Data Authentication Patents (Class 713/161)
  • Patent number: 9288125
    Abstract: Web content is displayed concurrently with application content of an application that is hosting the web content. The web content includes at least some content that can be executed or run, such as a script. Performance of the web content is monitored, such as by monitoring the amount of time the web content has been executing and/or an amount of memory used by the web content. Feedback regarding the performance of the web content is provided to the application hosting the web content, and the application can determine whether and/or how to alter execution of the web content based on the performance of the web content. Execution of the web content can be altered in various manners, such as by throttling execution of the web content or ceasing execution of the web content.
    Type: Grant
    Filed: June 14, 2013
    Date of Patent: March 15, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Bogdan Brinza, Tony E. Schreiner, Tyler M. Barton, Michael Wayne Jackson
  • Patent number: 9288226
    Abstract: Software applications are analyzed to determine if they are legitimate applications and warnings are provided to users to avoid installation and/or purchases of unnecessary and/or potentially harmful software based on comparisons of user-interface characteristics of the software applications to visual characteristics of authentic applications to determine to what extent they match (or do not match) or are attempting to mirror the legitimate application.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: March 15, 2016
    Assignee: AVG Netherlands B.V.
    Inventors: Yuval Ben-Itzhak, Kaspars Osis, Mike Boz
  • Patent number: 9268726
    Abstract: An information processing apparatus able to normally unmount a memory and disconnect communication with a first external apparatus when receiving a processing request from a second external apparatus in a state that the first external apparatus mounts the memory connected to the apparatus. A multi-function peripheral as the processing apparatus (20) includes a controller OS. When receiving a processing request from a second host PC (10B) as the second external apparatus in a state where the multi-function peripheral is in communication with a first host PC (10A) as the first external apparatus (S3100), the controller OS requests the first host PC to unmount the memory (S3201), if the memory is mounted thereon. When receiving an unmount instruction from the first host PC (S3004), the controller OS unmounts the memory, disconnects the connection with the first host PC (S3005), and starts communication with the second host PC (S3101).
    Type: Grant
    Filed: February 10, 2010
    Date of Patent: February 23, 2016
    Assignee: CANON KABUSHIKI KAISHA
    Inventor: Toshihisa Okutsu
  • Patent number: 9264436
    Abstract: A technique for intelligent automated consent is described by which a client may be automatically authorized to access a resource owner's protected information (e.g., a profile) based on the owner's previous authorization decisions and/or other client classifications. Using this approach to granting consent, the resource owner is not required to intervene during the authorization step for each client that is requesting access. Clients may be categorized, and authorization given to individual clients based on the category to which they belong and/or the scope of the access request. The technique may be implemented with user-centric identity protocols, as well as with delegated authorization protocols. The technique provides for policy-based consent grants.
    Type: Grant
    Filed: May 8, 2013
    Date of Patent: February 16, 2016
    Assignee: International Business Machines Corporation
    Inventors: Simon Gilbert Canning, Shane Bradley Weeden, Codur Sreedhar Pranam
  • Patent number: 9253641
    Abstract: An apparatus and method for limiting sharing of reproduction information of a data authorized for only a specific user when a video and audio reproduced from a portable terminal are shared with a peripheral second terminal. The apparatus preferably includes an application analyzer, and a sharing information generator. Sharing information of the reproduced data is replaced with non-shared information when it is verified that the data which is not authorized to be shared is reproduced. A controller transmits the sharing information or the sharing information replaced with the non-shared information to the peripheral second terminal. The sharing information includes picture information and voice information of the reproduced data and wherein the non-shared information is replacement information for limiting viewing of the voice and audio information.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: February 2, 2016
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Yoon-Suk Choi, Gi-Tae Moon
  • Patent number: 9208063
    Abstract: The application testing system and method provide an efficient and effective way to test multiple application variants of an application on at least one mobile device. The application testing system may cause a first application variant selection indication to be transmitted to at least one mobile device having the application. The first application variant selection indication may be configured to cause the mobile device to interact with the application according to a first application variant of the plurality of application variants. The application testing system may analyze data corresponding to the usage of the first application variant by the at least one mobile device, and cause a second application variant selection indication to be transmitted to the mobile device, wherein the second application variant selection indication is configured to cause the mobile device to interact with the application according to a second application variant of the plurality of application variants.
    Type: Grant
    Filed: February 21, 2013
    Date of Patent: December 8, 2015
    Assignee: Groupon, Inc.
