Security Levels Patents (Class 713/166)
  • Patent number: 9032174
    Abstract: A processor determines whether a first program is under execution when a second program is executed, and changes a setting of a memory management unit based on access prohibition information so that a fault occurs when the second program makes an access to a memory when the first program is under execution. Then, the processor determines whether an access from the second program to a memory area used by the first program is permitted based on memory restriction information when the fault occurs while the first program and the second program are under execution, and changes the setting of the memory management unit so that the fault does not occur when the access to the memory area is permitted.
    Type: Grant
    Filed: February 11, 2013
    Date of Patent: May 12, 2015
    Assignee: Fujitsu Limited
    Inventor: Naoki Nishiguchi
  • Patent number: 9031536
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Grant
    Filed: April 2, 2008
    Date of Patent: May 12, 2015
    Assignee: Yougetitback Limited
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Patent number: 9032542
    Abstract: A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the storage device, receives a request for the object, determines if the request includes the key, and, if the request has authorization information, permits access to the object. The data handler receives another request for the object, determines if the request includes the key, and, if the request does not have the authorization information, denies access to the object.
    Type: Grant
    Filed: February 28, 2014
    Date of Patent: May 12, 2015
    Assignee: Dell Products, LP
    Inventors: Farzad Khosrowpour, Marco A. Peereboom
  • Patent number: 9021547
    Abstract: This disclosure is directed toward an integrated switching and routing security device that provides zone-based security directly between layer two (L2) interfaces of L2 bridge domains and/or layer three (L3) interfaces of L3 routing instances within the security device. The integrated switching and routing security device supports both switching and routing functionalities for packets on L2 and L3 interfaces, and supports security within and between L2 bridge domains and L3 routing instances. The integrated switching and routing security device configures L2 security zones for one or more L2 interfaces and configures L3 security zones for one or more L3 interfaces. The integrated switching and routing security device then applies security policies to incoming packets according to the L2 security zones and/or the L3 security zones associated with the incoming interface and an outgoing interface for the packets to provide end-to-end security within the security device.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: April 28, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Tsai-Zong Lin, Chih-Wei Chao, Jin Shang, Dongyi Jiang, Anchung Chung
  • Patent number: 9021593
    Abstract: The present invention discloses a XSS detection method for detecting the XSS vulnerabilities in a web page, comprising for each parameter-value pair in a set of parameter-value pairs that can be accepted by the web page: constructing a parameter-value pair in which a dedicated script is inserted; assembling a URL corresponding to the web page based on the parameter-value pair in which a dedicated script is inserted; acquiring the dynamic web page content corresponding to the assembled URL; and simulating the execution of the acquired dynamic web page content, if the dedicated script is executed, it is determined that the processing of the parameter in the web page contains XSS vulnerabilities. The present invention further discloses a corresponding XSS detection device and a web site security scanning system and a web scanning system using such a device.
    Type: Grant
    Filed: July 23, 2010
    Date of Patent: April 28, 2015
    Assignee: NSFOCUS Information Technology Co., Ltd.
    Inventors: Guangxu Liu, Yujie Wen, Da Zhou, Xiaoming Wang, Xiaoxia Liu
  • Patent number: 9021559
    Abstract: A Multilevel Security (MLS) server provides MLS functionality to single-level applications running on a remote Multiple Independent Level Security (MILS) or MLS client device. More specifically, the MLS server provides a plurality of different security domains in which applications can execute. The client device executes a single-level application in a first security domain, the single-level application not natively capable of communicating with other domains. The single-level application in the first security domain sends a request to the MLS server. The MLS server receives the request, passing it to all applicable domains, including a second security domain, where it is duly executed. The MLS server then provides the results of the request execution—if any—back to an appropriate application on the client device.
