Patents Examined by Janusz Kusyk
-
Patent number: 9240989Abstract: A system that incorporates the subject disclosure may perform, for example, receiving an over-the-air programming message that is utilizing a hypertext transfer protocol where the over-the-air programming message including programming data for use by the mobile communication device, converting the over-the-air programming message to a short message service transport protocol to generate an adjusted message that includes the programming data, and providing the adjusted message to a universal integrated circuit card of the mobile communication device via a baseband proxy operating in a device processor of the mobile communication device. Other embodiments are disclosed.Type: GrantFiled: November 1, 2013Date of Patent: January 19, 2016Assignee: AT&T INTELLECTUAL PROPERTY I, LPInventors: Walter Cooper Chastain, Stephen Emille Chin
-
Patent number: 9154564Abstract: In an embodiment, an application server is configured to manage privacy settings of a subscriber for one or more social networking services. The application server determines a set of privacy settings (e.g., a manually configured or default set of privacy settings) of the subscriber for the one or more social networking services, and then receives, from the subscriber, permission to dynamically modify the set of privacy settings. The application server monitors, responsive to the received permission, passive behavior of the subscriber that is separate from interactions between the subscriber and the one or more social networking services (e.g., calls, text messages, instant messages made to/from the subscriber, a location of the subscriber, etc.). The application server triggers a modification to the set of privacy settings based on the monitored passive behavior of the subscriber.Type: GrantFiled: November 17, 2011Date of Patent: October 6, 2015Assignee: QUALCOMM IncorporatedInventors: Ian R. Heidt, Eric P. Bilange, Eric C. Rosen
-
Patent number: 9143505Abstract: An image collection based information security method and system is disclosed. The method includes a server side receiving a first transaction data sent by a client side and generating a second transaction data with the first data. The server converts the second data into an image, and sends the image to the client. A dynamic token collects the image, pre-processes, and converts the image into a third transaction data, and displays the third data for user's confirmation. The token generates and displays a second dynamic password according to the third data. The client receives the second password input by a user and sends same to the server. The server receives the second password and generates a first dynamic password, determines whether the first password is identical to the second password; if yes, the authentication is successful and the transaction is executed; if no, the transaction is cancelled.Type: GrantFiled: November 30, 2011Date of Patent: September 22, 2015Assignee: Feitian Technologies Co., Ltd.Inventors: Zhou Lu, Huazhang Yu
-
Patent number: 9137240Abstract: The present invention comprises a method and apparatus for simplifying the process of access to a network for a roaming computer user, divides the responsibility of servicing a given user wanting to access the network between multiple parties wanting to access the network between multiple parties and minimizes the possibility of improper dissemination of email header data as well as improper use of network resources (including server systems) by non-clients.Type: GrantFiled: April 26, 2013Date of Patent: September 15, 2015Assignee: MyMail, Ltd.Inventors: Thomas Drennan Selgas, Michael Brian Massing, John Everett Gmuender
-
Patent number: 9135472Abstract: Processor system with a general purpose processor and a cryptographic processor dedicated to performing cryptographic operations and enforcing the security of critical security parameters. The cryptographic processor prevents exposure of critical security parameters outside the cryptographic processor itself, and instead implements a limited scripting engine, which can be used by the general purpose processor to execute operations that require the critical security parameters.Type: GrantFiled: October 31, 2013Date of Patent: September 15, 2015Assignee: Square, Inc.Inventors: Malcolm Ronald Smith, Kshitiz Vadera, Mark Philip Zagrodney, Kevin Ka Wai Ng, Afshin Rezayee
-
Patent number: 9111072Abstract: Computer-implemented systems, methods, and computer-readable media for generating and executing anti-reverse engineering software include receiving at least one of a set of input instructions and a set of input values; creating a deterministic environment; executing one or more functions corresponding to at least one of the set of input instructions and the set of input values while simultaneously generating a set of output values corresponding to the executed one or more functions, wherein the set of output values is generated based on a deterministic function of the computing device executing the one or more functions; and outputting the set of output values.Type: GrantFiled: August 16, 2012Date of Patent: August 18, 2015Assignee: Tectonic Labs, LLCInventor: Binh K. Thai
-
