Patents Examined by William R. Korzuch
  • Patent number: 7644279
    Abstract: Aspects for consumer product distribution in the embedded system market are described. The aspects include forming a secure network for distributing product digitation files capable of configuring operations of an adaptive computing engine (ACE), and providing an agent server within the secure network for controlling licenses of the product digitation files, wherein a separation of responsibility and control of the distributing and licensing exists.
    Type: Grant
    Filed: July 18, 2002
    Date of Patent: January 5, 2010
    Assignee: NVIDIA Corporation
    Inventors: Owen Robert Rubin, Eric Murray, Nalini Praba Uhrig
  • Patent number: 7640437
    Abstract: An electronic memory component provides a plurality of access-secured sub-areas. Each access-secured memory sub-area has at least one assigned parameter, for example, an address. The memory encrypts the assigned parameters of the access-secured sub-areas in such a way that on the one hand the security of such devices is increased considerably and on the other hand the associated expense and technical complexity are not too great. The encryption allows access to at least one sub-area dependent on at least one further sub-area.
    Type: Grant
    Filed: November 19, 2003
    Date of Patent: December 29, 2009
    Assignee: NXP B.V.
    Inventors: Markus Feuser, Sabine Sommer
  • Patent number: 7640432
    Abstract: A method and system for establishing and managing digital cash. This method is to emit and circulate secure electronic cash that allows to use non-homomorphic signature schemes, and avoids having to use blind signature techniques. With one specific embodiment, the method provides anonymous digital cash, and comprises the steps of providing an entity with a secure coprocessor, a user establishing a secure channel to a program running on said coprocessor, and the user sending a coin to be digitally signed to the coprocessor.
    Type: Grant
    Filed: December 11, 2000
    Date of Patent: December 29, 2009
    Assignee: International Business Machines Corporation
    Inventors: Rosario Gennaro, Charles Tresser
  • Patent number: 7640434
    Abstract: A system identifies undesirable content in responses sent to a user, such as in e-mail or in downloadable files, from an Internet or intranet site. The system utilizes a redirection program that identifies content requests from a user to a target server. The redirection program redirects the request to a proxy server that sends the request to the target server. Upon receipt of the response from the target server, the proxy server scans the response, which includes any attachments, for undesirable content, such as junk e-mails, computer viruses, pornographic material, and/or other undesirable content. The proxy server then acts upon the response, and any undesirable content, in accordance with default or user-defined parameters, such as removal of the undesirable content. The proxy server may then send the response, as modified, or a notification message to the redirection program forwarding to the user.
    Type: Grant
    Filed: January 11, 2002
    Date of Patent: December 29, 2009
    Assignee: Trend Micro, Inc.
    Inventors: Frank Lee, Jeremy G. Liang, Eva Chen, Yi-Jing Lin
  • Patent number: 7636939
    Abstract: A data structure with endpoint address and security information. The data structure includes an address field that includes one or more endpoint addresses for an entity. The data structure further includes a security field that includes one or more keys for facilitating secure communications with the entity. The data structure may also be such that the contents of the address field and the security field are serialized in the data structure. The data structure may be extensible such that new address fields and security fields may be added.
    Type: Grant
    Filed: December 10, 2004
    Date of Patent: December 22, 2009
    Assignee: Microsoft Corporation
    Inventors: Christopher G. Kaler, Douglas A. Walter, Giovanni M. Della-Libera, Melissa W. Dunn, Richard L. Hasha, Tomasz Janczuk
  • Patent number: 7636848
    Abstract: Communication between an administrator device and an administered device in a network is arranged in the form of a chain of digitally signed communication items including messages sent from an originator device to a recipient device. Each message has an associated respective digitally signed receipt, and the originator device is configured not to send a new item toward the recipient device in the absence of a respective digitally signed receipt for a previously sent item. With at least one, and preferably by both of the administrator device and the administered device, there is stored a history record of communication items exchanged therebetween. The history record is agreed upon and signed by both the administrator device and the administered device.
    Type: Grant
    Filed: November 27, 2003
    Date of Patent: December 22, 2009
    Assignee: Telecom Italia S.p.A.
    Inventors: Ettore Elio Caprella, Paolo De Lutiis, Manuel Leone, Pier Luigi Zaccone
  • Patent number: 7631361
    Abstract: A content reproduction system that allow the user to rent or purchase any desired contents for reproduction without depending on a predetermined type of information of the user. The content reproduction system includes: a recording medium storing a license ticket including an encrypted master key; and a reproduction apparatus that receives from the user a request for a selected content and the information of the selected content, acquires distribution content information corresponding to the selected content, stores it in association with the license ticket into the recording medium. When reproducing the content, the reproduction apparatus generates a content using an encrypted content decryption key and an encrypted content that are contained in the distribution content information, and using a master decryption key information corresponding to the distribution content information, and reproduces the generated content.
