Patents Examined by Virgil Herring
-
Patent number: 7624265Abstract: Mechanisms and techniques allow for the establishment of secure, authenticated packet-based communications sessions between a computer system and a processor, such as a service processor, within a data storage system. The computer system is configured with a connection process connection process that operates under user control and that can establish a first packet communications session to a data communications device such as a router within a first computer network such as a vendor computer network. The connection process connection process can then cause the data communications device to establish a second packet communications session between the data communications device and the processor within the data storage system in a secure, reliable and authenticated manner.Type: GrantFiled: December 24, 2001Date of Patent: November 24, 2009Assignee: EMC CorporationInventors: William D. Slyva, Gerard T. Carraher, Tuan Q. An, Jeff Emerson, Timothy F. McCain, Neil J. Thibodeau, Kristen D. Martin
-
Patent number: 7613919Abstract: Systems, computer program products and methods for authentication using a one-time password. In system that includes a client, a service provider, and an authentication service, the authentication service generates an authentication service identifier for the client. Any suitable identifier may be used for the authentication service identifier, which generally takes the form of an arbitrary number of characters. From the client, the authentication service receives a client moniker (e.g., a username) for the client to use when accessing the authentication service. The authentication service sends a one-time password to the client for the client to use in accessing the service provider.Type: GrantFiled: October 12, 2004Date of Patent: November 3, 2009Inventor: Brian B. Bagley
-
Patent number: 7526646Abstract: An authentication system for authenticating a mobile information terminal is disclosed.Type: GrantFiled: May 15, 2002Date of Patent: April 28, 2009Assignee: Sony CorporationInventors: Junko Fukuda, Keigo Ihara, Takahiko Sueyoshi, Yuji Ayatsuka, Nobuyuki Matsushita, Junichi Rekimoto
-
Patent number: 7487538Abstract: A security system for facilitating transponder carrier identification and tracking within a secure area comprising an RF transponder having a memory in which is stored a unique identifier; the transponder including a transmitter to transmit the unique identifier; a transponder writer operable to send a replacement unique identifier to the transponder, the transponder replacing the identifier in the transponder memory with the replacement identifier; a transponder reader to receive from the transponder at least the unique identifier of the transponder; such that the transponder reader interrogates the transponder and, in response to the interrogation, receives from the transponder at least the unique identifier of the transponder; wherein the location of the transponder is determined from the location of the transponder reader.Type: GrantFiled: November 19, 2001Date of Patent: February 3, 2009Inventor: Steven Siong Cheak Mok
-
Patent number: 7484237Abstract: A method and corresponding tool are described for security policy management in a network comprising a plurality of hosts and at least one configurable policy enforcement point. The method, comprises creating one or more policy templates representing classes of usage control models within the network that are enforceable by configuration of the policy enforcement points; creating one or more policy instances, each based on one of the templates and instantiating the template for identified sets of hosts within the network to which the usage control model is to be applied, deploying the policy instances by generating and providing one or more configuration files for provisioning corresponding policy enforcement points within the network.Type: GrantFiled: May 13, 2004Date of Patent: January 27, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Pascal Joly, Olivier Berger, Joe Reves, Jean-Laurent Huynh, Suresh Pai
-
Patent number: 7454786Abstract: A method for integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.Type: GrantFiled: March 27, 2003Date of Patent: November 18, 2008Assignee: International Business Machines CorporationInventors: David Yu Chang, Ching-Yun Chao
-
Patent number: 7447906Abstract: A projector system of the present invention includes a projector 10 and a personal computer PC as an information terminal, which communicate with each other via a network connection. The projector 10 generates a password required for establishment of the network connection and projects the password on a screen SC. A user of the personal computer PC inputs the password projected on the screen SC. The password is used for authentication of the network connection between the projector 10 and the personal computer PC and cipher communication therebetween. This arrangement of the present invention enhances the convenience of the projector that is capable of establishing a network connection with the information terminal, while ensuring secrecy of communicating data.Type: GrantFiled: August 27, 2002Date of Patent: November 4, 2008Assignee: Seiko Epson CorporationInventor: Shinji Kubota
