Patents Examined by Linglan Edwards
  • Patent number: 9667610
    Abstract: Techniques for managing network-connected objects are provided. In some examples, code for accessing a network-connected object may be received. The code may be configured to enable generation of an application programming interface method. In some aspects, account information associated with a user may be stored. A particular method call corresponding to the application programming interface method may be received from a computer device of the user. The particular method call may include a request to access the network-connected object. In some examples, the request to access the network-connected object may be authenticated based at least in part on the account information. Additionally, in some examples, an instruction to the network-connected object may be provided over a network if the request is authenticated.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: May 30, 2017
    Assignee: Oracle International Corporation
    Inventors: Arun Theebaprakasam, Kuang-Yu Shih, Kwan-I Lee, Zhe Wang, Buddhika Kottahachchi
  • Patent number: 9654970
    Abstract: A WiFi roaming management method and device which redirect an HTTP request of a mobile terminal from an AP to an AC even though the AC and the AP do not exist in the same subnet, which redirects a source IP address for an HTTP request, after transferring, to an IP address of the AC, and which smoothly support a wireless Internet service in a distributed processing system according to a web authentication of the AC in a WiFi roaming method is provided. A terminal session management function and a traffic control function are separated by a premium AC (Access Controller) and a premium AP (Access Point) interworked with a tunneling method according to a CAPWAP protocol.
    Type: Grant
    Filed: October 19, 2011
    Date of Patent: May 16, 2017
    Assignee: KT Corporation
    Inventors: Joo Young Yoon, Kyu Jeong Han, Yung Ha Ji
  • Patent number: 9641324
    Abstract: A method for authenticating request messages is disclosed. An authentication service device performs centralized allocation and management for authentication random numbers; when a User Equipment (UE) uses a protected service, the key negotiation process needs to be performed only once, whereupon the authentication is performed with multiple Application Servers (ASs) in turn according to the policy of using an authentication random number. Further, the corresponding authentication service device, AS, and UE are disclosed.
    Type: Grant
    Filed: May 14, 2010
    Date of Patent: May 2, 2017
    Assignee: Huawei Technologies Co., Ltd.
    Inventor: Chao Sun
  • Patent number: 9633205
    Abstract: A method and a device for obtaining virus signatures in the field of computer security have been disclosed. The method includes: obtaining text strings contained in each virus sample within a virus sample set; selecting text strings for use as virus signatures candidate according to a first frequency at which each text string occurs in a non-virus sample set and a second frequency at which each text string occurs in the virus sample set; calculating an information entropy of the virus signatures candidate according to a quantity of virus samples containing the virus signatures candidate and a quantity of non-virus samples containing the virus signatures candidate; and selecting virus signatures from the virus signatures candidate according to the information entropy. The present disclosure may timely identify the latest virus signatures and ensure that the obtained virus signatures are optimal signatures and may identify a wide range of virus variants.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: April 25, 2017
    Assignee: Tencent Technology (Shenzhen) Co., Ltd.
    Inventor: Sheng Guan
  • Patent number: 9628986
    Abstract: Methods for processing a media content are disclosed. For example, a method captures the media content, determines a direction from which the media content is captured, encrypts the media content, and sends the media content that is encrypted toward a receiving device in the direction from which the media content was captured. Another method captures the media content, determines a direction from which the media content is captured, encrypts the media content and uploads the media content that is encrypted to a data store. The method then sends a notification toward a receiving device in the direction from which the media content was captured. The notification identifies that the media content that is encrypted has been uploaded to the data store.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: April 18, 2017
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Christopher Baldwin
  • Patent number: 9628469
    Abstract: A user accesses a remote session, the connection to which is managed by a connection broker, according to a single sign-on (SSO) process. The SSO process includes the user entering his or her credentials and being authenticated to the connection broker. In addition to user authentication, the SSO process includes connection broker authentication to confirm that the connection broker is trustworthy. When the connection broker is authenticated, the user credentials are transmitted to the connection broker in a secure manner and the connection broker forwards them onto a machine hosting the remote session so that the user can be logged into the remote session without entering his or her credentials again.
    Type: Grant
    Filed: December 31, 2014
    Date of Patent: April 18, 2017
    Assignee: VMware, Inc.
    Inventors: Anthony J. Wilkinson, Per Olov Larsson, Ashley Nuttall, Hans Christenson, Tom Elliott, Steven Sigel, Adam Gross
  • Patent number: 9628272
    Abstract: Mechanisms for operating a prover device and a verifier device so that the verifier device can verify the authenticity of the prover device. The prover device generates a data string by: (a) submitting a challenge to a physical unclonable function (PUF) to obtain a response string, (b) selecting a substring from the response string, (c) injecting the selected substring into the data string, and (d) injecting random bits into bit positions of the data string not assigned to the selected substring. The verifier: (e) generates an estimated response string by evaluating a computational model of the PUF based on the challenge; (f) performs a search process to identify the selected substring within the data string using the estimated response string; and (g) determines whether the prover device is authentic based on a measure of similarity between the identified substring and a corresponding substring of the estimated response string.
