Patents Examined by Nasser Moazzami
  • Patent number: 8056128
    Abstract: A system includes a data repository and a processing unit. The data repository stores data associated with a corpus of documents hosted on one or more servers. The processing unit analyzes data associated with a suspect document from the corpus of documents. The processing unit further assigns a score, based on the analyzed data, to the suspect document that indicates whether the suspect document is potentially fraudulent.
    Type: Grant
    Filed: September 30, 2004
    Date of Patent: November 8, 2011
    Assignee: Google Inc.
    Inventors: Adam Dingle, Niels Provos, Fritz Schneider, Matt Cutts
  • Patent number: 8056122
    Abstract: A user authentication method of authenticating a user on an on-line basis using a user's e-mail address and hardware information is provided. The user authentication method includes the steps of: transmitting a user's authentication client platform hardware information and e-mail address to an authentication server module through an authentication client module installed in the authentication client platform; and the authentication client module determining user authentication according to whether or not the e-mail address and hardware information received from the authentication server module is identical to user's e-mail address and hardware information stored in an authentication database. A user's authentication request and authentication is confirmed through an e-mail in the case that authentication fails in the primary authentication process. The user authentication method performs authentication by using a user's hardware information and e-mail address, their uniqueness of which is verified.
    Type: Grant
    Filed: May 26, 2003
    Date of Patent: November 8, 2011
    Assignee: Fasoo.com Co., Ltd.
    Inventors: Ku Gon Cho, Ho Gab Kang, In Gee Kim, Kyu Soo Kim
  • Patent number: 8056131
    Abstract: Apparatus, methods and articles of manufacture are disclosed for intercepting, examining and controlling proscribed or predetermined code, data and files and their transfers. A preprocessing component, code decomposition component, valuation component and comparison component are used to process code. The methods of valuation used include numerical valuation so as to obtain a numerical value for the code. Additional features may include a decryption feature, code alteration component and other components.
    Type: Grant
    Filed: April 26, 2004
    Date of Patent: November 8, 2011
    Assignee: Cybersoft, Inc.
    Inventors: Peter V. Radatti, Richard J. Perry, Gary L. Blawat, II
  • Patent number: 8056138
    Abstract: A piracy protection system incorporates tamper detection capabilities into a protected copy of an application by disassembling a statically linked binary of the application, modifying some of the instructions in the application, and then rewriting all of the modified and unmodified instructions to a new executable file, a protected copy. The piracy protection system comprises an offline tamper detection technique in which the software itself detects the tampering and causes the program to fail, therefore protecting itself from malicious attacks. The system further comprises a dynamic software-watermarking process that incorporates code obfuscation to prevent reverse engineering.
    Type: Grant
    Filed: February 26, 2005
    Date of Patent: November 8, 2011
    Assignee: International Business Machines Corporation
    Inventors: Hongxia Jin, Ginger Myles
  • Patent number: 8050411
    Abstract: A device stores one-time pad data for use in carrying out various tasks. In order to preserve the ability to carry out important tasks that require the use of one-time data, use of the one-time pad data held by the device is controlled such that an amount of this one-time pad data is only usable by a predetermined set of important tasks comprising at least a replenishment task for replenishing the device with one-time pad data.
    Type: Grant
    Filed: July 17, 2006
    Date of Patent: November 1, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: William John Munro, Timothy Paul Spiller, Martin Sadler, Christopher Tofts, Keith Alexander Harrison
  • Patent number: 8051299
    Abstract: A method for secure loading, integrity checking of the runtime image and control over the runtime execution of applications which ensures that a software application loads only code it was authorized to load, and that the software application is monitored for unauthorized modifications of the runtime image. The method proposed can be used as a basis for further enforcing of authorization rules during the execution of an application, e.g. for Digital Rights Management.
    Type: Grant
    Filed: March 20, 2006
    Date of Patent: November 1, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Louisa Saunier
  • Patent number: 8051470
    Abstract: A method for automatic user authentication is described. In response to a coupling of a separate hardware security device to a data processing system, credential information for each of a plurality of applications that the user uses is received from the separate hardware security device into an authentication credential container associated with the user. A plurality of applications accessible by a user are identified by examining authentication credential container of the user. A view of the plurality of applications accessible by the user is generated. The view is a consolidated user directory that contains user authentication information across the plurality of applications. The view may then be displayed to an administrator.
