Patents Examined by Ngoc D Nguyen
-
Patent number: 9077716Abstract: An encrypted security system and associated methods for controlling physical access. The system includes a security server configured to receive a request for authentication from a mobile device, the request comprising information identifying the mobile device and a physical access control device. The security server forwards an encryption message comprising a plurality of unique identifiers to the physical access control device via the mobile device. The physical access control device is configured to authenticate the plurality of unique identifiers in the encryption message and operate an access control mechanism.Type: GrantFiled: June 16, 2011Date of Patent: July 7, 2015Assignee: Delphian Systems, LLCInventors: Gary L. Myers, Ashok Hirpara, John D. Veleris, Arkadiusz Zimny, Michael Aaron Cohen, Eugene Nakshin
-
Patent number: 9065816Abstract: A solution is described which allows mobile devices to specify that certain sites are allowed to be logged into based on the device credentials alone. The solution integrates OpenID with a telecommunications network in order to verify the user's identity. This verification is based on the trust that the telecom carrier has to identify the subscriber at the GGSN. The solution splits the OpenID Provider (OP) into two systems—an internal OP and an external OP. The external OP can reside in the public network and can allow the user to authenticate with a password. The internal OP resides in the private network of the carrier and is directly connected to the GGSN such that it is only reachable from the GGSN.Type: GrantFiled: June 15, 2011Date of Patent: June 23, 2015Assignee: ORACLE INTERNATIONAL CORPORATIONInventor: Jason Pollock
-
Patent number: 9064132Abstract: A method is disclosed. The method includes encrypting a first data, wherein the encrypting the first data set is performed using a first key, and the encrypting the first data set is performed using a dedicated encryption circuit. The first data set is stored on a first storage medium. A second data set is encrypted, wherein the encrypting the second data set is performed using a second key, and the encrypting the second data set is performed using the dedicated encryption circuit. The second data set is stored on the first storage medium.Type: GrantFiled: March 31, 2008Date of Patent: June 23, 2015Assignee: Symantec Operating CorporationInventors: Bryan C. Laird, Carl R. Seibert, Gregg R. Hamilton
-
Patent number: 9032497Abstract: Set forth herein are systems, methods, and non-transitory computer-readable storage media for processing media requests in a secure way. A server configured to practice the method receives, from a media player client, a request for media content. The server requests a playback token from a playback service associated with the media content and generates a tag containing the playback token. Then the server transmits to the media player client a response to the request for media content based on the tag, wherein the media player client retrieves the media content by presenting the playback token to the playback service. The media player client can be an embedded media player or other player in a web browser. The server and the playback service can operate based on a common, pre-shared feed token. Other playback client and playback service embodiments exist.Type: GrantFiled: June 15, 2011Date of Patent: May 12, 2015Assignee: CBS Interactive Inc.Inventors: Sailendra K. Padala, Emma Wei, Pedro Valentin Araujo
-
Patent number: 9009799Abstract: Secure access to a resource is provided by receiving a user request associated with a username for access for a resource and checking the username associated with the request against a reference username associated with the user. The reference username is linked to a second username associated with the user. If the received username matches the reference username, the request is modified by replacing the received username with the second username, and the modified request is forwarded towards the resource. A new username can be recorded upon receiving a request for the user. In response to the received request, the new username is recorded at a reference location linked to the location of the second username.Type: GrantFiled: October 5, 2007Date of Patent: April 14, 2015Assignee: British Telecommunications Public Limited CompanyInventor: Jeremy R Mason
-
Patent number: 9003196Abstract: Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that communicates with fixed PC's, servers and mobile devices (e.g., smartphones) operated by users. The systems and methods described herein enable a series of operations whereby a user attempting to access an access-controlled environment is prompted to biometrically authenticate using the user's preregistered mobile device. Biometric authentication can include capturing images of the user's biometric features, encoding the features as a biometric identifier, comparing the biometric identifier to a previously generated biometric identifier and determining liveness. In addition, the authentication system can further authorize the user and electronically grant access to the access-controlled environment.Type: GrantFiled: May 13, 2014Date of Patent: April 7, 2015Assignee: Hoyos Labs Corp.Inventors: Hector Hoyos, Jason Braverman, Scott Streit, Geoffrey Xiao, Jonathan Francis Mather
-