-
Patent number: 7421733Abstract: When a user successfully logs into an account, the user is provided with a first-class login token, which entitles the user to one or more unsuccessful login attempts without experiencing delays the user would otherwise experience. If attempts with a second-class login token or an expired first-class login token is impermissible, a subsequent login attempt is subject to delays the user would otherwise not experience. The delays minimize the effectiveness of dictionary attacks. Additionally, if the user attempts to login without a login token or an invalid login token, the login attempt is impermissible and the user is provided with a second-class login token for use in a delayed, subsequent login attempt.Type: GrantFiled: February 6, 2002Date of Patent: September 2, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Steven Charles Glassman, Mark Steven Manasse
-
Patent number: 7421083Abstract: Application servers are programmed such that when an application server changes a compromised service key, the compromised key is saved by the application server until all tickets that may have been issued under the compromised key expire. Whenever the application server receives a ticket from a client issued under the compromised key, it generates an authenticator for an error message using the session key extracted from the ticket and sends the error message with this authenticator to the client. Clients are programmed to be able to receive error messages from application servers that have changed their service keys. Because the error messages include an authenticator generated by the application server using the session key extracted from the compromised ticket, the client is able to rely on the error message. The client is able to automatically request a new ticket from a key distribution center in response to a successful authentication of the error message.Type: GrantFiled: April 5, 2002Date of Patent: September 2, 2008Assignee: General Instrument CorporationInventor: Alexander Medvinsky
-
Patent number: 7409717Abstract: The executions of computer viruses are analyzed to develop register signatures for the viruses. The register signatures specify the sets of outputs the viruses produce when executed with a given set of inputs. A virus detection system (VDS) (400) holds a database (430) of the register signatures. The VDS (400) selects (710) a file that might contain a computer virus and identifies potential entry points in the file. The VDS (400) uses a virtual machine (422) having an initial state to emulate (714) a relatively small number of instructions at each entry point. While emulating each potential entry point, the VDS builds (716) a register table that tracks the state of a subset of the virtual registers (428). Once the VDS (400) reaches an emulation breakpoint, it analyzes the register table in view of the register signatures to determine whether the file contains a virus.Type: GrantFiled: May 23, 2002Date of Patent: August 5, 2008Assignee: Symantec CorporationInventor: Peter Szor
-
Patent number: 7395434Abstract: A computer includes a processor, an input device and a read only memory (“ROM”). One or more passwords are flashed in the ROM in encoded form. The encoding process may include any well-known encryption or hash process. The password may include a power-on password usable to change the operating state of the computer and/or an administrator password. Such configuration data preferably also is stored on the ROM in encoded form. The encoded nature of the passwords makes it difficult for an unauthorized entity to gain access to the usable form of the passwords. Further, by storing the passwords and configuration in ROM, such as the computer's main system ROM, it is possible to control write access to the ROM because a computer's ROM can generally only be flashed using SMI code which operates outside the control of the computer's operating system and requires entry of a correct password.Type: GrantFiled: May 1, 2002Date of Patent: July 1, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Mark A. Piwonka, Mark W. Shutt, Kevin K. Wong, Patrick L. Gibbons
-
Patent number: 7383578Abstract: A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot's personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis.Type: GrantFiled: December 31, 2002Date of Patent: June 3, 2008Assignee: International Business Machines CorporationInventors: Kenneth W. Blake, Vikki Kim Converse, Ronald O'Neal Edmark, John Michael Garrison
-
Patent number: 7376844Abstract: A countermeasure method for a microcontroller that executes sequences of instructions. The instructions are executed according to a pipeline method. At least one waiting time is randomly introduced between two consecutive instructions and/or within at least one instruction. The method is implemented by the electronics of the microcontroller rather than by software addition.Type: GrantFiled: March 16, 2001Date of Patent: May 20, 2008Assignee: GemplusInventor: Nathalie Feyt