Patent number: 9092622Abstract: A data processing system having a first processor, a second processor, a local memory of the second processor, and a built-in self-test (BIST) controller of the second processor which can be randomly enabled to perform memory accesses on the local memory of the second processor and which includes a random value generator is provided. The system can perform a method including executing a secure code sequence by the first processor and performing, by the BIST controller of the second processor, BIST memory accesses to the local memory of the second processor in response to the random value generator. Performing the BIST memory accesses is performed concurrently with executing the secure code sequence.Type: GrantFiled: August 20, 2012Date of Patent: July 28, 2015Assignee: Freescale Semiconductor, Inc.Inventors: William C. Moyer, Jeffrey W. Scott
-
Patent number: 9083516Abstract: A data stream with a given data rate is distributed into a plurality of virtual lanes or streams, each with a lower data rate than the data stream. Virtual lanes permit the use of lower cost electronics at the optical-electrical conversion points. Security information is generated that includes a unique initialization vector. The security information is distributed or allocated across some or all of the of the virtual data streams in a virtual lane alignment marker in a portion of the alignment marker used to maintain direct current (DC) transmission balance, but that otherwise does not provide useful information.Type: GrantFiled: June 5, 2013Date of Patent: July 14, 2015Assignee: Cisco Technology, Inc.Inventors: Luca Della Chiesa, Gilberto Loprieno, Giacomo Losio
-
Patent number: 9077546Abstract: Methods and apparatuses for authenticating a secure sockets layer certificate (SSL) certificate are described herein. The methods include receiving the SSL certificate associated with a website, identifying a chain of trust associated with the SSL certificate, transmitting, to a security manager, a validation request based on the SSL certificate and a certificate in the chain of trust, receiving a validation response from the security manager, and presenting an indication of trustworthiness, to a user, based on the validation response. The apparatuses are provided to implement the methods.Type: GrantFiled: November 27, 2012Date of Patent: July 7, 2015Assignee: Symnatec CorporationInventor: Samir Kumar Rakshit
-
Patent number: 9077730Abstract: In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing logic coupled with the interface. The processing logic determines whether the interface is connected directly to a predefined network. The processing logic restricts access to the interface responsive to determining the interface is connected to a network other than the predefined network. The processing logic does not restrict access to the interface while the interface is directly connected with the predefined network.Type: GrantFiled: February 2, 2011Date of Patent: July 7, 2015Assignee: CISCO TECHNOLOGY, INC.Inventors: Vincent E. Parla, Philip John Steuart Gladstone, Christopher Fitzgerald
-
Patent number: 9077690Abstract: An example apparatus is provided that receives a pseudonym and encrypted identifier, where the pseudonym is of a user's personal data. The pseudonym has been generated using a first secret key, and the encrypted identifier has been generated by encrypting the identifier using a second secret key. The first and second secret keys are known to other user(s) authorized to access the data, and are unknown to the apparatus. The operations also include storing the personal data in a database under the pseudonym, and indexed by the encrypted identifier. The keys used for encryption and pseudorandom generation can be provided by a second apparatus (e.g. an offline security manager), which may employ a proxy re-encryption scheme to provide proper keys to the apparatus based on access policies. Only the authorized users can decrypt the keys with their private keys, thus can query the user records stored in the apparatus.Type: GrantFiled: December 7, 2009Date of Patent: July 7, 2015Assignee: Nokia CorporationInventor: Zheng Yan
-
Patent number: 9069954Abstract: Security events associated with network devices and an actor category model are stored (501, 503). The actor category model includes levels arranged in a hierarchy and each level is associated with a subcategory for a category of the model. Security events are correlated with the actor category model (505), and a determination of whether a security threat exists is performed based on the correlating (506).Type: GrantFiled: May 20, 2011Date of Patent: June 30, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventor: Singla Anurag
-
Patent number: 9059990Abstract: Disclosed are systems and methods for ensuring confidentiality of information of a user of a service. One example method includes receiving a request to carry out an operation control procedure for the service; identifying the user of the service; selecting a trusted device associated with the identified user of the service; sending, to the selected trusted device, a request for confidential information of the user, wherein the confidential information is used to carry out the operation control procedure; receiving the confidential information from the selected trusted device; and carrying out the operation control procedure using the received confidential information.Type: GrantFiled: April 18, 2014Date of Patent: June 16, 2015Assignee: Kaspersky Lab ZAOInventor: Nikolay V. Borovikov