Patent number: 8972731Abstract: Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an image or audio signal. The image or audio signal is transmitted from the first computing device to the second computing device. The password is determined from the image or audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein.Type: GrantFiled: June 8, 2012Date of Patent: March 3, 2015Assignee: BlackBerry LimitedInventors: Michael S. Brown, Herbert A. Little
-
License management system, and computer-readable recording medium storing license management program
Patent number: 8966618Abstract: Provided is a license management system comprising: a license check device that independently operates on a platform; and an information processing device that is connected to the license check device, in which the license check device includes: a license check unit that checks for presence or absence of a license of the information processing device; a first start unit that starts the license check unit in response to a call instructed by the platform; and a calling unit that calls, when the license check unit determines that the license is present, the information processing device, and in which the information processing device includes: an information processing unit that performs a specific information processing; and a second start unit that starts the information processing unit only in response to the call from the license check device.Type: GrantFiled: November 21, 2008Date of Patent: February 24, 2015Assignee: Kyocera Document Solutions Inc.Inventors: Keiko Yamaguchi, Takashi Araki -
Patent number: 8959346Abstract: Various embodiments of a system and method for a single request-single response protocol with mutual replay attack protection are described. Embodiments include a system that receives multiple single request messages, each of which include a respective nonce, timestamp, and digital signature. The system may create a record of previously received nonces that, at any given time, may include multiple message nonces received within a valid period of time prior to that given time. To validate a given single request message, the system verifies the digital signature of the message, determines that the timestamp of the message indicates a time within the valid period of time prior to the current time, and determines that the nonce of the message is not present within the record of previously received nonces. The system sends a single response message that includes the same nonce as the validated message.Type: GrantFiled: January 30, 2013Date of Patent: February 17, 2015Assignee: Adobe Systems IncorporatedInventor: Sunil C. Agrawal
-
Patent number: 8918888Abstract: A method for implementing a security agent on behalf of a device, the method comprising: obtaining a list of applications installed on the device from a remote repository; for each respective application on the list, comparing reputation attributes obtained from a reputation database against attributes of the application installed on the device; and for any of the respective applications for which it is determined from the comparing that the application installed on the device is malicious, taking action to limit malicious activity by the respective application installed on the device.Type: GrantFiled: January 16, 2014Date of Patent: December 23, 2014Assignee: F-Secure CorporationInventor: Pirkka Palomaki
-
Patent number: 8875274Abstract: A method for a user agent to access a session policy in a network is provided. The method comprises sending, from the user agent, a single session policy request to a single network component, the single network component contacting a plurality of network components, wherein sending the single session policy request to the single network component utilizes a lower layer protocol. The lower layer protocol is at least one of Extensible Authentication Protocol (EAP), Point to Point Protocol (PPP), and General Packet Radio Service (GPRS) Activate Packet Data Protocol (PDP) context. The method further comprises aggregating policy information and providing the aggregated policy information to the user agent.Type: GrantFiled: November 10, 2009Date of Patent: October 28, 2014Assignee: BlackBerry LimitedInventors: Michael Montemurro, Andrew Allen, Adrian Buckley
-
Patent number: 8850221Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.Type: GrantFiled: April 22, 2013Date of Patent: September 30, 2014Assignee: Gemalto SAInventors: Stephanie Salgado, David Vigilant, Guillaume Fumaroli
-
Patent number: 8826040Abstract: The present invention relates to a product information system and a corresponding method in a product information system with products 2, to which there are applied machine-readable items of information 14. A data service 5 for data 16 allocated to the products is furnished. The machine-readable item of information 14 applied to a product 2 are read by a data requester 4. The data allocated to the product are requested through sending the read machine-readable data to the data service 5, the data request 15 is received by the data service 5, the requested data 16 are determined by the data service 5 and sent by the data service 5 to the data requester 4. In the step of determining the requested data 16, the data are generated by decrypting encrypted data 11-13 using the machine-readable items of information 14 received with the data request.Type: GrantFiled: July 22, 2009Date of Patent: September 2, 2014Assignee: Giesecke & Devrient GmbHInventor: Michael Fiedler
-