-
Patent number: 7367054Abstract: A Denial of Service attack received at a network node from a packet data communications network is managed by tracing the path of predominantly malicious data packets arriving at the network node. The attack may be mitigated by selecting a router along the detected path and requesting the router to alter its handling of the data traffic. In one embodiment, the selected router installs a filter for data directed at the network node. In a different embodiment, the router alters a Quality of Service setting for the data directed at the network node. The network node may also request the router to mark all data being forwarded to it, to allow the network to characterize the data and determine to what extent it consists of malicious data.Type: GrantFiled: June 26, 2001Date of Patent: April 29, 2008Assignee: British Telecommunications public limited companyInventor: Andrea Soppera
-
Patent number: 7359511Abstract: A video signal and an audio signal are time division multiplexed, encrypted, and transmitted. A transmission side time-compresses the audio signal, multiplexes, encrypts, and transmits the time-compressed audio signal in a blanking period of the video signal. Control is performed using an audio signal data enable signal ADE, and an audio signal/video signal switch signal.Type: GrantFiled: December 18, 2001Date of Patent: April 15, 2008Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Natsume Matsuzaki, Makoto Tatebayashi, Toshiro Nishio, Hidekazu Suzuki
-
Patent number: 7349541Abstract: A method and apparatus is provided in which playable content is transmitted in response to a playable-content request; a key for the playable content is separately transmitted in response to a key request. Quality information about the playable content is used to generate tariff information from which a user charge is derived.Type: GrantFiled: March 6, 2003Date of Patent: March 25, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventor: Huw Edward Oliver
-
Patent number: 7340599Abstract: To improve security of operations in a communication network such as Internet, a database containing a plurality of icons is stored in the installation program of a browser. When executing the installation program, an icon in the icon database is selected. The selected icon is stored in a storage unit which is inaccessible by any device other than the browser. The selected icon is displayed when executing the browser, and it is assigned a feature to indicate whether the current operation is secure.Type: GrantFiled: September 11, 2001Date of Patent: March 4, 2008Assignee: GemplusInventor: David Naccache
-
Patent number: 7325131Abstract: A robust watermark embedded into a Direct Stream Digital (DSD) audio signal including a flat frequency response in a specific frequency range which does not extend below 20 kHz or above 100 kHz. The watermark is therefore hidden in the noise spectrum of the DSD signal, such that the watermark is inaudible to a listener. Since the noise spectrum contains important information that helps provide the DSD signals with sharp transients and an accurate impulse response, the watermark cannot be removed from the DSD signal without causing significant degradation to the signal's audio quality.Type: GrantFiled: September 5, 2002Date of Patent: January 29, 2008Assignee: Koninklijke Philips Electronics N.V.Inventor: Derk Reefman
-
Patent number: 7318162Abstract: A computer-implemented system and method for customizing rules used in data integrity validation operations. A data integrity validation application uses the data integrity validation rules to perform the data integrity validation operations. The data integrity validation rules are stored in a knowledge base which is separate from and external to the data integrity validation application. The separately stored and externally located knowledge base allows customization of the data integrity validation rules without requiring recompilation of the data integrity validation application.Type: GrantFiled: December 18, 2002Date of Patent: January 8, 2008Assignee: SAS Institute Inc.Inventors: Brian C. Rineer, Brent C. Jackson, Scott A. Gidley, Anthony F. Fisher
-
Patent number: 7302576Abstract: Methods and systems for authenticating documents. Document data to be modified to contain authentication is inputted. A representation is determined from the document data. Assist information that is usable to reliably recover a determined representation is determined. A one-way hash of the representation and assist information is determined. The one-way hash is then cryptographically signed. The assist information and digitally signed one-way hash is then appended to the document.Type: GrantFiled: December 19, 2002Date of Patent: November 27, 2007Assignee: XEROX CorporationInventors: Daniel H. Greene, David Goldberg, Marshall W. Bern