Patents Examined by Theodore Parsons
  • Patent number: 8375432
    Abstract: Method, apparatus, and computer products are provided for providing temporary generated codes by a server. Responsive to triplet authentication of a device to service provider network, a server receives an initial code from the device to request a temporary generated code. The server verifies the triplet authentication of device. The server determines whether there is a user account match to the initial code. The server determines a corresponding application server based on the initial code and the user account match. The server generates a temporary generated code to access the application server. The temporary generated code is transmitted to both the application server and the communication device, is set to expire at a preset time, is generated to allow the user access to a single session on the application server, and is generated to expire after the temporary generated code is input to access the single session on application server.
    Type: Grant
    Filed: August 31, 2009
    Date of Patent: February 12, 2013
    Assignee: AT&T Mobility II LLC
    Inventor: Sangar Dowlatkhah
  • Patent number: 8331567
    Abstract: A method to generate a pairwise master key for use in establishing a wireless connection is presented. In one embodiment, the method comprises determining a region in an image. The method further comprises generating the pairwise master key based at least on contents of the region in the image.
    Type: Grant
    Filed: March 30, 2009
    Date of Patent: December 11, 2012
    Assignee: Intel Corporation
    Inventor: Zongming Yao
  • Patent number: 8321942
    Abstract: A candidate signature for a known malware entity is selected for analysis. A set of malware entities that contain the candidate signature is identified. A diversity measurement for the candidate signature is determined. The diversity measurement describes the diversity of the set of malware entities that contain the candidate signature. A determination is made whether to use the candidate signature to identify the known malware entity based at least in part on the diversity measurement. Responsive to the determination, the candidate malware signature is stored as a signature for the known malware entity.
    Type: Grant
    Filed: March 12, 2009
    Date of Patent: November 27, 2012
    Assignee: Symantec Corporation
    Inventors: Tzi-cker Chiueh, Kent E. Griffin, Scott Schneider, Xin Hu
  • Patent number: 8249250
    Abstract: A method for verifying a similarity between a first signal and a second signal is described. The first and the second signals are encrypted homomorphically using a key. First, we acquire a set of error patterns determined by a similarity constraint. Then, each error pattern is homomorphically encrypted using the key and presented to a verifier in the setup phase. The verifier declares the first signal similar to the second signal, if any error pattern in the set of error patterns satisfies a homomorphic relationship between the first encrypted signal and the second encrypted signal.
    Type: Grant
    Filed: March 30, 2009
    Date of Patent: August 21, 2012
    Assignee: Mitsubishi Electric Research Laboratories, Inc.
    Inventors: Shantanu Rane, Wei Sun, Anthony Vetro
  • Patent number: 8245301
    Abstract: A network activity visualization system can include a minimum description length (MDL) based network intrusion detection system having an MDL grammar database adapted to store a plurality of MDL grammars, and a pattern matching module adapted to match a received network activity data set against the MDL grammars by calculating a distance of the network activity data set from each MDL grammar. The system can also include an intelligent icon module coupled to the MDL-based intrusion detection system and adapted to receive the MDL grammars and distances of a network data set from each respective MDL grammar, and adapted to generate intelligent icons based on the MDL grammars and distances. The system can further include a display system adapted to display the intelligent icons so as to provide a visual indication of network security.
    Type: Grant
    Filed: September 15, 2009
    Date of Patent: August 14, 2012
    Assignee: Lockheed Martin Corporation
    Inventors: Scott Charles Evans, Thomas Markham, Richard Bejtlich, Jeremy Impson, Eric Steinbrecher
  • Patent number: 8245302
    Abstract: A network activity visualization system can include an MDL grammar database adapted to store a plurality of MDL grammars, and a pattern matching module adapted to match a received network activity data set against the MDL grammars by calculating a distance of the network activity data set from each MDL grammar. The system can also include an intelligent icon module adapted to receive the MDL grammars and distances of a network data set from each respective MDL grammar, and adapted to generate intelligent icons based on the MDL grammars and distances. The system can further include a display system adapted to display the intelligent icons so as to provide a visual indication of network security.
    Type: Grant
    Filed: September 15, 2010
    Date of Patent: August 14, 2012
    Assignee: Lockheed Martin Corporation
    Inventors: Scott C. Evans, T. Stephen Markham, Richard Bejtlich, Bruce G. Barnett, Bernhard J. Scholz, Robert J. Mitchell, Jr., Weizhong Yan, Jeremy Impson, Eric Steinbrecher
  • Patent number: 8074286
    Abstract: Many media playback devices have a secure environment, with media decrypter and decoder components, and an insecure environment, with intermediate media processing components that are not suitable for secure implementation. In the secure environment, secure components decrypt encrypted media and store the clear-form media in secure memory that can only be accessed by secure components. Secure components also generate a media-data “proxy”, which corresponds structurally to the clear-form media, but which does not include actual clear-form media data. The media-data proxy is provided to insecure intermediate components, which manipulate the proxy to perform operations such as de-multiplexing, loss mitigation, and coded frame assembly. The manipulated proxy is returned to the secure environment, where secure components identify structural changes that were made to the proxy and make corresponding structural changes to the clear-form media before decoding the manipulated clear-form media.
    Type: Grant
    Filed: September 15, 2009
    Date of Patent: December 6, 2011
    Assignee: RealNetworks, Inc.
    Inventor: Milko Boic