    Type: Grant
    Filed: October 11, 2013
    Date of Patent: April 28, 2015
    Assignee: BlueSpace Software Corporation
    Inventors: Brian J. Vetter, Justin Philip Marston, David Sundstrom
  • Patent number: 9021546
    Abstract: A computer-implemented method for workload security in virtual data centers may include (1) identifying a virtual data center that hosts a plurality of workloads sharing a common computing infrastructure, (2) identifying a workload within the plurality of workloads that is subject to a sensitivity assessment that pertains to an application of at least one security policy to at least one computing resource used by the workload, (3) performing the sensitivity assessment for the workload based at least in part on an attribute of an allocated resource within the common computing infrastructure provisioned to the workload, and (4) applying the security policy to the computing resource based at least in part on the sensitivity assessment for the workload. Various other methods, systems, and encoded computer-readable media are also disclosed.
    Type: Grant
    Filed: November 8, 2011
    Date of Patent: April 28, 2015
    Assignee: Symantec Corporation
    Inventor: Deb Banerjee
  • Patent number: 9021258
    Abstract: A device for transcoding during an encryption-based access check of a client device to a databank, which provides a data set in an encrypted area, has: a unit for assigning a specific access level of the client device and for providing a corresponding first group key of the client device as a function of a registration parameter, wherein the client device is allowed access to a first area, which is encrypted using the first group key, and all areas of the database subordinate to the first area as a function of the assigned access level; a unit for providing a classification result depending on a classification of the data set of the particular area by one of the client devices allowed to access the particular area; and a unit for transcoding the data set and/or a data set key for the data set as a function of the classification result.
    Type: Grant
    Filed: March 12, 2009
    Date of Patent: April 28, 2015
    Assignee: Siemens Aktiengesellschaft
    Inventors: Jens-Uwe Busser, Steffen Fries, Angela Schattleitner
  • Patent number: 9015495
    Abstract: A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment and a secure execution environment The mobile terminal enables the software of the terminal in the secure execution environment to be updated. The terminal may be provided with minimal software initially in the secure execution environment, and is operable to subsequently update the software by over the air transmission of software. Also disclosed is a method for managing rights in respect of broadcast, multicast and/or unicast (downloaded) data. The method defines a service protection platform implemented on mobile terminals having both normal execution environment and secure execution environment. Service protection is provided by separating the operation of service protection application components into those that operate in the normal environment and those that are adapted to execute only in the secure execution environment.
    Type: Grant
    Filed: December 2, 2013
    Date of Patent: April 21, 2015
    Assignee: Vodafone IP Licensing Limited
    Inventors: Mark Priestley, Timothy Wright, Caroline Jessica Belrose, Nicholas Bone, James Irwin
  • Patent number: 9015472
    Abstract: Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message is human originated are received. Then, the fact that the electronic message is human originated is conveyed to one or more recipients of the electronic message by associating with the electronic message a human origination indication.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: April 21, 2015
    Assignee: McAfee, Inc.
    Inventor: C. Scott Chasin
  • Patent number: 9015791
    Abstract: A method of managing policy information in a mobile terminal by requesting an external policy management server for information about whether a change has been made to policy information and updating the policy information in a smart card web server of the mobile terminal to control access to resources based on the updated policy information.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: April 21, 2015
    Assignee: KT Corporation
    Inventors: Hae Young Kim, Chae Un Kang, Young Min Lee, Un Hae Chun
  • Patent number: 9013740
    Abstract: This invention provides a mechanism which improves the operability by speeding up an operation of displaying a personal address book. To accomplish this, an information processing apparatus manages a plurality of transmit destinations by classifying the plurality of transmit destinations into a plurality of first transmit destination groups individually for respective users, and a second transmit destination group shared by a plurality of users, and displays on a display unit a list of transmit destinations included in a first transmit destination group corresponding to an authenticated user if an authentication function is valid, and displays on the display unit a list of transmit destinations included in the second transmit destination group if the authentication function is invalid.