    Inventors: Fabio Sisinni, Don Chennavasin
  • Patent number: 9143327
    Abstract: Embodiments of the invention provide systems and methods for a cipher then segment approach in a Power Line Communication (PLC). A node or device generates frames to be transmitted to a destination node in the PLC network. A processor in the node is configured to generate a data payload comprising data to be sent to the destination node. The processor divides the data payload into two or more payload segments and encrypts the payload segments. The processor creates a frame for each of the encrypted payload segments, wherein each frame comprises a message integrity code. The processor creates a segment identifier for each frame using the message integrity code and an authentication key that is shared with the destination PLC node. The segment identifier is added to each frame.
    Type: Grant
    Filed: October 4, 2013
    Date of Patent: September 22, 2015
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Ramanuja Vedantham, Tarkesh Pande
  • Patent number: 9122547
    Abstract: Systems and methods embedding a guest module within an embedder module are disclosed. According to some aspects, an embedder module is executed at a computer. A request to access a guest module is received via the embedder module. The request comprises a tag in a programming language. The tag identifies the guest module. An event is provided, using information associated with the tag, to an executing instance of the guest module responsive to the request to access the guest module. Processing of the event at the executing instance of the guest module is signaled.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: September 1, 2015
    Assignee: Google Inc.
    Inventor: Fady Samuel
  • Patent number: 9088483
    Abstract: Systems, methods, and other embodiments associated with tracking packet identifiers are described. According to one embodiment, a method includes receiving a packet of data that includes an encoded packet identifier and decoding the encoded packet identifier into a decoded packet identifier. The method further includes estimating a reliability of the decoded packet identifier and determining a packet identifier of the received packet based, at least in part, on the estimated reliability of the decoded packet identifier.
    Type: Grant
    Filed: March 11, 2014
    Date of Patent: July 21, 2015
    Assignee: MARVELL INTERNATIONAL LTD.
    Inventors: Bin Ni, Darrel Burk
  • Patent number: 9071964
    Abstract: A radio is authenticated at the site and unique authentication information for the radio is stored at the site. A subsequent non-authentication message from the radio is received at the site and authentication information in the non-authentication message is identified. The unique authentication information stored at the site is compared with authentication information identified in the non-authentication message. If there is a match, the non-authentication message is authenticated with an authentication code included in the non-authentication message, wherein a predefined portion of the authentication code is obtained from at least one of a header portion or a data portion of the non-authentication message. Upon successfully completing authentication, the site repeats the non-authentication message towards destination radios indicated in non-authentication message.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: June 30, 2015
    Assignee: MOTOROLA SOLUTIONS, INC.
    Inventors: Thomas J. Senese, Chris A. Kruegel, Timothy G. Woodward
  • Patent number: 9071581
    Abstract: A security command protocol provides secure authenticated access to an auxiliary security memory within a SCSI storage device. The auxiliary security memory acts as an authenticated separate secure storage area that stores sensitive data separately from the user data area of the SCSI storage device. The security command protocol is used to access the auxiliary security memory. The security command protocol allows a trusted execution environment to transport sensitive data to and from storage in the auxiliary security memory. The regular execution environment does not have access to the security command protocol or the auxiliary security memory. The security command protocol and auxiliary security memory eliminate the need for additional secure storage components in devices that provide the security features of firmware TPM.
    Type: Grant
    Filed: September 23, 2013
    Date of Patent: June 30, 2015
    Assignee: NVIDIA CORPORATION
    Inventor: Mark A. Overby
  • Patent number: 9041765
    Abstract: A new approach is proposed that contemplates systems and methods to support the operation of a Virtual Media Room or Virtual Meeting Room (VMR), wherein each VMR can accept from a plurality of participants at different geographic locations a variety of video conferencing feeds of audio and video streams from video conference endpoints and enables a multi-party video conferencing session in real time among the plurality of participants. Each of the participants is offered a rich set of conferencing and collaboration interaction hitherto not experienced by video conferencing participants and a moderator of the video conference is further offered with in-meeting management and control over a plurality of security and privacy settings during the video conference. These interactions encompass controlling of a video conferencing session, its configuration, privacy, security, the visual layout of the participants, customization of the VMR and adaptation of the room to different vertical applications.