    Type: Grant
    Filed: January 3, 2014
    Date of Patent: April 18, 2017
    Assignees: WILLIAM MARSH RICE UNIVERSITY, MASSACHUSETTS INSTITUTE OF TECHNOLOGY
    Inventors: Masoud Rostami, Mehrdad Majzoobi, Farinaz Koushanfar, Daniel S. Wallach, Srinivas Devadas
  • Patent number: 9626488
    Abstract: A non-transitory computer readable storage medium including computer readable code that, when executed by a processor, is configured to receive, from a user network device, a first request to execute an application on the user network device. The first request includes a user identification, routing information, and requested application information, encrypted using a public key. The user network device is configured to display the application on a television display device. The code is further configured to decrypt the routing information and requested application information using a private key, send a second request for subscription information to a service provider, receive the subscription information from the service provider, and determine that a license corresponding to the application is associated with the user. The code is further configured to generate and send an application package configured to deploy the application using a Java Runtime Environment on the user network device.
    Type: Grant
    Filed: October 14, 2011
    Date of Patent: April 18, 2017
    Assignee: Oracle America, Inc.
    Inventors: Bernard A. Traversat, Mohamed M. Abdelaziz, Michael J. Duigou, Henry Jen, Brian Goetz
  • Patent number: 9608966
    Abstract: An information handling device has a first connection unit, a Web application executing unit to generate a device operating command, a second connection unit, an application authentication processing unit to generate a platform authenticator, an application origin information attacher to attach origin information of the web application to the platform authenticator, and a third connection unit to establish a connection for transmitting the device operating command and the platform authenticator attached with the origin information to the second communication device in order to transmit the device operating command and the platform authenticator attached with the origin information.
    Type: Grant
    Filed: August 15, 2013
    Date of Patent: March 28, 2017
    Assignee: KABUSHIKI KAISHA TOSHIBA
    Inventors: Jun Kanai, Hiroshi Isozaki
  • Patent number: 9602499
    Abstract: A method and apparatus for authenticating a first node's identity in a communication network. An authentication node receives from a second node an authentication request. The authentication request includes a first certificate that has previously been presented to the second node by a node purporting to be the first node. The authentication node retrieves a second certificate belonging to the first node from the first node, and compares the first certificate with the second certificate. If the certificates match, then the first node's identity can be authenticated but if the certificates do not match, then the first node's identity cannot be authenticated. The results of the comparison are then sent to the second node.
    Type: Grant
    Filed: April 23, 2014
    Date of Patent: March 21, 2017
    Assignee: F-Secure Corporation
    Inventors: Jarno Niemela, Pirkka Palomaki
  • Patent number: 9584585
    Abstract: The present invention relates to a drive system that includes a module that operates as a server, where at least sometimes the module is at least one of directly integrated with another module that operates as a drive and fully integrated to include the drive. The server allows for communications with one or more terminals via an internet-type communications medium, while the drive is for controlling, monitoring and/or otherwise interacting with at least one motor, electromechanical machine, or other appropriate type of machine/process. In at least some embodiments, the server is capable of providing web pages, executable programs and/or other information including, for example, information in accordance with an FTP protocol onto the internet for receipt by the terminals. The terminals communicate commands and other information via the internet back to the server, which in turn can influence the drive and the controlled machine/process.
    Type: Grant
    Filed: October 1, 2013
    Date of Patent: February 28, 2017
    Assignee: Rockwell Automation Technologies, Inc
    Inventor: Wayne R. Davis
  • Patent number: 9576126
    Abstract: A template of a biometric attribute for use with a biometric recognition device includes a long term component and a short term component. The long term component can include a plurality of nodes that each represents at least a portion of the biometric attribute. The short term component may include one or more newly captured nodes that each represents at least a portion of the biometric attribute.
    Type: Grant
    Filed: February 13, 2014
    Date of Patent: February 21, 2017
    Assignee: Apple Inc.
    Inventors: Michael Boshra, Pavel Mrazek, William M. Vieta
  • Patent number: 9571482
    Abstract: Embodiments of a mobile device and method for secure on-line sign-up and provisioning of credentials for Wi-Fi hotspots are generally described herein. In some embodiments, the mobile device may be configured to establish a transport-layer security (TLS) session with a sign-up server through a Wi-Fi Hotspot to receive a certificate of the sign-up server. When the certificate is validated, the mobile device may be configured to exchange device management messages with the sign-up server to sign-up for a Wi-Fi subscription and provisioning of credentials, and retrieve a subscription management object (MO) that includes a reference to the provisioned credentials for storage in a device management tree. The credentials are transferred/provisioned securely to the mobile device. In some embodiments, an OMA-DM protocol may be used.