    Type: Grant
    Filed: November 1, 2012
    Date of Patent: April 21, 2015
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kenta Fukushima
  • Patent number: 9009785
    Abstract: A system for managing adaptive security zones in complex business operations, comprising a rules engine adapted to receive events from a plurality of event sources and a security manager coupled to the rules engine via a data network, wherein upon receiving an event, the rules engine determines what rules, if any, are triggered by the event and, upon triggering a rule, the rules engine determines if the rule pertains to security and, if so, sends a notification message to the security manager informing it of the triggered event, and wherein the security manager, on receiving a notification message from the rules engine, automatically establishes a new security zone based at least in part on the contents of the notification message, is disclosed.
    Type: Grant
    Filed: February 27, 2014
    Date of Patent: April 14, 2015
    Assignee: LiveOps, Inc.
    Inventors: Vidur Apparao, Niall Browne, Scott Bailey, Jeremy King
  • Patent number: 9003185
    Abstract: A client computer that is connectable to a host computer by a network, includes a communication part to communicate with the host computer; a user input part; a system part to perform a function depending on an application; and a controller to control the system part to be put into a locking state to stop performing operations input by a user from the user input part if a locking signal is received from the host computer through the communication part, and to control the communication part to unlock the locking state if an unlocking signal is received from the host computer through the communication part.
    Type: Grant
    Filed: August 12, 2013
    Date of Patent: April 7, 2015
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Jeom-jin Chang
  • Patent number: 8996866
    Abstract: Computer-executable instructions that are directed to the performance of consequential actions and automatically elevate to execute at a higher privilege level to do so can perform such consequential actions only after user notification. Doing so can enable monitoring processes to avoid presenting duplicative user notification upon detection of such auto-elevation. In addition, prior to presenting user notification, input from the execution environment can be ignored and access to DLLs for performing consequential actions can be avoided. A static analyzer can identify non-conforming computer-executable instructions. A wrapper can be utilized to provide compliance by otherwise unknown or non-conforming computer-executable instructions.
    Type: Grant
    Filed: December 22, 2009
    Date of Patent: March 31, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Crispin Cowan, Matthew Z. Tamayo-Rios, Tanmoy Dutta, John Lambert, Paul J. Leach, Scott A. Field, Thomas C. Jones
  • Patent number: 8997185
    Abstract: An encryption sentinel system and method protects sensitive data stored on a storage device and includes sentinel software that runs on a client machine, sentinel software that runs on a server machine, and a data storage device. When a client machine requests sensitive data from the data storage device, the data storage device interrogates the sentinel software on the server machine to determine if this client machine has previously been deemed to have proper encryption procedures and authentication. If the sentinel server software has this information stored, it provides an approval or denial to the storage device that releases the data if appropriate. If the sentinel server software does not have this information at hand or the previous information is too old, the sentinel server interrogates the sentinel software that resides on the client machine which scans the client machine and provides an encryption update to the sentinel server software, following which data will be released if appropriate.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: March 31, 2015
    Inventor: Bruce R. Backa
  • Patent number: 8990893
    Abstract: Mechanisms are provided for performing centralized control of application sessions across a distributed computing environment comprising a plurality of application servers. A request to perform an application session control operation to control the application sessions associated with a specified user account identifier across the plurality of application servers in the distributed computing environment is received. A plurality of application instances upon which to perform the requested application session control operation are identified. An application session control request is transmitted to a plurality of session control clients associated with the application instances on the plurality of application servers of the distributed computing environment.
    Type: Grant
    Filed: November 12, 2012
    Date of Patent: March 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Gordan G. Greenlee, Richard J. McCarty
  • Patent number: 8990560
    Abstract: Systems and methods for use in secure network communication. A physical network interface receives a network packet associated with a security level. The network packet is transmitted from the physical network interface to a security policy component. The network packet is routed to a stack offload engine by the security policy component based on a network address associated with the network packet and the security level associated with the network packet. The network packet is provided by the stack offload engine to a software application via trusted memory interface that transfers the packet to a memory portion of a plurality of memory portions. The memory portion corresponds to the security level.