    Type: Grant
    Filed: May 11, 2011
    Date of Patent: May 26, 2015
    Assignee: Blue Jeans Network
    Inventors: Alagu Periyannan, Krish Ramakrishnan, Raghavan Anand, Anand Raghavan, Ravi Kiran Kalluri, Emmanuel Weber
  • Patent number: 9037853
    Abstract: The invention relates to a P2P communication method for multi-subscriber networks, which is protected from deception, eavesdropping and hacking, and wherein the communication carried out in an interval is predominantly carried out in separate rooms, allocated to the P2P communication, and with separate reference data allocated to the P2P communication. At least part of the separate random reference data and/or random data is generated in at least one unit that participates in the P2P communication and is exchanged within the P2P communication in the form of relative data. The separate P2P communication is initiated with respect to at least one global random reference date valid for the time of the P2P communication, the random reference date being valid for a randomly determined time range and being stored in all units that carry out the P2P communications in a secret and non-deceivable manner.
    Type: Grant
    Filed: November 17, 2008
    Date of Patent: May 19, 2015
    Assignee: Fachhochschule Schmalkalden
    Inventors: Werner Rozek, Thomas Rozek, Jan Rozek
  • Patent number: 9027110
    Abstract: The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a dynamic token part; the tool part comprises a control module and a tool radio frequency communication module; the dynamic token part comprises an MCU and liquid crystal module and an OTP radio frequency communication module. The method comprises: the tool part transmits a modulated wake-up command signal to the dynamic token part in the form of an electromagnetic wave; when a wake-up response command signal returned by the dynamic token part is correctly received, the tool part transmits the modulated command signal to the dynamic token part in the form of an electromagnetic wave; and the tool part detects the amplitude variation of the generated carrier signal, judges whether the response signal is correctly received, and operates correspondingly.
    Type: Grant
    Filed: August 28, 2012
    Date of Patent: May 5, 2015
    Assignee: Feitian Technologies Co., Ltd.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 9026797
    Abstract: A server apparatus having a one-time scan code issuing function, a user terminal having a one-time scan code recognizing function, and a method for processing a one-time scan code are provided so as to safely and conveniently transmit one-time information used for key-exchange-scheme-based encryption, using a scan code such as a bar code and a QR code.
    Type: Grant
    Filed: December 13, 2012
    Date of Patent: May 5, 2015
    Assignee: Korea Center.Com Co., Ltd.
    Inventor: Seong-Noh Yi
  • Patent number: 9021272
    Abstract: The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical address based keys that may also be transferred using dedicated buses. A cryptographic engine translates a logic address to at least one physical address, and processes a corresponding data word based on at least one target key. The target key is selected from a plurality of keys based on the logic or physical address. A universal memory controller stores each processed data word in the corresponding physical address within a memory. Each key is associated with a memory region within the memory, and therefore, the logic or physical address associated with a memory region may be used to automatically identify the corresponding target key. A dedicated secure link may be used to transport key request commands and the plurality of keys.
    Type: Grant
    Filed: August 28, 2012
    Date of Patent: April 28, 2015
    Assignee: Maxim Integrated Products, Inc.
    Inventors: Vincent Debout, Frank Lhermet, Yann Yves René Loisel, Grégory Rome, Christophe Tremlet
  • Patent number: 9015826
    Abstract: A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third authentication key for each function called by an application program. The apparatus may store the first authentication key and an identifier for identifying the application program in a first storage unit, the second authentication key and the identifier in a secret domain of a second storage unit, and register the third authentication key and the identifier as a function parameter in the application program. Subsequently, if the function is called by the application program, the apparatus may determine values for the first authentication key, the second authentication key, and the third authentication key corresponding to the called function, and may perform authentication processing using the three authentication key values.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: April 21, 2015
    Assignee: Pantech Co., Ltd.
    Inventor: Jae Choon Park
  • Patent number: 9015806
    Abstract: A system for establishing a connection between a first device and a wireless network includes a first control module, located on the first device, that receives encoded digital data. The encoded digital data corresponds to a plurality of images displayed sequentially on a display of a second device. Each of the plurality of images corresponds to a different portion of the encoded digital data. A decoder module, located on the first device, converts the encoded digital data into configuration data. The configuration data includes at least one of an identifier of the wireless network, an encryption key associated with the wireless network, and a password associated with the wireless network. The first control module uses the configuration data to establish the connection with the wireless network.
    Type: Grant
    Filed: October 7, 2011
    Date of Patent: April 21, 2015
    Assignee: Maxim Integrated Products, Inc.