-
Patent number: 9049235Abstract: A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.Type: GrantFiled: November 21, 2012Date of Patent: June 2, 2015Assignee: McAfee, Inc.Inventors: Nicholas Liebmann, Peter Neal, Michael G. Bishop, Justin Cragin, Michael Driscoll
-
Patent number: 9037775Abstract: A physical host executes a hypervisor or virtual machine monitor (VMM) that instantiates at least one virtual machine (VM) and a virtual input/output server (VIOS). The VIOS determines by reference to a policy data structure a disposition of a packet of network communication with the VM, where the disposition includes one of dropping the packet and forwarding the packet. Thereafter, the determined disposition is applied to a subsequent packet in a same packet flow as the packet.Type: GrantFiled: August 27, 2012Date of Patent: May 19, 2015Assignee: International Business Machines CorporationInventors: Jeffrey J. Feng, Terry J. Hoffman, Shawn P. Mullen, Bhargavi B. Reddy
-
Patent number: 9037676Abstract: This disclosure relates to scheduled online publishing of internet media. Media content, such as a video, can be received for upload to an online server. A future publish time for the media content is determined based on user input, or satisfaction of a set of predetermined criteria. The media content is maintained as unpublished until the future publish time. Exposure of the media content is restricted to authorized users while the media content is unpublished. At the future publish time, the media content is published, and provided to a set of content consumers via the online server.Type: GrantFiled: March 2, 2012Date of Patent: May 19, 2015Assignee: Google Inc.Inventors: Jim Fredrik Lundh, Shenaz Zack, John A. Zeratsky, Patrick Hung, Mohan V. Nibhanupudi, Philo Juang, Reuben Mark Antman, Tim Dasilva, Dean M. Yasuda, Namhee Koo, Timothy Hiroshi Mansfield, Stanley Wang, Joshua R. Siegel, Anton Tonchev Koinov
-
Patent number: 9015859Abstract: Technologies related to contextual use and expiration of digital content are generally described. In some examples, a receiving device may connect with a sponsoring device having the digital content. A relationship property defines a relationship context between the receiving device and the sponsoring device. The receiving device may receive the digital content from the sponsoring device and use the digital content so long as allowed, as determined with reference to the relationship property.Type: GrantFiled: March 30, 2012Date of Patent: April 21, 2015Assignee: Empire Technology Development LLCInventors: Khurshidali Shaikh, Anoop Balakunthalam, Ravi Petlur, Shafeeq Ahmed, Gaurav Soni
-
Patent number: 9003063Abstract: Certain embodiments of the invention may include systems, methods, and apparatus for estimating power time of use. According to an example embodiment of the invention, a method is provided for synchronizing local system time with a network clock for estimating power time of use. The method includes storing power usage data and initial time stamps, wherein the initial time stamps are derived from one or more of a local clock or broadcast network time; receiving data comprising network time; adjusting the local system time with a PID loop, wherein the PID loop adjusts the local system time based at least in part on a difference between the local clock and the received network time; storing, with the power usage data and initial time stamps, an indicator when the difference is greater than a predetermined value; and determining synchronization when the difference is less than or equal to a predetermined value.Type: GrantFiled: November 16, 2011Date of Patent: April 7, 2015Assignee: General Electric CompanyInventors: Bradley Richard Ree, Steven Bietz
-
Patent number: 8990951Abstract: A system and method for identifying unauthorized uploaded content that has been uploaded before a validated live reference stream has been ingested is disclosed herein. The live reference stream is compared against the indexed uploaded content repeatedly as the live reference stream is received. The matching process is done once per a time period until a match meeting a minimum match duration threshold is identified. The match is then determined to be unauthorized, and a claim is issued against the unauthorized uploaded content. The time period can be based on a utility based analysis that factors the computational costs of repeated matching versus the diminishing value of the live reference stream as time progresses.Type: GrantFiled: March 30, 2012Date of Patent: March 24, 2015Assignee: Google Inc.Inventors: Lars Fabian Krüger, Johan Georg Granström
-
Patent number: 8935341Abstract: In one embodiment, a computer system creates for a first user a location-triggered note specific for a second user and for a particular location, determines the second user's location, and transmits the location-triggered note to the second user if the second user is at the particular location.Type: GrantFiled: November 21, 2011Date of Patent: January 13, 2015Assignee: Facebook, Inc.Inventors: Andrew Garrod Bosworth, David Harry Garcia, Kenneth M. Lau