Abstract: A system includes a data repository and a processing unit. The data repository stores data associated with a corpus of documents hosted on one or more servers. The processing unit analyzes data associated with a suspect document from the corpus of documents. The processing unit further assigns a score, based on the analyzed data, to the suspect document that indicates whether the suspect document is potentially fraudulent.
Type:
Grant
Filed:
September 30, 2004
Date of Patent:
November 8, 2011
Assignee:
Google Inc.
Inventors:
Adam Dingle, Niels Provos, Fritz Schneider, Matt Cutts
Abstract: A user authentication method of authenticating a user on an on-line basis using a user's e-mail address and hardware information is provided. The user authentication method includes the steps of: transmitting a user's authentication client platform hardware information and e-mail address to an authentication server module through an authentication client module installed in the authentication client platform; and the authentication client module determining user authentication according to whether or not the e-mail address and hardware information received from the authentication server module is identical to user's e-mail address and hardware information stored in an authentication database. A user's authentication request and authentication is confirmed through an e-mail in the case that authentication fails in the primary authentication process. The user authentication method performs authentication by using a user's hardware information and e-mail address, their uniqueness of which is verified.
Type:
Grant
Filed:
May 26, 2003
Date of Patent:
November 8, 2011
Assignee:
Fasoo.com Co., Ltd.
Inventors:
Ku Gon Cho, Ho Gab Kang, In Gee Kim, Kyu Soo Kim
Abstract: Apparatus, methods and articles of manufacture are disclosed for intercepting, examining and controlling proscribed or predetermined code, data and files and their transfers. A preprocessing component, code decomposition component, valuation component and comparison component are used to process code. The methods of valuation used include numerical valuation so as to obtain a numerical value for the code. Additional features may include a decryption feature, code alteration component and other components.
Type:
Grant
Filed:
April 26, 2004
Date of Patent:
November 8, 2011
Assignee:
Cybersoft, Inc.
Inventors:
Peter V. Radatti, Richard J. Perry, Gary L. Blawat, II
Abstract: A piracy protection system incorporates tamper detection capabilities into a protected copy of an application by disassembling a statically linked binary of the application, modifying some of the instructions in the application, and then rewriting all of the modified and unmodified instructions to a new executable file, a protected copy. The piracy protection system comprises an offline tamper detection technique in which the software itself detects the tampering and causes the program to fail, therefore protecting itself from malicious attacks. The system further comprises a dynamic software-watermarking process that incorporates code obfuscation to prevent reverse engineering.
Type:
Grant
Filed:
February 26, 2005
Date of Patent:
November 8, 2011
Assignee:
International Business Machines Corporation
Abstract: A device stores one-time pad data for use in carrying out various tasks. In order to preserve the ability to carry out important tasks that require the use of one-time data, use of the one-time pad data held by the device is controlled such that an amount of this one-time pad data is only usable by a predetermined set of important tasks comprising at least a replenishment task for replenishing the device with one-time pad data.
Type:
Grant
Filed:
July 17, 2006
Date of Patent:
November 1, 2011
Assignee:
Hewlett-Packard Development Company, L.P.
Inventors:
William John Munro, Timothy Paul Spiller, Martin Sadler, Christopher Tofts, Keith Alexander Harrison
Abstract: A method for secure loading, integrity checking of the runtime image and control over the runtime execution of applications which ensures that a software application loads only code it was authorized to load, and that the software application is monitored for unauthorized modifications of the runtime image. The method proposed can be used as a basis for further enforcing of authorization rules during the execution of an application, e.g. for Digital Rights Management.
Type:
Grant
Filed:
March 20, 2006
Date of Patent:
November 1, 2011
Assignee:
Hewlett-Packard Development Company, L.P.
Abstract: A method for automatic user authentication is described. In response to a coupling of a separate hardware security device to a data processing system, credential information for each of a plurality of applications that the user uses is received from the separate hardware security device into an authentication credential container associated with the user. A plurality of applications accessible by a user are identified by examining authentication credential container of the user. A view of the plurality of applications accessible by the user is generated. The view is a consolidated user directory that contains user authentication information across the plurality of applications. The view may then be displayed to an administrator.
Type:
Grant
Filed:
July 11, 2003
Date of Patent:
November 1, 2011
Assignee:
International Business Machines Corporation
Abstract: An information processing device, comprising a reading unit that reads, from a recording medium that records information relevant to authentication, the information relevant to authentication, an acquisition unit that acquires information about a contact destination designated in association with the recording medium, when reading of the information from the recording medium by the reading unit remains continuously possible during a period of time between completion of a process instructed by a user who is authenticated based on the information recorded in the recording medium and elapse of a predetermined period of time after the completion, and a transmission unit that sends predetermined information to the contact destination specified by the acquired information.
Abstract: A method for detecting and blocking web attacks, the method comprising identifying read-only parameters by parsing responses received from uniform resource locators. The combinations of binding correlation values (BCVs) of the read-only parameters are compared to their respective previously observed values.