    Inventor: Alex Tzu-Yu Song
  • Patent number: 9009474
    Abstract: A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system's kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: April 14, 2015
    Assignee: Trend Micro Incorporated
    Inventor: Blake Stanton Sutherland
  • Patent number: 9009793
    Abstract: The present invention provides cost efficient two way authentication method in which the authentication module can be provided as a Plug and Play (PnP) architecture enabling dual layer security with reduced cost where the actions are initiated by a server and user input is received through an audio session for added security. The second level authentication can be carried out with mobile as client device making it cost efficient. The invention can be hosted as an independent service or can be integrated with existing authentication mechanisms, making it elegant for usage.
    Type: Grant
    Filed: July 11, 2011
    Date of Patent: April 14, 2015
    Assignee: Infosys Limited
    Inventors: Sachin Prakash Sancheti, Sidharth Subhash Ghag
  • Publication number: 20150095642
    Abstract: The invention relates to a client computer for querying a database stored on a server via a network, the server being coupled to the client computer via the network, wherein the database comprises first data items and suffix items, wherein each suffix item describes a suffix of at least one first data item of the first data items, wherein for each suffix item a first referential connection exists in the database assigning said suffix item to the at least one first data item comprising the suffix of said suffix item, wherein each suffix item is encrypted with a suffix cryptographic key in the database, wherein each first data item is encrypted with a first cryptographic key in the database, wherein the client computer has installed thereon an application program, the application program being operational to: receiving a search request, the search request specifying a postfix search on a search criterion, determining the suffix item matching the search criterion, providing to the database a request for provi
    Type: Application
    Filed: September 25, 2014
    Publication date: April 2, 2015
    Inventor: Adrain Spalka
  • Patent number: 8994978
    Abstract: An image forming apparatus performs a direct printing function. A selecting section selects at least two files from a plurality of files stored in at least one of an internal storage medium and an external storage medium. A human interface receives passwords form a user. A password determining section determines whether the selected files are protected by passwords. A file extracting section extracts the selected files from an internal storage medium or external storage medium. A password verifying section determines whether passwords contained in the selected files and the passwords inputted through the human interface coincide. A printer prints the selected files. A printing controller controls the printer, causing the printer to print at least one of selected files if the password verifying section has determined that the password contained in the at least one selected file and the password inputted by the user coincide.
    Type: Grant
    Filed: October 27, 2011
    Date of Patent: March 31, 2015
    Assignee: Oki Data Corporation
    Inventors: Hiroyuki Tsuzuki, Kimitoshi Sato
  • Patent number: 8996880
    Abstract: An information handling system includes a memory and a detector circuit. The memory is configured to store a first electrocardiogram measurement. The detector circuit is configured to receive a second electrocardiogram measurement in response to a specific combination of keys of a keyboard being pressed for a specific period of time, wherein each key in the specific key combination includes an electrocardiogram sensor on a top surface of the key, to authorize a user and log the user onto the information handling system when the second electrocardiogram measurement matches the first electrocardiogram measurement, and otherwise: to deny access to the information handling system; to increase a counter; to determine whether the counter has exceeded a threshold; and to request that an input window is displayed when the counter has exceeded the threshold.
    Type: Grant
    Filed: May 16, 2013
    Date of Patent: March 31, 2015
    Assignee: Dell Products, LP
    Inventors: David Konetski, Frank H. Molsberry
  • Publication number: 20150089218
    Abstract: A security command protocol provides secure authenticated access to an auxiliary security memory within a SCSI storage device. The auxiliary security memory acts as an authenticated separate secure storage area that stores sensitive data separately from the user data area of the SCSI storage device. The security command protocol is used to access the auxiliary security memory. The security command protocol allows a trusted execution environment to transport sensitive data to and from storage in the auxiliary security memory. The regular execution environment does not have access to the security command protocol or the auxiliary security memory. The security command protocol and auxiliary security memory eliminate the need for additional secure storage components in devices that provide the security features of firmware TPM.
    Type: Application
    Filed: September 23, 2013
    Publication date: March 26, 2015
    Applicant: NVIDIA CORPORATION
    Inventor: Mark A. OVERBY
  • Publication number: 20150089217
    Abstract: The present disclosure provides a way for an enciphering party to protect data by ciphering the data, and establishing conditions upon which that data can be deciphered (or accessed) by a deciphering party, without requiring the enciphering party or the deciphering party to share a cipher key, or any other information that in-and-of-itself may be used to decipher the transmitted data; without requiring a System to store the cipher key, or any information that, in isolation, may be used to produce the key; or without requiring that the enciphering party share private data, in any form, with the System.