    Type: Grant
    Filed: June 17, 2011
    Date of Patent: March 24, 2015
    Assignee: The Boeing Company
    Inventors: Richard F. Massey, William E. Bond, Gregg E. Franke, Patrick A. Pekkarinen
  • Patent number: 8990907
    Abstract: Embodiments are directed to establishing separate security identities for a shared service and shared service instances, and to managing shared and service instance credentials. In one scenario, a computer system establishes a shared credential for a shared service that includes multiple shared service instances, where the shared credential uniquely identifies the shared service. The computer system establishes a service instance credential for each shared service instance that uniquely identifies each shared service instance and maintains a relationship between the service instance and the shared service. The relationship provides service instance access to the shared credentials as the shared credentials are updated over time. Then, upon determining that the shared credentials have been updated and are no longer valid, the shared service instance accesses the updated shared credentials using the established relationship.
    Type: Grant
    Filed: November 9, 2012
    Date of Patent: March 24, 2015
    Assignee: Microsoft Corporation
    Inventors: David A. Matson, Kahren Tevosyan, Mark Russinovich
  • Patent number: 8990571
    Abstract: According to one embodiment, encrypted secret identification information (E-SecretID) and the key management information (FKB) are read from a memory device. Encrypted management key (E-FKey) is obtained using the key management information (FKB) and index information (k). The index information (k) and the encrypted management key (E-FKey) are transmitted to the semiconductor memory device. An index key (INK) is generated using the first key information (NKey) and the received index information (k). The encrypted management key (E-FKey) is decrypted using the index key (INK) to obtain management key (FKey), which is transmitted to the host device.
    Type: Grant
    Filed: December 19, 2013
    Date of Patent: March 24, 2015
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Taku Kato, Tatsuyuki Matsushita, Yuji Nagai
  • Patent number: 8990955
    Abstract: A shared data store may be accessible to a plurality of electronic devices and used to share files in a collaboration setting. A shared file is shared by a first electronic device with a second device via a connection between the first electronic device and the shared data store. A coordinating electronic device associated with the shared data store monitors the connection with the first electronic device. If a loss in the connection is detected, the coordinating electronic device may cause access to the shared file to become restricted to the second electronic device responsive to the loss of the connection.
    Type: Grant
    Filed: August 1, 2012
    Date of Patent: March 24, 2015
    Assignee: BlackBerry Limited
    Inventors: James Allen Hymel, Janine Mary Hodder, Jean Philippe Bouchard
  • Patent number: 8984269
    Abstract: Embodiments relate to systems and methods for migrating data between cloud networks via a data distribution service. In aspects, an administrator of a data payload may wish to migrate the data payload from a host cloud network to a target cloud provider to leverage cost, security, redundancy, consolidation, or other advantages. The data distribution service can identify target cloud providers with sets of resources that are capable of hosting the data payload. Further, the data distribution service can determine that the target cloud providers are connected to or capable of being connected to the data distribution service via a set of dedicated communication channels. According to aspects, the data distribution service can receive the data payload from the host cloud network, and transport the data payload to a selected target cloud provider via the set of dedicated communication channels.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: March 17, 2015
    Assignee: Red Hat, Inc.
    Inventor: James Michael Ferris
  • Patent number: 8977848
    Abstract: Systems and methods for providing safety and security functions are disclosed. The system includes a computing device that provides at least a first partition and a second partition. The computing device implements time and space partitioning to isolate resources available to the first partition and the second partition. The system also includes a safety module that operates in the first partition for providing safety functions for the system. The system further includes a security module that operates in the second partition for providing security functions for the system. A predefined communication interface is utilized to facilitate communications between the safety module and the security module. The communication interface defines a set of communications allowable between the safety module and the security module, wherein information sharing between the safety module and the security module is restricted to only the set of communications allowed through the communication interface.
    Type: Grant
    Filed: November 15, 2011
    Date of Patent: March 10, 2015
    Assignee: Rockwell Collins, Inc.