Abstract: A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold A(x, y, s, t) which is expressed by x-coordinate, y-coordinate, parameter s, and parameter t and is defined on finite field Fq, x-coordinate and y-coordinate of section being expressed by functions of parameter s and parameter t, calculates hash value of message m, generates hash value polynomial by embedding hash value in 1-variable polynomial h(t) defined on finite field Fq, and generates digital signature Ds(Ux(t), Uy(t), t) which is curve on section, the x-coordinate and y-coordinate of curve being expressed by functions of parameter t, by substituting hash value polynomial in parameter s of section.
Abstract: A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described.
Type:
Grant
Filed:
April 23, 2009
Date of Patent:
October 25, 2011
Assignee:
Verizon Services Corp.
Inventors:
Gaston S. Ormazabal, Edward P. Harvey, James E. Sylvester
Abstract: A policy component includes policy configuration information. The policy configuration information contains one or more rules. Each rule and group of rules can be associated with a set of response actions. As the nodes on the monitored networks change or intrusive actions are introduced on the networks, network change events or intrusion events are generated. The policy component correlates network change events and/or intrusions events with network map information. The network map contains information on the network topology, services and network devices, amongst other things. When certain criteria is satisfied based on the correlation, a policy violation event may be issued by the system resulting in alerts or remediations.
Abstract: Systems and systems that protect data are provided. In one embodiment, a system may include, for example, a memory and a processor. The memory may store, for example, encrypted data. The processor may be coupled to the memory and may include, for example, a decryptor that decrypts the encrypted data. The decryptor may be adapted, for example, to variably bit roll the encrypted data, to fixedly bit shuffle the bit-rolled data, to add a first key to the bit-shuffled data and to process the added data with a second key.
Type:
Grant
Filed:
October 28, 2003
Date of Patent:
October 25, 2011
Assignee:
Broadcom Corporation
Inventors:
Steve W. Rodgers, Sherman (Xuemin) Chen, Iue-Shuenn Chen
Abstract: A home network system including a server apparatus and an apparatus, which are capable of communicating therebetween, each of which has an authentication ID control unit equipped with an authentication ID storage unit for storing an authentication ID given from an authentication ID giving unit. Connection between the server apparatus and the client apparatus is established by the authentication ID control unit when the given authentication IDs match with each other, wherein the authentication ID giving unit includes a remote control unit capable of communicating with the server apparatus and the client apparatus by using an infrared ray and gives an identical authentication ID to the server apparatus or the client apparatus on the basis of a predetermined input operation.
Abstract: Whitelists are automatically shared between users and/or domains without compromising user/domain privacy. Potential trust partners with whom to share whitelist data are automatically identified. A handshaking procedure is carried out to confirm the trust relationship and verify the partner's identity. Once a trust partner is confirmed, the parties can exchange acceptance criteria specifying the types of whitelist data they want to receive. Each party can provide the other with the appropriate entries from its own whitelist. The parties keep each other updated, as their own whitelists change.
Abstract: A method and apparatus for preventing the use of data involves creating a first association between a set of labels and a first set of codes, where the set of labels contains information to be displayed on a computer, while each code in the first set of codes is associated with a particular label. An encryption key is linked with the first association. The set of labels, the first set of codes, and the first encryption key are sent to the computer. Later, when codes from the first set of codes and the first encryption key are received back from the computer, the codes returned from the computer are then matched to labels from the set of labels using the first encryption key. Subsequent, different associations between the set of labels and other sets of codes are created, and additional encryption keys are also created to identify the subsequent associations.
Type:
Grant
Filed:
May 9, 2008
Date of Patent:
October 18, 2011
Assignee:
Southwest Airlines Co.
Inventors:
Mark A. Gerber, Kevin M. Krone, Bradley D. Newcomb, Robert S. Shaffer, Chris Stromberger, Steven F. Taylor
Abstract: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value.
Abstract: A context based access control system that includes a set of one or more authorization contexts that are activated in response to selection of different functions or tasks or other functional boundary object of an application program. The authorization contexts are associated with one or more access policies that are invoked in response to activation of the one or more authorization contexts.
Type:
Grant
Filed:
December 20, 2005
Date of Patent:
October 18, 2011
Assignee:
Microsoft Corporation
Inventors:
Geir Olsen, Lee C. Spiesman, Michael D. Smith
Abstract: System for providing a secure file service includes an MLS file service module (300) comprised of a cryptographic processor (302). The MLS file service module also includes an MLS file system (301) hosted by the cryptographic processor. A secure user processor (402) includes programming and communications hardware for requesting at least one classified file from the MLS file service module. The cryptographic processor includes cryptographic hardware and software to decrypt the classified file. The cryptographic processor is also performs an integrity check on the classified file. Once the file is decrypted and its integrity checked by the cryptographic processor, the MLS file service module serves the classified file to the secure user processor in decrypted form. If the classified file is an executable file, the method also includes selectively enabling a write function for program memory of the secure user processor.
Type:
Grant
Filed:
March 23, 2006
Date of Patent:
October 18, 2011
Assignee:
Harris Corporation
Inventors:
Terence W. O'Brien, Richard Schmalbach, John Blessing, Jeffrey Murray
Abstract: A storage medium stores a program of instructions executable by a computer to perform a function for preventing unauthorized use of program data. The function has a process of judging whether or not a storage area of the program data is writable and a process of executing an unauthorized use prevention process to prevent an unauthorized use of the program data stored in the storage area when the storage area of the program data is writable.