    Type: Grant
    Filed: August 19, 2004
    Date of Patent: December 8, 2009
    Assignee: Panasonic Corporation
    Inventors: Masato Yamamichi, Masami Yamamichi, legal representative, Satomi Yamamichi, Keiko Yamamichi, Motoji Ohmori, Masaya Yamamoto, Kazuhisa Watanabe, Atsushi Saso, Naoaki Yamamoto
  • Patent number: 7627755
    Abstract: A method of authenticating candidate members 1 wishing to participate in an IP multicast via a communication network, where data sent as part of the multicast is to be encrypted using a Logical Key Hierarchy based scheme requiring that each candidate member submit a public key to a group controller. The method comprises, at the group controller 1, verifying that the public key received from each candidate member 1 is owned by that member and that it is associated with the IP address of that candidate member 1 by inspecting an interface ID part of the IP address.
    Type: Grant
    Filed: September 13, 2002
    Date of Patent: December 1, 2009
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventors: Pasi Ahonen, Uusitalo Iikka, Mantyla Vesa-Matti
  • Patent number: 7624443
    Abstract: A self-healing device is provided in which changes made between the time that an infection resulting from an attack on the device was detected and an earlier point in time to which the device is capable of being restored may be recovered based, at least in part, on what kinds of changes were made, whether the changes were bona fide or malware induced, whether the changes were made after the time that the infection likely occurred, and whether new software was installed.
    Type: Grant
    Filed: December 21, 2004
    Date of Patent: November 24, 2009
    Assignee: Microsoft Corporation
    Inventors: Michael Kramer, Scott A. Field, Marc E. Seinfeld, Carl Carter-Schwendler, Paul Luber, Adrian M. Marinescu
  • Patent number: 7624434
    Abstract: A system for providing security in a computing network. The system has a server for distributing policies to be implemented by firewall devices in the network. The firewall devices provide hardware implemented firewalls to communication devices making network connections. The system has logic to allow a connection to be made to the network via a communication device at a node provided the firewall device is at that node. Therefore, the firewall device must be in the system for a connection to be established via the communication device. Additionally, the system is configured to cause data transferred by the communication device to be processed by the firewall.
    Type: Grant
    Filed: March 1, 2002
    Date of Patent: November 24, 2009
    Assignee: 3Com Corporation
    Inventors: Peter M. Rigstad, John Y. Yoon, Mark Farahar, Barani Subbiah, Brant D. Thomsen, David E. Richmond, Vered Maor Semel, Earl Bryner
  • Patent number: 7624432
    Abstract: Provided are a method, a system, an article of manufacture, and a computer program product, wherein a first indicator is stored for a first entity, and wherein the first indicator identifies groups to which the first entity belongs and operations associated with the groups. The first entity receives a second indicator from a second entity, wherein the second indicator indicates privileges granted to the second entity for at least one operation on at least one group. A determination is made locally by the first entity, whether an operation requested by the second entity is to be executed by the first entity, based on a comparison of the second indicator to the first indicator.
    Type: Grant
    Filed: June 28, 2005
    Date of Patent: November 24, 2009
    Assignee: International Business Machines Corporation
    Inventor: Douglas Andrew Wood
  • Patent number: 7623658
    Abstract: In a wireless communication system, a method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets are provided. Input variables may be initialized in a keystream generator and an intermediate value may be generated with a cipher key parameter and a key modifier. A number of processing blocks of output bits may be determined based on a number of bits in an output keystream. The processing blocks of output bits may be generated utilizing a KASUMI operation and may be based on an immediately previous processing block of output bits, the intermediate value, and an indication of the processing block of output bits being processed. The processing blocks of output bits may be generated after an indication that an immediately previous processing block of output bits is available and may be grouped into two final blocks of output bits in the output keystream.
    Type: Grant
    Filed: August 23, 2004
    Date of Patent: November 24, 2009
    Assignee: Broadcom Corporation
    Inventors: Ruei-Shiang Suen, Srinivasan Surendran
  • Patent number: 7617536
    Abstract: An unauthorized apparatus detection device detecting clones of a playback device. In a management server, a reception processing unit acquires a user terminal identifier and a first random number of a user terminal, judges whether a second management server random number, which is stored in a storage unit in correspondence with the user terminal identifier, matches the first user terminal random number. If the two fail to match, a display unit displays a message indicating that a clone exists. If the two match, a terminal information generation unit generates a new random number, and writes the generated random number as the second random number in the storage unit. A transmission processing unit transmits the generated random number to the user terminal via a transmission/reception unit and the user terminal updates the first user terminal random number to the generated random number.