Patent number: 8799665Abstract: A third-party watermark is inserted into a file or files uploaded by a client to a storing party such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a bootlegged copy.Type: GrantFiled: June 13, 2013Date of Patent: August 5, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Thomas Killian, Norman L. Schryer
-
Patent number: 8769655Abstract: A system and method for more efficiently establishing a chain of trust from a registrant to a registry. A registrant credential is associated with a Shared Registration command and is sent by a registrar to a registry. Upon successful validation, a token is generated and bound to a registrant identifier. The token is included along with the registrant identifier in subsequent discrete Shared Registration commands submitted to the registry on behalf of the registrant. The registrant thus needs to submit its credential only once for changes that require several discrete commands. Also, it is more efficient for the Shared Registration System to validate a token for a set of commands than to validate different registrant credential for each discrete command.Type: GrantFiled: December 30, 2010Date of Patent: July 1, 2014Assignee: Verisign, Inc.Inventors: James Gould, David Smith, Mingliang Pei
-
Patent number: 8667328Abstract: A method and system for protecting computer system state in one aspect generates signatures associated with system dump data, compares the signatures with those of the previous system dump data. Only those system dump data whose signatures are different from the previous dump are transferred for storing.Type: GrantFiled: April 28, 2009Date of Patent: March 4, 2014Assignee: CA, Inc.Inventors: Victor Liu, Jinqiang Wang, Peter Peng
-
Patent number: 8656187Abstract: A method operating on a computer begins by generating a read command to read at least some of a plurality of data slices from a dispersed storage network. The method continues by receiving the at least some of the plurality of data slices. The method continues by performing a reverse information dispersal algorithm on at least some of the plurality of data slices to produce a plurality of transposed data elements. The method continues by reverse transposing the plurality of transposed data elements to recover data elements of a data segment.Type: GrantFiled: August 26, 2009Date of Patent: February 18, 2014Assignee: Cleversafe, Inc.Inventors: Wesley Leggette, Jason K. Resch
-
Patent number: 8584260Abstract: A storage medium includes an ID registration area for storing therein a main body ID which is an ID unique to an information processing apparatus. The information processing apparatus has the main body ID stored therein. The information processing apparatus includes copying means for, when the storage medium is attached thereto, copying a program stored in the storage medium thereinto in the case where the main body ID has not yet been registered. When the copy is made, the main body ID is stored into the ID registration area of the storage medium. The information processing apparatus also includes execution program selecting means for selecting, from the copied program and from the program stored in the storage medium, a program to be executed.Type: GrantFiled: June 10, 2008Date of Patent: November 12, 2013Assignee: Nintendo Co., Ltd.Inventor: Ryuji Umezu
-
Patent number: 8572675Abstract: A method and apparatus for cross-domain Web-service publishing of information regarding a Web service provider in a first domain having a first security clearance access level into a second domain having a second security clearance access level across a cross-domain security system may comprise a cross-domain publishing service within the second domain receiving through the security system a request to publish information regarding the Web service provider located in the first domain; and may comprise the cross-domain publishing service establishing a surrogate end point within the second domain corresponding to the Web service provider and making available at the surrogate end point Web service information regarding the provision of a Web service by the Web service provider. The second domain cross-domain publishing service may register the Web service provider within the second domain and may also provide a link to the surrogate endpoint.Type: GrantFiled: April 3, 2009Date of Patent: October 29, 2013Assignee: The Boeing CompanyInventor: David Chazin
-
Patent number: 8510608Abstract: Provided is an information security apparatus that has enhanced stability and confidentiality of a hash key. The information security apparatus includes an information generating PUF unit that has tamper resistance set, using physical characteristics, so as to output a preset hash key, a partial error-correction information storage unit that stores partial error-correction information, an error correcting PUF unit that has tamper-resistance set, using physical characteristics, so as to output error-correcting PUF information, an error-correction information generating unit that generates error-correction information using partial correction information and the error-correcting PUF information, and an error correcting unit that corrects an error for the hash key outputted from the information generating PUF unit and outputs an error-corrected hash key.Type: GrantFiled: November 2, 2007Date of Patent: August 13, 2013Assignee: Panasonic CorporationInventors: Yuichi Futa, Kaoru Yokota, Masao Nonaka, Manabu Maeda, Natsume Matsuzaki