    Type: Grant
    Filed: July 11, 2003
    Date of Patent: November 1, 2011
    Assignee: International Business Machines Corporation
    Inventor: Peng T. Ong
  • Patent number: 8051471
    Abstract: An information processing device, comprising a reading unit that reads, from a recording medium that records information relevant to authentication, the information relevant to authentication, an acquisition unit that acquires information about a contact destination designated in association with the recording medium, when reading of the information from the recording medium by the reading unit remains continuously possible during a period of time between completion of a process instructed by a user who is authenticated based on the information recorded in the recording medium and elapse of a predetermined period of time after the completion, and a transmission unit that sends predetermined information to the contact destination specified by the acquired information.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: November 1, 2011
    Assignee: Fuji Xerox Co., Ltd.
    Inventor: Rie Shishido
  • Patent number: 8051484
    Abstract: A method for detecting and blocking web attacks, the method comprising identifying read-only parameters by parsing responses received from uniform resource locators. The combinations of binding correlation values (BCVs) of the read-only parameters are compared to their respective previously observed values.
    Type: Grant
    Filed: June 9, 2006
    Date of Patent: November 1, 2011
    Assignee: Imperva, Inc.
    Inventors: Amichai Shulman, Gur Shatz, Ido Yellin
  • Patent number: 8046582
    Abstract: A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold A(x, y, s, t) which is expressed by x-coordinate, y-coordinate, parameter s, and parameter t and is defined on finite field Fq, x-coordinate and y-coordinate of section being expressed by functions of parameter s and parameter t, calculates hash value of message m, generates hash value polynomial by embedding hash value in 1-variable polynomial h(t) defined on finite field Fq, and generates digital signature Ds(Ux(t), Uy(t), t) which is curve on section, the x-coordinate and y-coordinate of curve being expressed by functions of parameter t, by substituting hash value polynomial in parameter s of section.
    Type: Grant
    Filed: October 14, 2010
    Date of Patent: October 25, 2011
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Koichiro Akiyama, Yasuhiro Goto
  • Patent number: 8046828
    Abstract: A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described.
    Type: Grant
    Filed: April 23, 2009
    Date of Patent: October 25, 2011
    Assignee: Verizon Services Corp.
    Inventors: Gaston S. Ormazabal, Edward P. Harvey, James E. Sylvester
  • Patent number: 8046833
    Abstract: A policy component includes policy configuration information. The policy configuration information contains one or more rules. Each rule and group of rules can be associated with a set of response actions. As the nodes on the monitored networks change or intrusive actions are introduced on the networks, network change events or intrusion events are generated. The policy component correlates network change events and/or intrusions events with network map information. The network map contains information on the network topology, services and network devices, amongst other things. When certain criteria is satisfied based on the correlation, a policy violation event may be issued by the system resulting in alerts or remediations.
    Type: Grant
    Filed: November 14, 2005
    Date of Patent: October 25, 2011
    Assignee: Sourcefire, Inc.
    Inventors: Eric Gustafson, Brian P. Rittermann
  • Patent number: 8045707
    Abstract: Systems and systems that protect data are provided. In one embodiment, a system may include, for example, a memory and a processor. The memory may store, for example, encrypted data. The processor may be coupled to the memory and may include, for example, a decryptor that decrypts the encrypted data. The decryptor may be adapted, for example, to variably bit roll the encrypted data, to fixedly bit shuffle the bit-rolled data, to add a first key to the bit-shuffled data and to process the added data with a second key.
    Type: Grant
    Filed: October 28, 2003
    Date of Patent: October 25, 2011
    Assignee: Broadcom Corporation
    Inventors: Steve W. Rodgers, Sherman (Xuemin) Chen, Iue-Shuenn Chen
  • Patent number: 8042152
    Abstract: A home network system including a server apparatus and an apparatus, which are capable of communicating therebetween, each of which has an authentication ID control unit equipped with an authentication ID storage unit for storing an authentication ID given from an authentication ID giving unit. Connection between the server apparatus and the client apparatus is established by the authentication ID control unit when the given authentication IDs match with each other, wherein the authentication ID giving unit includes a remote control unit capable of communicating with the server apparatus and the client apparatus by using an infrared ray and gives an identical authentication ID to the server apparatus or the client apparatus on the basis of a predetermined input operation.
    Type: Grant
    Filed: March 24, 2006
    Date of Patent: October 18, 2011
    Assignee: Funai Electric Co., Ltd.