    Type: Application
    Filed: September 23, 2014
    Publication date: March 26, 2015
    Applicant: Secourier, LLC
    Inventors: Joseph Max Romanik, Christopher Scott Webster
  • Patent number: 8989376
    Abstract: A method for authenticating video content includes: receiving a digital signature, an unsecured video fingerprint, and an unsecured video content from a transmitting node at a receiving node in a communication network; determining if the digital signature is consistent with the unsecured video fingerprint at the receiving node to verify the unsecured video fingerprint; and determining if the unsecured video fingerprint is consistent with the unsecured video content at the receiving node to verify the unsecured video content in a manner that tolerates a predetermined measure of loss in the unsecured video content. If the unsecured video fingerprint and the unsecured video content are verified, the unsecured video content is authenticated for subsequent use at the receiving node. A receiving node associated with the method includes an input module, a fingerprint verification module, a content verification module, and a controller module.
    Type: Grant
    Filed: March 29, 2012
    Date of Patent: March 24, 2015
    Assignee: Alcatel Lucent
    Inventors: Yansong Ren, Lawrence O'Gorman, John R. Zhang, Thomas L. Wood
  • Patent number: 8989704
    Abstract: Systems and methods for providing information security in an unobtrusive manner are presented herein. An authentication component can enable a primary user of a multi-user communications device, based on an authentication process initiated by the primary user, to classify information stored in the multi-user communications device as invisible to other users of the device. The information classified as invisible to the other users can include phone number(s), phone message(s), email address(es), email(s), electronic message(s), call history, email history, and/or personal data. In addition, an information access component can enable the primary user to access the information classified as invisible to the other users of the multi-user communications device upon authentication of the primary user's identity.
    Type: Grant
    Filed: December 10, 2008
    Date of Patent: March 24, 2015
    Assignee: Symbol Technologies, Inc.
    Inventors: Amesh Chanaka Jayasuriya, Rohan Dehigaspitiyage Don
  • Patent number: 8989374
    Abstract: According to one embodiment, a memory being used to store a host identification key, a host constant (HC), and a first key, the first key being generated based on the host constant (HC); a first generator configured to decrypt a family key block read from an external device with the host identification key to generate a family key; a second generator configured to decrypt encrypted secret identification information read from the external device with the family key to generate a secret identification information; a third generator configured to generate a random number; a fourth generator configured to generate a session key by using the first key and the random number; a fifth generator configured to generate a first authentication information by processing the secret identification information with the session key in one-way function operation.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: March 24, 2015
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita
  • Patent number: 8990567
    Abstract: A digital signature of a message originator of a message is validated by a processor on message retrieval by a message recipient as a first-tier validation of the message. In response to a successful first-tier validation of the digital signature of the message originator, a transaction token and a message originator identifier are extracted from a message payload of the message. Communication is initiated with a verification service within a secure messaging environment of the message originator as a second-tier validation of the message using the extracted transaction token and the extracted message originator identifier to confirm whether the secure messaging environment of the message originator generated the transaction token and inserted the transaction token into the message payload. Results of the second-tier validation of the message with the verification service within the secure messaging environment of the message originator are determined.
    Type: Grant
    Filed: June 7, 2013
    Date of Patent: March 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Bret W. Dixon, Scot W. Dixon
  • Publication number: 20150082028
    Abstract: A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.
    Type: Application
    Filed: November 25, 2014
    Publication date: March 19, 2015
    Applicant: DIGITAL REG OF TEXAS, LLC
    Inventors: Eugene B. PHILLIPS, II, Seth ORNSTEIN
  • Patent number: 8984286
    Abstract: A digital signature of a message originator of a message is validated by a processor on message retrieval by a message recipient as a first-tier validation of the message. In response to a successful first-tier validation of the digital signature of the message originator, a transaction token and a message originator identifier are extracted from a message payload of the message. Communication is initiated with a verification service within a secure messaging environment of the message originator as a second-tier validation of the message using the extracted transaction token and the extracted message originator identifier to confirm whether the secure messaging environment of the message originator generated the transaction token and inserted the transaction token into the message payload. Results of the second-tier validation of the message with the verification service within the secure messaging environment of the message originator are determined.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: March 17, 2015
    Assignee: International Business Machines Corporation
    Inventors: Bret W. Dixon, Scot W. Dixon
  • Patent number: 8984587
    Abstract: A system and method for managing communication. The system and method applying to but not limited to settop boxes (STBs) and other devices used to interface services. The management including any number of features and processes associated with achieving Quality of Service (QoS) across different domains and according to network limitations associated with the same.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: March 17, 2015
    Assignee: Comcast Cable Holdings, LLC
    Inventor: Mark D. Francisco
  • Patent number: 8976813
    Abstract: Methods and apparatus are provided for communicating a flow of packets with a requested quality of service. An exemplary method involves receiving a first packet of a flow, determining a first reference value for the packet flow identification field of the first packet using a key value, and facilitating the requested quality of service for the first packet when the received value of the packet flow identification field of the first packet matches the first reference value. The method continues by receiving a second packet of the flow, determining a second reference value for the packet flow identification field using the key value, and facilitating the requested quality of service for the second packet when the received value of the packet flow identification field of the second packet matches the second reference value.