    Type: Grant
    Filed: July 21, 2011
    Date of Patent: February 14, 2017
    Assignee: Intel Corporation
    Inventors: Vivek Gupta, Necatl Canpolat
  • Patent number: 9563753
    Abstract: A computer system for dumping a confidential image on a trusted computer system. A trusted computer system loads an encrypted client dumper image key. The trusted computer system decrypts, with a private host key, the encrypted client dumper image key to generate a client dumper image key. The trusted computer system loads an encrypted dumper including a client dump key, in response to determining that the client dumper image key matches a client image key which encrypts a boot image of a current operating system. The trusted computer system decrypts, with the client dumper image key, the encrypted dumper to generate a dumper including the client dump key. The trusted computer system starts the dumper. The dumper generates an encrypted dump by encrypting, with the client dump key, an image to be dumped in the secure logical partition, and the dumper writes the encrypted dump on a client dump device.
    Type: Grant
    Filed: July 8, 2016
    Date of Patent: February 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Reinhard T. Buendgen, James A. O'Connor, William J. Rooney
  • Patent number: 9560074
    Abstract: A method includes receiving a set of strings and applying one or more filters to generate a subset of strings that are determined to correspond to strings of interest. The method also includes retrieving domain name system (DNS) information associated with a first string of the subset. The method includes executing a rule-based engine to determine, based on application of one or more rules to the DNS information, whether to add the first string to a set of suspicious hostnames.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: January 31, 2017
    Assignee: Cloudmark, Inc.
    Inventors: Mark Richard Stemm, Arlyn Robert Johns
  • Patent number: 9553731
    Abstract: A terminal unique information transmission method including: receiving, by a server, from a terminal, a terminal unique information acquisition request including a terminal unique public key certificate of the terminal; generating an encrypted terminal unique public key certificate by encrypting the terminal unique public key certificate of the terminal; checking, by the server, whether the generated encrypted terminal unique public key certificate is described in a discarded terminal information table; and transmitting, by the server, when the generated encrypted terminal unique public key certificate is not described in the discarded terminal information table, a terminal unique information of the terminal to the terminal.
    Type: Grant
    Filed: July 17, 2014
    Date of Patent: January 24, 2017
    Assignee: FUJITSU LIMITED
    Inventor: Hidefumi Maruyama
  • Patent number: 9553846
    Abstract: A virtual network (VN) realization method and system are provided. The method includes setting a VN-AP in a data center network and/or a broadband network. A service deployment and management function entity receives a VN service request from a user to generate feature information of the VN; a PC/VM automatically discovers the VN-AP, the automatically discovered VN-AP generates the VN forwarding table entry of the PC/VM after the PC/VM passes the identity authentication of the VN, and performs tunnel encapsulation according to the VN forwarding table entry to forward a packet from the PC/VM. By discovering a VN-AP for processing a VN automatically, the disclosure realizes the automatic and rapid deployment of the VN.
    Type: Grant
    Filed: April 10, 2013
    Date of Patent: January 24, 2017
    Assignee: ZTE Corporation
    Inventor: Zhongyu Gu
  • Patent number: 9536097
    Abstract: Methods and apparatus for displaying visual content on a display such that the content is comprehensible only to an authorized user for a visual display system such as a computer, a television, a video player, a public display system (including but not limited to a movie theater), a mobile phone, an automated teller machine (ATM), voting booths, kiosks, security screening workstations, tactical displays and other systems where information is displayed for viewing.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: January 3, 2017
    Inventors: William Anderson, Steven E. Turner, Steven J. Pujia, George L. Heron
  • Patent number: 9537653
    Abstract: According to an embodiment, an encryption key generating apparatus includes a converting unit to convert input data using a physically unclonable function and outputs output data; a memory to store a plurality of pattern data, each of which is a partial data in the output data indicated by one of a plurality of index data; a generating unit to generates an encryption key on the basis of the plural of index data; and a comparing unit to compare the output data with the plural of pattern data to detect plural of locations in the output data at which partial data similar to the plural of pattern data is present. The generating unit reproduces, as the plural of index data, the plural of locations detected by the comparing unit and reproduces the encryption key on the basis of the plural of index data that have been reproduced.
    Type: Grant
    Filed: December 11, 2012
    Date of Patent: January 3, 2017
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yuichi Komano, Kazuo Ohta, Kazuo Sakiyama
  • Patent number: 9537885
    Abstract: A system for providing secure browsing via a transparent network proxy is disclosed. The system may receive, from a client, a request to access a resource. The request may include an identifier that may be utilized to locate the resource. Once the request is received, the system may determine if the resource is not trusted, such as if the identifier is determined to be unknown or suspicious. If the resource is determined to not be trusted by the system, the system may forward the request to a virtual machine manager that may select a browser virtual machine from a pool of browser virtual machines. After the browser virtual machine is selected, the browser virtual machine may stream a rendering of the resource to the client based on the request. The rendering of the resource may be provided in lieu of the actual resource.
    Type: Grant
    Filed: December 2, 2013
    Date of Patent: January 3, 2017
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Paul Giura, Jeffrey E. Bickford, Donald E. Hendrix, Howard F. Shirokmann, Thomas A. Anschutz, Ching C. Shih