    Inventor: Nobuyuki Kimura
  • Patent number: 8042161
    Abstract: Whitelists are automatically shared between users and/or domains without compromising user/domain privacy. Potential trust partners with whom to share whitelist data are automatically identified. A handshaking procedure is carried out to confirm the trust relationship and verify the partner's identity. Once a trust partner is confirmed, the parties can exchange acceptance criteria specifying the types of whitelist data they want to receive. Each party can provide the other with the appropriate entries from its own whitelist. The parties keep each other updated, as their own whitelists change.
    Type: Grant
    Filed: March 29, 2007
    Date of Patent: October 18, 2011
    Assignee: Symantec Corporation
    Inventors: Shaun Cooley, Bruce McCorkendale
  • Patent number: 8041036
    Abstract: A method and apparatus for preventing the use of data involves creating a first association between a set of labels and a first set of codes, where the set of labels contains information to be displayed on a computer, while each code in the first set of codes is associated with a particular label. An encryption key is linked with the first association. The set of labels, the first set of codes, and the first encryption key are sent to the computer. Later, when codes from the first set of codes and the first encryption key are received back from the computer, the codes returned from the computer are then matched to labels from the set of labels using the first encryption key. Subsequent, different associations between the set of labels and other sets of codes are created, and additional encryption keys are also created to identify the subsequent associations.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: October 18, 2011
    Assignee: Southwest Airlines Co.
    Inventors: Mark A. Gerber, Kevin M. Krone, Bradley D. Newcomb, Robert S. Shaffer, Chris Stromberger, Steven F. Taylor
  • Patent number: 8041933
    Abstract: A system for selectively enabling a microprocessor-based system is disclosed. State information that describes the operating conditions or circumstances under which a user intends to operate the system is obtained. In the preferred embodiment of the invention, a valid hash value is determined, preferably based on the state information and preferably by locating the valid hash value within a table of valid hash values indexed by the state information. Candidate authorization information is obtained from the user, and a candidate hash value is generated by applying a hashing algorithm to the candidate authorization information, the state information, or a combination of the candidate authorization information and state information. The candidate hash value and the valid hash value are then compared, and the microprocessor-based system is enabled if the candidate hash value matches the valid hash value.
    Type: Grant
    Filed: June 4, 2009
    Date of Patent: October 18, 2011
    Assignee: The Invention Science Fund I
    Inventors: Bran Ferren, W. Daniel Hillis
  • Patent number: 8042151
    Abstract: A context based access control system that includes a set of one or more authorization contexts that are activated in response to selection of different functions or tasks or other functional boundary object of an application program. The authorization contexts are associated with one or more access policies that are invoked in response to activation of the one or more authorization contexts.
    Type: Grant
    Filed: December 20, 2005
    Date of Patent: October 18, 2011
    Assignee: Microsoft Corporation
    Inventors: Geir Olsen, Lee C. Spiesman, Michael D. Smith
  • Patent number: 8041947
    Abstract: System for providing a secure file service includes an MLS file service module (300) comprised of a cryptographic processor (302). The MLS file service module also includes an MLS file system (301) hosted by the cryptographic processor. A secure user processor (402) includes programming and communications hardware for requesting at least one classified file from the MLS file service module. The cryptographic processor includes cryptographic hardware and software to decrypt the classified file. The cryptographic processor is also performs an integrity check on the classified file. Once the file is decrypted and its integrity checked by the cryptographic processor, the MLS file service module serves the classified file to the secure user processor in decrypted form. If the classified file is an executable file, the method also includes selectively enabling a write function for program memory of the secure user processor.
    Type: Grant
    Filed: March 23, 2006
    Date of Patent: October 18, 2011
    Assignee: Harris Corporation
    Inventors: Terence W. O'Brien, Richard Schmalbach, John Blessing, Jeffrey Murray
  • Patent number: 8042176
    Abstract: A storage medium stores a program of instructions executable by a computer to perform a function for preventing unauthorized use of program data. The function has a process of judging whether or not a storage area of the program data is writable and a process of executing an unauthorized use prevention process to prevent an unauthorized use of the program data stored in the storage area when the storage area of the program data is writable.
    Type: Grant
    Filed: July 18, 2005
    Date of Patent: October 18, 2011
    Assignee: Fuji Xerox Co., Ltd.
    Inventors: Mitsuhisa Kamei, Kazuo Saito