    Inventors: Brandon L. Tomlinson, Kevin R. Priest, Branden H. Sletteland, Michael J. Frerking, Cheryl L. Killham, Brian S. Cain, Jeffrey B. McNamara, Greg L. Shelton
  • Patent number: 8977849
    Abstract: A computer-implemented method for creating a rights management system (RMS) with superior layers and subordinate layers is described. A separate trust network for one or more layers of the RMS is established. The trust network includes one or more computing nodes within the one or more layers. A data object is created on a computing node that is a member of trust network in a superior layer. The data object is encrypted to a ciphertext data object. A publishing license is created for each of the one or more layers of the RMS. Access rights and attributes associated with the ciphertext data object are controlled within each layer based on the publishing license of each of the one or more layers of the RMS.
    Type: Grant
    Filed: September 2, 2009
    Date of Patent: March 10, 2015
    Assignee: Symantec Corporation
    Inventor: Thomas Clifford
  • Patent number: 8978155
    Abstract: In one exemplary embodiment, a method includes: storing data for a file, organized as blocks, each having a portion of the file; and maintaining a skip list for the data. The skip list is an ordered tree structure having a root node, internal nodes and leaf nodes. Each leaf node corresponds to a block. Each node has a rank value corresponding to size of a subtree rooted at the node. The skip list employs a hashing scheme. The hash value of the root node and internal nodes is computed from a level of the node, the rank value and an interval between the node and another linked node to the right of or below the node. The hash value of the leaf nodes is computed from a level of the node, the rank value and an interval associated with the node.
    Type: Grant
    Filed: July 24, 2009
    Date of Patent: March 10, 2015
    Assignee: Brown University
    Inventors: Charles Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia
  • Patent number: 8973144
    Abstract: A method includes creating a soft whitelist having an entry corresponding to a first guest kernel page in a guest operating system (OS) in a hypervisor environment including a hypervisor. The method also includes receiving an access attempt to a second guest kernel page, and generating a page fault when the access attempt is made to the second guest kernel page. In addition, the method includes determining that the second guest kernel page does not correspond to the entry in the soft whitelist, and denying an execution of the second guest kernel page if the second guest kernel page does not correspond to the entry in the soft whitelist.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: March 3, 2015
    Assignee: McAfee, Inc.
    Inventors: Amit Dang, Preet Mohinder, Vivek Srivastava
  • Patent number: 8972725
    Abstract: A framework for handling a secure interaction between components in a cloud infrastructure system that wish to transfer information between each other during processing of a customer's subscription order is described. The framework orders the security zones of components based on security levels and protects the transfer of information between components in security zones with different security levels. The assignment of a component to a security zone is based upon the sensitivity of the data handled by the components, the sensitivity of functions performed by the component, and the like.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: March 3, 2015
    Assignee: Oracle International Corporation
    Inventors: Gopalan Arun, Ramkrishna Chatterjee, Ramesh Vasudevan
  • Patent number: 8970400
    Abstract: A mass notification push application and a civic-communication application combined into one with the primary purpose of allowing up-to-the-minute UAV aerial imagery as selected by drone ground-based commanders to be automatically transmitted to subscribed end-users via the current OS mobile operating systems for smartphones, iPads, laptops, and web-enabled devices in a manner comprised of separate technologies such as voice (voice to text, voice recognition), video stills (embedded with personalized iconographic identifiers), and with a secondary purpose of allowing the notified recipients to engage others by allowing the retransmitting of received messages along with (or without) registered user annotations so as to create a civil communications hub for wider, real-time dissemination of ongoing situational awareness data.
    Type: Grant
    Filed: January 30, 2012
    Date of Patent: March 3, 2015
    Assignee: Verna IP Holdings, LLC
    Inventors: Anthony Verna, Luis M. Ortiz, Kermit D. Lopez
  • Patent number: 8966648
    Abstract: Improved privacy preservation techniques are disclosed for use in accordance with data mining. By way of example, a technique for preserving privacy of data records for use in a data mining application comprises the following steps/operations. Different privacy levels are assigned to the data records. Condensed groups are constructed from the data records based on the privacy levels, wherein summary statistics are maintained for each condensed group. Pseudo-data is generated from the summary statistics, wherein the pseudo-data is available for use in the data mining application.