    Type: Grant
    Filed: September 8, 2011
    Date of Patent: March 10, 2015
    Assignee: Motorola Solutions, Inc.
    Inventors: Tyrone D. Bekiares, Robert A. Fredericks, Adam C. Lewis
  • Patent number: 8977846
    Abstract: A method for the secure transfer of a digital file from a first computerized system to one second computerized system, the method comprising the following steps: writing the digital file on a first file-management module of a secure transfer device, transferring the digital file to an internal verification module of the secure transfer device, verifying one portion of the transferred digital file in the verification module, and transferring the partially verified digital file to a second file-management module of the secure transfer device according to the result of the verification, in order to allow the file to be read by the one second computerized system according to the result of the verification.
    Type: Grant
    Filed: October 7, 2011
    Date of Patent: March 10, 2015
    Assignee: Electricite de France
    Inventors: Arnaud Tarrago, Pascal Sitbon, Pierre Nguyen
  • Patent number: 8959620
    Abstract: A method for composing an authentication password associated with an electronic device is implemented by a password composing system including a display, a receiving unit, and a processing unit. In the method, the display is configured to display a start point, and a plurality of displayed paths. The receiving unit is configured to detect a set of user-input movements of a contact point at the display. The processing unit is configured to determine whether the user-input movements conform with a predefined valid user-input gesture, store a plurality of codes corresponding to the valid user-input gestures, and to compose the authentication password according to valid ones of the series of the user-input movements.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: February 17, 2015
    Assignee: Mitac International Corp.
    Inventors: Ching-Teng Hsueh, Hui-Chun Yang
  • Patent number: 8959304
    Abstract: A data processing apparatus comprises a primary processor, a secondary processor configured to perform secure data processing operations and non-secure data processing operations and a memory configured to store secure data used by the secondary processor when performing the secure data processing operations and configured to store non-secure data used by the secondary processor when performing the non-secure data processing operations, wherein the secure data cannot be accessed by the non-secure data processing operations, wherein the secondary processor comprises a memory management unit configured to administer accesses to the memory from the secondary processor, the memory management unit configured to perform translations between virtual memory addresses used by the secondary processor and physical memory addresses used by the memory, wherein the translations are configured in dependence on a page table base address, the page table base address identifying a storage location in the memory of a set of des
    Type: Grant
    Filed: February 26, 2013
    Date of Patent: February 17, 2015
    Assignee: ARM Limited
    Inventors: Dominic Hugo Symes, Ola Hugosson, Donald Felton, Sean Tristram Ellis
  • Patent number: 8954759
    Abstract: A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to authenticate data. Further, the magnetic memory device has parameter memory that maintains a protected zone used to store protected zone parameters, and an authentication zone used to store authentication parameters, the protection zone parameters and the authentication parameters being associated with the data that requires authentication. Upon modification of any of the parameters stored in the parameter memory by a user, a corresponding location of the parameter area of the main memory is also modified.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: February 10, 2015
    Assignee: Avalanche Technology, Inc.
    Inventors: Siamack Nemazie, Ngon Van Le
  • Patent number: 8955143
    Abstract: Disclosed are various embodiments for identifying a table of non-decoy data matching a set of criteria. Decoy data is inserted into the table of non-decoy data. The decoy data is detected in a result comprising the decoy data, the result generated in response to an access of the data store. An alarm is generated based at least upon the result.