    Type: Grant
    Filed: December 12, 2005
    Date of Patent: November 10, 2009
    Assignees: Panasonic Corporation, The University of Tokyo
    Inventors: Masao Nonaka, Toshihisa Nakano, Yuichi Futa, Motoji Ohmori, Takeshi Gomi, Kazukuni Kobara, Hideki Imai
  • Patent number: 7609839
    Abstract: In order to create a highly-secured common key while a data error on a transmission path is corrected by an error correction code having remarkably high characteristics, in a quantum key distribution method of the invention, at first a communication apparatus on a reception side corrects the data error of reception data by a deterministic, stable-characteristics parity check matrix for a “Irregular-LDPC code.” The communication apparatus on the reception side and a communication apparatus on a transmission side discard a part of pieces of the common information according to public error correction information.
    Type: Grant
    Filed: September 12, 2003
    Date of Patent: October 27, 2009
    Assignee: Mitsubishi Electric Corporation
    Inventors: Youdai Watanabe, Wataru Matsumoto
  • Patent number: 7609837
    Abstract: A system and method for use with local area networks (LANs) automatically configures a new device on a LAN by secure encrypted transmission of setup parameters. A remote control (RC) with an infrared (IR) transmitter contains a stored setup command and a security number that is used only once (a “nonce”). Setup of a new device is initiated by pressing a “setup” button on the RC which generates the security number and transmits it and the setup command to the new device via IR. The new device receives the setup command and security number and queries the network for the setup parameters. The RC also transmits the security number via IR to a network member device that contains the setup parameters. The network member uses the security number as an encryption key to encrypt the setup parameters and transmit them over the network. The new device uses the security number as the decryption key to decrypt the transmitted setup parameters.
    Type: Grant
    Filed: September 1, 2005
    Date of Patent: October 27, 2009
    Assignee: Sharp Laboratories of America, Inc.
    Inventor: Richard T. Bennett
  • Patent number: 7603548
    Abstract: A method for providing a security provider for a client comprises providing a service provider interface, that is compatible with a security framework layer, and one or more services. The one or more services include at least one of, authentication, authorization, auditing, role mapping and credential mapping. The one or more services can be exposed through the service provider interface and the framework layer can expose the one or more services to an application program interface.
    Type: Grant
    Filed: October 8, 2004
    Date of Patent: October 13, 2009
    Assignee: BEA Systems, Inc.
    Inventors: Paul Patrick, David Byrne, Kenneth D. Yagen, Mingde Xu, Jason Howes, Mark A. Falco, Richard J. Riendeau
  • Patent number: 7600134
    Abstract: A method for theft deterrence of a computer system is disclosed. The computer system includes a trusted platform module (TPM) and storage medium. The method comprises providing a binding key in the TPM; and providing an encrypted symmetric key in the storage medium. The method further includes providing an unbind command to the TPM based upon an authorization to provide a decrypted symmetric key; and providing the decrypted symmetric key to the secure storage device to allow for use of the computer system. Accordingly, by utilizing a secure hard disk drive (HDD) that requires a decrypted key to function in conjunction with a TPM, a computer if stolen is virtually unusable by the thief. In so doing, the risk of theft of the computer is significantly reduced.
    Type: Grant
    Filed: November 8, 2004
    Date of Patent: October 6, 2009
    Assignee: Lenovo Singapore Pte. Ltd.
    Inventors: Ryan C. Catherman, David C. Challener, James P. Hoff, Joseph M. Pennisi, Randall S. Springfield
  • Patent number: 7596698
    Abstract: An audio stream is divided into a plurality of audio object (AOB) files that are recorded having each been encrypted using a different encryption key. At least one piece of track management information (TKI) is provided corresponding to each track. Playlist information (PLI) assigns a playback position in a playback order to each track when a plurality of tracks are to be played back one after the other.
    Type: Grant
    Filed: November 10, 2004
    Date of Patent: September 29, 2009
    Assignee: Panasonic Corporation
    Inventors: Teruto Hirota, Kenji Tagawa, Hideki Matsushima, Tomokazu Ishikawa, Shinji Inoue, Masayuki Kozuka
  • Patent number: 7594108
    Abstract: When an application is loaded into a device (100, 200), the device verifies that the application originates from a trusted operator. The verification implies that the application must, in a secure manner, present itself to the device in such a way that the device can ensure that it originates from the trusted operator. The device identifies the trusted operator as well as the issuer of a SIM (211) located in the device. Thereafter, the device compares the identity of the trusted operator with the identity of the issuer of the SIM, and if the identity of the trusted operator corresponds to the identity of the issuer of the SIM, the previously verified application is installed in a secure execution environment (104, 204, 211) of the device.
    Type: Grant
    Filed: November 3, 2004
    Date of Patent: September 22, 2009
    Assignee: Nokia Corporation
    Inventor: Krishnan Vaidyanathan
  • Patent number: 7594273
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: February 16, 2007
    Date of Patent: September 22, 2009
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers