 8850530
    Abstract: A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: September 30, 2014
    Assignee: McAfee, Inc.
    Inventor: Majid Shahbazi
  • Patent number: 8844017
    Abstract: A software firewall that may be configured using rules specified for types of network interfaces rather than individual network interfaces. The network types may be specified with type identifiers that have a readily understandable meaning to a user, facilitating ease of configuring the firewall. The network types could include, for example, wired, wireless and remote access. A rule specified based on a network type can be implemented for network interfaces of that network type. The implementation may be performed automatically and may be updated based on network location awareness information.
    Type: Grant
    Filed: February 7, 2013
    Date of Patent: September 23, 2014
    Assignee: Microsoft Corporation
    Inventors: David Abzarian, Gerardo Diaz Cuellar
  • Patent number: 8843765
    Abstract: A device generates a content key that depends upon device security state information. For example, the device may retrieve a first content key and a security state, and then derive a content key using the first content key and the security state. Accordingly, if the security state is incorrect, then the generated content key is incorrect, and the device cannot decrypt content provided to the device.
    Type: Grant
    Filed: October 10, 2012
    Date of Patent: September 23, 2014
    Assignee: Broadcom Corporation
    Inventor: Andrew Dellow
  • Patent number: 8844003
    Abstract: Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data is associated. A determination is made whether to authorize an action based at least on the comparison. The preference data is received as a selection.
    Type: Grant
    Filed: June 23, 2008
    Date of Patent: September 23, 2014
    Assignee: RavenWhite Inc.
    Inventor: Bjorn Markus Jakobsson
  • Patent number: 8844020
    Abstract: Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to create and configure computer networks that are provided by the configurable network service for use by the users. Secure private access between a computer network provided for a user by the configurable network service and one or more other remote computing systems of the user (e.g., a remote private network) may be enabled in various ways. For example, a user may programmatically invoke an API provided by the configurable network service to obtain assistance in establishing remote access from a remote location to a provided computer network of the configurable network service, such as to establish a VPN connection from the remote location to the provided computer network using hardware and/or software supplied to the remote location in response to the API invocation.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: September 23, 2014
    Assignee: Amazon Technologies, Inc.
    Inventors: Andrew J. Doane, Eric Jason Brandwine
  • Patent number: 8838961
    Abstract: Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a virtual machine instance associated with the application. Upon deploying the virtual machine instance, embodiments transmit a request to a cryptex server for a decrypted security credential, the request including the encrypted security credential and a virtual machine identifier for the deployed virtual machine instance. The cryptex server is configured to retrieve metadata associated with the virtual machine identifier and to authenticate the deployed virtual machine instance using the retrieved metadata. Embodiments receive, from the cryptex server, the decrypted security credential for use by the application.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: September 16, 2014
    Assignee: Netflix, Inc.
    Inventors: James R. Zarfoss, III, Yong Yuan
  • Patent number: 8839396
    Abstract: Technologies for wireless device authentication are disclosed.
    Type: Grant
    Filed: December 11, 2013
    Date of Patent: September 16, 2014
    Assignee: iboss, Inc.
    Inventor: Paul Michael Martini
  • Patent number: 8839422
    Abstract: An embodiment for providing a secure virtual browsing environment includes creating a virtual browsing environment with a virtualized operating system sharing an operating system kernel of a supporting operating system and executing the browser application within the virtual browsing environment. Another embodiment includes receiving a website selection within a browser application, determining if the website selection corresponds to a secure bookmark, and creating a second virtual browsing environment and executing the browser application within the second virtual browsing environment to access the website selection when the website selection corresponds to a website specified as a secure bookmark.
    Type: Grant
    Filed: June 30, 2010
    Date of Patent: September 16, 2014
    Assignee: George Mason Research Foundation, Inc.
    Inventors: Anup K Ghosh, Sushil Jajodia, Yih Huang, Jiang Wang
  • Patent number: 8839432
    Abstract: A method and apparatus for performing a reputation based analysis on a malicious infection to secure a computer. In one embodiment, the method includes monitoring application activity occurring at computers, generating reputation information associated with the application activity, in response to a malicious infection to at least one of the computers, examining the reputation information to access unreputed portions of the application activity that occurred at the at least one of the computers and determining a malicious signature based on the unreputed portions of the application activity.
    Type: Grant
    Filed: April 1, 2010
    Date of Patent: September 16, 2014
    Assignee: Symantec Corporation
    Inventor: Deepak Patil
  • Patent number: 8832455
    Abstract: Configurations providing a non-zero threshold for verifying a root file system of an operating system stored on blocks of a boot storage are disclosed. In particular, the root file system is verified during a boot sequence for the operating system. For each block of the root file system of the boot storage, the subject technology verifies a respective block of the boot storage. A counter tracking a number of verification failures is incremented if the block fails verification. In some configurations, the subject technology determines whether the counter meets a predetermined non-zero threshold. If the counter meets the predetermined non-zero threshold, the root file system is marked as corrupted. A recovery mode for the operating system is then initiated. If the counter does not meet the predetermined non-zero threshold, the operating system is reset in order to verify the root file system during a subsequent boot sequence.
    Type: Grant
    Filed: September 21, 2011
    Date of Patent: September 9, 2014
    Assignee: Google Inc.
    Inventors: William A. Drewry, William F. Richardson, Randall R. Spangler