    Type: Grant
    Filed: September 4, 2012
    Date of Patent: February 10, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Harsha Ramalingam, Timothy Mark Edward Bollefer, Dominique I. Brezinski, Jesper M. Johansson, James C. Petts
  • Patent number: 8949600
    Abstract: Prior to transmission, a message is divided into multiple transmission units. A sub-message authentication code is obtained for each of the transmission units. A composed message authentication code is obtained for the whole message based on the sub-message authentication codes of the multiple transmission units. The multiple transmission units and the composed message authentication code are then transmitted. A receiver of the message receives a plurality of transmission units corresponding to the message. A local sub-message authentication code is calculated by the receiver for each transmission unit. A local composed message authentication code is calculated by the receiver based on the local sub-message authentication codes for the plurality of transmission units. The local composed message authentication code is compared to a received composed message authentication code to determine the integrity and/or authenticity of the received message.
    Type: Grant
    Filed: March 1, 2007
    Date of Patent: February 3, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Michael Paddon, Adrian Escott, Gregory G. Rose, Philip Hawkes
  • Patent number: 8947679
    Abstract: A portable handheld device including a CPU for processing a script; a multi-core processor for processing an image; an input buffer for receiving data for processing by the multi-core processor, the input buffer being provided under the control of the multi-core processor to send data thereto; and an output buffer for receiving data processed by the multi-core processor, the output buffer being provided under the control of the multi-core processor to receive data therefrom. The multi-core processor comprises a plurality of micro-coded processing units. The CPU is configured with authority to clear and query the input and output buffers.
    Type: Grant
    Filed: September 15, 2012
    Date of Patent: February 3, 2015
    Assignee: Google Inc.
    Inventor: Kia Silverbrook
  • Patent number: 8949593
    Abstract: An authentication system receives encrypted terminal identification information and terminal identification information, from a transmission terminal, and determines whether decrypted identification information decrypted using a terminal public key obtained by the authentication system matches the terminal identification information received from the transmission terminal.
    Type: Grant
    Filed: February 11, 2011
    Date of Patent: February 3, 2015
    Assignee: Ricoh Company, Limited
    Inventors: Masaki Nakagawa, Alain Volmat, Takahiro Asai
  • Publication number: 20150033012
    Abstract: Embodiments of an invention for secure processing environment measurement and attestation are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive a first instruction associated with a build or a rebuild of a secure enclave. The execution unit is to execute the first instruction. Execution of the first instruction, when associated with the build, includes calculation of a first measurement and a second measurement of the secure enclave. Execution of the first instruction, when associated with the rebuild, includes calculation of the second measurement without calculation of the first measurement.
    Type: Application
    Filed: July 23, 2013
    Publication date: January 29, 2015
    Inventors: Vincent R. Scarlata, Carlos Rozas, Simon Johnson, Uday Savagaonkar, Rebekah Leslie-Hurd, Barry Huntley, Vedvyas Shanbhogue, Ittai Anati, Francis McKeen, Michael Goldsmith, William Wood, Shay Gueron
  • Patent number: 8938625
    Abstract: Systems and methods for authenticating playback devices using timestamp validation in accordance with embodiments of the invention are disclosed. One embodiment includes securely storing at least one timestamp in memory within a playback device in response to the occurrence of at least one predetermined event, where a stored timestamp is based on the current time of a system clock when an event occurs, generating a cryptographic key using the at least one timestamp, securing cryptographic data using the cryptographic key, receiving a request to playback encrypted content, where the encrypted content is accessible using the cryptographic data, accessing the at least one timestamp, generating the cryptographic key, accessing the cryptographic data using at least the cryptographic key, and playing back the content using the playback device.
    Type: Grant
    Filed: March 31, 2012
    Date of Patent: January 20, 2015
    Assignee: Sonic IP, Inc.
    Inventors: Eric William Grab, Francis Yee-Dug Chan, Michael George Kiefer
  • Patent number: 8935758
    Abstract: A data processing system (100) comprises: a database (4); a host computer (3) and a user computer (1) capable of communicating with each other over a network (2); wherein the user computer sends a data request message (RQ) to the host computer (3), the request message containing Data information (RD), Identity information (RI), and Authenticity information (A; VI), wherein the host computer (3) checks the authentication information and only sends the required data if the Identity information (RI) defines an authorized user and the authentication information (A; VI) authenticates the user identification information. The request message further contains secondary information (RT) and the host computer (3) calculates, from the secondary-information, a reliability value (R), compares the calculated reliability value with a predefined reliability threshold, and sends the required data only if the reliability value is at least as high as the reliability threshold.
