Patents Examined by Ngoc D Nguyen
  • Patent number: 9077716
    Abstract: An encrypted security system and associated methods for controlling physical access. The system includes a security server configured to receive a request for authentication from a mobile device, the request comprising information identifying the mobile device and a physical access control device. The security server forwards an encryption message comprising a plurality of unique identifiers to the physical access control device via the mobile device. The physical access control device is configured to authenticate the plurality of unique identifiers in the encryption message and operate an access control mechanism.
    Type: Grant
    Filed: June 16, 2011
    Date of Patent: July 7, 2015
    Assignee: Delphian Systems, LLC
    Inventors: Gary L. Myers, Ashok Hirpara, John D. Veleris, Arkadiusz Zimny, Michael Aaron Cohen, Eugene Nakshin
  • Patent number: 9065816
    Abstract: A solution is described which allows mobile devices to specify that certain sites are allowed to be logged into based on the device credentials alone. The solution integrates OpenID with a telecommunications network in order to verify the user's identity. This verification is based on the trust that the telecom carrier has to identify the subscriber at the GGSN. The solution splits the OpenID Provider (OP) into two systems—an internal OP and an external OP. The external OP can reside in the public network and can allow the user to authenticate with a password. The internal OP resides in the private network of the carrier and is directly connected to the GGSN such that it is only reachable from the GGSN.
    Type: Grant
    Filed: June 15, 2011
    Date of Patent: June 23, 2015
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventor: Jason Pollock
  • Patent number: 9064132
    Abstract: A method is disclosed. The method includes encrypting a first data, wherein the encrypting the first data set is performed using a first key, and the encrypting the first data set is performed using a dedicated encryption circuit. The first data set is stored on a first storage medium. A second data set is encrypted, wherein the encrypting the second data set is performed using a second key, and the encrypting the second data set is performed using the dedicated encryption circuit. The second data set is stored on the first storage medium.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: June 23, 2015
    Assignee: Symantec Operating Corporation
    Inventors: Bryan C. Laird, Carl R. Seibert, Gregg R. Hamilton
  • Patent number: 9032497
    Abstract: Set forth herein are systems, methods, and non-transitory computer-readable storage media for processing media requests in a secure way. A server configured to practice the method receives, from a media player client, a request for media content. The server requests a playback token from a playback service associated with the media content and generates a tag containing the playback token. Then the server transmits to the media player client a response to the request for media content based on the tag, wherein the media player client retrieves the media content by presenting the playback token to the playback service. The media player client can be an embedded media player or other player in a web browser. The server and the playback service can operate based on a common, pre-shared feed token. Other playback client and playback service embodiments exist.
    Type: Grant
    Filed: June 15, 2011
    Date of Patent: May 12, 2015
    Assignee: CBS Interactive Inc.
    Inventors: Sailendra K. Padala, Emma Wei, Pedro Valentin Araujo
  • Patent number: 9009799
    Abstract: Secure access to a resource is provided by receiving a user request associated with a username for access for a resource and checking the username associated with the request against a reference username associated with the user. The reference username is linked to a second username associated with the user. If the received username matches the reference username, the request is modified by replacing the received username with the second username, and the modified request is forwarded towards the resource. A new username can be recorded upon receiving a request for the user. In response to the received request, the new username is recorded at a reference location linked to the location of the second username.
    Type: Grant
    Filed: October 5, 2007
    Date of Patent: April 14, 2015
    Assignee: British Telecommunications Public Limited Company
    Inventor: Jeremy R Mason
  • Patent number: 9003196
    Abstract: Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that communicates with fixed PC's, servers and mobile devices (e.g., smartphones) operated by users. The systems and methods described herein enable a series of operations whereby a user attempting to access an access-controlled environment is prompted to biometrically authenticate using the user's preregistered mobile device. Biometric authentication can include capturing images of the user's biometric features, encoding the features as a biometric identifier, comparing the biometric identifier to a previously generated biometric identifier and determining liveness. In addition, the authentication system can further authorize the user and electronically grant access to the access-controlled environment.
    Type: Grant
    Filed: May 13, 2014
    Date of Patent: April 7, 2015
    Assignee: Hoyos Labs Corp.
    Inventors: Hector Hoyos, Jason Braverman, Scott Streit, Geoffrey Xiao, Jonathan Francis Mather
  • Patent number: 8972731
    Abstract: Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an image or audio signal. The image or audio signal is transmitted from the first computing device to the second computing device. The password is determined from the image or audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein.
    Type: Grant
    Filed: June 8, 2012
    Date of Patent: March 3, 2015
    Assignee: BlackBerry Limited
    Inventors: Michael S. Brown, Herbert A. Little
  • Patent number: 8966618
    Abstract: Provided is a license management system comprising: a license check device that independently operates on a platform; and an information processing device that is connected to the license check device, in which the license check device includes: a license check unit that checks for presence or absence of a license of the information processing device; a first start unit that starts the license check unit in response to a call instructed by the platform; and a calling unit that calls, when the license check unit determines that the license is present, the information processing device, and in which the information processing device includes: an information processing unit that performs a specific information processing; and a second start unit that starts the information processing unit only in response to the call from the license check device.
    Type: Grant
    Filed: November 21, 2008
    Date of Patent: February 24, 2015
    Assignee: Kyocera Document Solutions Inc.
    Inventors: Keiko Yamaguchi, Takashi Araki
  • Patent number: 8959346
    Abstract: Various embodiments of a system and method for a single request-single response protocol with mutual replay attack protection are described. Embodiments include a system that receives multiple single request messages, each of which include a respective nonce, timestamp, and digital signature. The system may create a record of previously received nonces that, at any given time, may include multiple message nonces received within a valid period of time prior to that given time. To validate a given single request message, the system verifies the digital signature of the message, determines that the timestamp of the message indicates a time within the valid period of time prior to the current time, and determines that the nonce of the message is not present within the record of previously received nonces. The system sends a single response message that includes the same nonce as the validated message.
    Type: Grant
    Filed: January 30, 2013
    Date of Patent: February 17, 2015
    Assignee: Adobe Systems Incorporated
    Inventor: Sunil C. Agrawal
  • Patent number: 8918888
    Abstract: A method for implementing a security agent on behalf of a device, the method comprising: obtaining a list of applications installed on the device from a remote repository; for each respective application on the list, comparing reputation attributes obtained from a reputation database against attributes of the application installed on the device; and for any of the respective applications for which it is determined from the comparing that the application installed on the device is malicious, taking action to limit malicious activity by the respective application installed on the device.
    Type: Grant
    Filed: January 16, 2014
    Date of Patent: December 23, 2014
    Assignee: F-Secure Corporation
    Inventor: Pirkka Palomaki
  • Patent number: 8875274
    Abstract: A method for a user agent to access a session policy in a network is provided. The method comprises sending, from the user agent, a single session policy request to a single network component, the single network component contacting a plurality of network components, wherein sending the single session policy request to the single network component utilizes a lower layer protocol. The lower layer protocol is at least one of Extensible Authentication Protocol (EAP), Point to Point Protocol (PPP), and General Packet Radio Service (GPRS) Activate Packet Data Protocol (PDP) context. The method further comprises aggregating policy information and providing the aggregated policy information to the user agent.
    Type: Grant
    Filed: November 10, 2009
    Date of Patent: October 28, 2014
    Assignee: BlackBerry Limited
    Inventors: Michael Montemurro, Andrew Allen, Adrian Buckley
  • Patent number: 8850221
    Abstract: The invention relates to a method for protecting a sensitive operation by checking the integrity of at least a subset of the data manipulated by the sensitive operation. Data to be checked are divided into blocks, an intermediate integrity check value being computed for each block, the intermediate integrity check values being computed in random order. The invention also relates to a cryptographic device wherein at least one sensitive operation of the cryptographic device is protected by a method according to the invention.
    Type: Grant
    Filed: April 22, 2013
    Date of Patent: September 30, 2014
    Assignee: Gemalto SA
    Inventors: Stephanie Salgado, David Vigilant, Guillaume Fumaroli
  • Patent number: 8826040
    Abstract: The present invention relates to a product information system and a corresponding method in a product information system with products 2, to which there are applied machine-readable items of information 14. A data service 5 for data 16 allocated to the products is furnished. The machine-readable item of information 14 applied to a product 2 are read by a data requester 4. The data allocated to the product are requested through sending the read machine-readable data to the data service 5, the data request 15 is received by the data service 5, the requested data 16 are determined by the data service 5 and sent by the data service 5 to the data requester 4. In the step of determining the requested data 16, the data are generated by decrypting encrypted data 11-13 using the machine-readable items of information 14 received with the data request.
    Type: Grant
    Filed: July 22, 2009
    Date of Patent: September 2, 2014
    Assignee: Giesecke & Devrient GmbH
    Inventor: Michael Fiedler
  • Patent number: 8799665
    Abstract: A third-party watermark is inserted into a file or files uploaded by a client to a storing party such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a bootlegged copy.