    Type: Grant
    Filed: March 18, 2011
    Date of Patent: January 13, 2015
    Assignee: Authasas BV
    Inventors: Rik Peters, Reinier Maria Van Der Drift, Menno Stijl
  • Patent number: 8928897
    Abstract: According to an aspect of the disclosure, a portable handheld device includes a CPU for processing a script; a multi-core processor for processing an image, and a DRAM for storing image data. The CPU and the multi-core processor are integrated on one chip and share a data cache provided on the same chip. The DRAM is provided external to the chip. The portable handheld device further comprises a DRAM interface for receiving and sending data to the DRAM, the DRAM interface being provided on the same chip and sharing the data cache with the CPU and the multi-core processor.
    Type: Grant
    Filed: September 15, 2012
    Date of Patent: January 6, 2015
    Assignee: Google Inc.
    Inventor: Kia Silverbrook
  • Patent number: 8918897
    Abstract: A method begins with a processing module issuing a retrieval request, receiving secret shares of a set of secret shares to produce received secret shares, and receiving encoded data slices of a set of encoded data slices. The method continues with the processing module decoding the received secret shares to recapture a message authentication key when a threshold number of the secret shares is received. The method continues with the processing module identifying a received encoded data slice of the received encoded data slices having an authentication code associated therewith when a threshold number of the encoded data slices is received. The method continues with the processing module verifying the authentication code based on the message authentication key and the received encoded data slice. The method continues with the processing module decoding the received encoded data slices to recapture a data segment when the authentication code is verified.
    Type: Grant
    Filed: August 25, 2010
    Date of Patent: December 23, 2014
    Assignee: Cleversafe, Inc.
    Inventor: Jason K. Resch
  • Patent number: 8918842
    Abstract: A command filter module filters receives a plurality commands intended for receipt by devices interconnected within a utility grid. The command filter module may authorize the plurality of commands for execution by the respective devices based on predetermined set of command rules. Historical and real-time data may be implemented by the command filter module to perform an authorization decision for the plurality of commands. Authorized commands may be transmitted by the command filter module for receipt by the respective devices. The command filter module may generate rejection messages corresponding to unauthorized commands. The rejection messages may be transmitted to a source of an unauthorized command.
    Type: Grant
    Filed: February 19, 2010
    Date of Patent: December 23, 2014
    Assignee: Accenture Global Services Limited
    Inventor: Jeffrey D. Taft
  • Patent number: 8910304
    Abstract: A control API controls secret data to be stored in a secret data storage area which is accessible only to the control API. Moreover, the control API controls the file information storing part in the secret data storage area to store (i) storing location information of the stored secret data and (ii) administrative storage location information notified by the web application so that the storing location information and the administrative storage location information are associated with each other. This makes it possible to (i) prevent a leakage of confidential information and (ii) allow an authorized web application to easily use the confidential information.
    Type: Grant
    Filed: October 25, 2012
    Date of Patent: December 9, 2014
    Assignee: Sharp Kabushiki Kaisha
    Inventor: Kunihiko Tsujimoto
  • Patent number: 8910247
    Abstract: Embodiment relate to systems, methods, and computer storage media for suppressing cross-site scripting in a content delivery system. A request is received for content that includes a scripted item or scripted items. The scripted item is identified within the content. An identifier is associated with the scripted element when the scripted element is an intended scripted element to be associated with the content. The identifier may be a hash value based from a hash function and the scripted item. Prior to communicating the content to a user, the scripted item is identified again to determine if an identifier is associated with the scripted item. If an identifier is associated with the scripted item, the identifier is evaluated to determine if the identifier is appropriate. When the identifier is determined to not be appropriate, the scripted item is prevented from being communicated to a user.
    Type: Grant
    Filed: October 6, 2010
    Date of Patent: December 9, 2014
    Assignee: Microsoft Corporation
    Inventors: Michael Andrews, Sharat Shroff, Dennis Gursky, Melissa Lauren Benua
  • Patent number: 8898742
    Abstract: A computer-implemented method is provided for controlling use of a file on a user device. The method includes transmitting authentication information to a system and downloading the file from the system over the network upon successful authentication by the system. The method also includes limiting access of the file to a client application of the user device and preventing altering of the file, printing of the file and opening of the file outside of the client application. Notes corresponding to the file can be stored in a local storage area.
    Type: Grant
    Filed: October 11, 2011
    Date of Patent: November 25, 2014
    Assignee: Paramount Pictures Corporation
    Inventors: Raymond G. Joyce, Damon Garrett, Frederick Huntsberry, Randy Tunila