    Type: Grant
    Filed: June 13, 2013
    Date of Patent: August 5, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Thomas Killian, Norman L. Schryer
  • Patent number: 8769655
    Abstract: A system and method for more efficiently establishing a chain of trust from a registrant to a registry. A registrant credential is associated with a Shared Registration command and is sent by a registrar to a registry. Upon successful validation, a token is generated and bound to a registrant identifier. The token is included along with the registrant identifier in subsequent discrete Shared Registration commands submitted to the registry on behalf of the registrant. The registrant thus needs to submit its credential only once for changes that require several discrete commands. Also, it is more efficient for the Shared Registration System to validate a token for a set of commands than to validate different registrant credential for each discrete command.
    Type: Grant
    Filed: December 30, 2010
    Date of Patent: July 1, 2014
    Assignee: Verisign, Inc.
    Inventors: James Gould, David Smith, Mingliang Pei
  • Patent number: 8667328
    Abstract: A method and system for protecting computer system state in one aspect generates signatures associated with system dump data, compares the signatures with those of the previous system dump data. Only those system dump data whose signatures are different from the previous dump are transferred for storing.
    Type: Grant
    Filed: April 28, 2009
    Date of Patent: March 4, 2014
    Assignee: CA, Inc.
    Inventors: Victor Liu, Jinqiang Wang, Peter Peng
  • Patent number: 8656187
    Abstract: A method operating on a computer begins by generating a read command to read at least some of a plurality of data slices from a dispersed storage network. The method continues by receiving the at least some of the plurality of data slices. The method continues by performing a reverse information dispersal algorithm on at least some of the plurality of data slices to produce a plurality of transposed data elements. The method continues by reverse transposing the plurality of transposed data elements to recover data elements of a data segment.
    Type: Grant
    Filed: August 26, 2009
    Date of Patent: February 18, 2014
    Assignee: Cleversafe, Inc.
    Inventors: Wesley Leggette, Jason K. Resch
  • Patent number: 8584260
    Abstract: A storage medium includes an ID registration area for storing therein a main body ID which is an ID unique to an information processing apparatus. The information processing apparatus has the main body ID stored therein. The information processing apparatus includes copying means for, when the storage medium is attached thereto, copying a program stored in the storage medium thereinto in the case where the main body ID has not yet been registered. When the copy is made, the main body ID is stored into the ID registration area of the storage medium. The information processing apparatus also includes execution program selecting means for selecting, from the copied program and from the program stored in the storage medium, a program to be executed.
    Type: Grant
    Filed: June 10, 2008
    Date of Patent: November 12, 2013
    Assignee: Nintendo Co., Ltd.
    Inventor: Ryuji Umezu
  • Patent number: 8572675
    Abstract: A method and apparatus for cross-domain Web-service publishing of information regarding a Web service provider in a first domain having a first security clearance access level into a second domain having a second security clearance access level across a cross-domain security system may comprise a cross-domain publishing service within the second domain receiving through the security system a request to publish information regarding the Web service provider located in the first domain; and may comprise the cross-domain publishing service establishing a surrogate end point within the second domain corresponding to the Web service provider and making available at the surrogate end point Web service information regarding the provision of a Web service by the Web service provider. The second domain cross-domain publishing service may register the Web service provider within the second domain and may also provide a link to the surrogate endpoint.
    Type: Grant
    Filed: April 3, 2009
    Date of Patent: October 29, 2013
    Assignee: The Boeing Company
    Inventor: David Chazin
  • Patent number: 8510608
    Abstract: Provided is an information security apparatus that has enhanced stability and confidentiality of a hash key. The information security apparatus includes an information generating PUF unit that has tamper resistance set, using physical characteristics, so as to output a preset hash key, a partial error-correction information storage unit that stores partial error-correction information, an error correcting PUF unit that has tamper-resistance set, using physical characteristics, so as to output error-correcting PUF information, an error-correction information generating unit that generates error-correction information using partial correction information and the error-correcting PUF information, and an error correcting unit that corrects an error for the hash key outputted from the information generating PUF unit and outputs an error-corrected hash key.
    Type: Grant
    Filed: November 2, 2007
    Date of Patent: August 13, 2013
    Assignee: Panasonic Corporation
    Inventors: Yuichi Futa, Kaoru Yokota, Masao Nonaka, Manabu Maeda, Natsume Matsuzaki