    Type: Grant
    Filed: October 11, 2013
    Date of Patent: February 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Charu C. Aggarwal, Philip Shi-Lung Yu
  • Patent number: 8959339
    Abstract: A system comprising a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing security rules pertaining to the multiple security levels. The monitoring device restricts usage of the system if the processor activates the security levels in a sequence contrary to the security rules.
    Type: Grant
    Filed: January 30, 2006
    Date of Patent: February 17, 2015
    Assignee: Texas Instruments Incorporated
    Inventor: Gregory R. Conti
  • Patent number: 8959304
    Abstract: A data processing apparatus comprises a primary processor, a secondary processor configured to perform secure data processing operations and non-secure data processing operations and a memory configured to store secure data used by the secondary processor when performing the secure data processing operations and configured to store non-secure data used by the secondary processor when performing the non-secure data processing operations, wherein the secure data cannot be accessed by the non-secure data processing operations, wherein the secondary processor comprises a memory management unit configured to administer accesses to the memory from the secondary processor, the memory management unit configured to perform translations between virtual memory addresses used by the secondary processor and physical memory addresses used by the memory, wherein the translations are configured in dependence on a page table base address, the page table base address identifying a storage location in the memory of a set of des
    Type: Grant
    Filed: February 26, 2013
    Date of Patent: February 17, 2015
    Assignee: ARM Limited
    Inventors: Dominic Hugo Symes, Ola Hugosson, Donald Felton, Sean Tristram Ellis
  • Patent number: 8955047
    Abstract: A method for authentication of a high-security client and a low-security client in a high-security mobile radio network includes: transmitting a request for authentication from a base station to the high-security client, wherein the request for authentication comprises a random number as a challenge; receiving a response from the high-security client at the base station, wherein the response from the high-security client comprises a generated number generated by performing a keyed cryptographic function on the challenge; providing a fixed number to the low-security client; and receiving a response from the low-security client at the base station, wherein the response from the low-security client comprises the fixed number. Limited access to the mobile radio network is granted for the low-security client relative to an access of the high-security client.
    Type: Grant
    Filed: August 20, 2010
    Date of Patent: February 10, 2015
    Assignee: Deutsche Telekom AG
    Inventor: Thomas Sonntag
  • Patent number: 8955150
    Abstract: The present invention relates to an apparatus and a method for managing digital rights using virtualization technique, and more particularly to an apparatus and a method for enabling a user to access a desired text file in an independent area through a virtual machine corresponding to a licensed right for accessing the text file. The present invention comprises a virtual machine (VM) management unit for controlling a user access authorization function for accessing the text file in the area to which the virtualization technique is applied.
    Type: Grant
    Filed: September 10, 2010
    Date of Patent: February 10, 2015
    Assignee: Fasoo.com Co. Ltd.
    Inventor: Chel Park
  • Patent number: 8954727
    Abstract: A method includes controlling security in a communication system that involves a node capable of routing traffic according to one or more security algorithms with respective security levels. The node is adapted to estimate at least one safety degree relating to the node, to select at least one security algorithm of the one or more security algorithms, depending on the estimated safety degree; and to activate the at least one security algorithm.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: February 10, 2015
    Assignee: BlackBerry Limited
    Inventors: Pierre Lescuyer, Thierry Lucidarme
  • Patent number: 8954756
    Abstract: Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object includes creating in the storage device an encrypted logical data object including a header and one or more allocated encrypted sections with predefined size; encrypting one or more sequentially obtained chunks of plaintext data corresponding to the plaintext logical data object thus giving rise to the encrypted data chunks; and sequentially accommodating the processed data chunks into the encrypted sections in accordance with an order the chunks are received, wherein the encrypted sections serve as atomic elements of encryption/decryption operations during input/output transactions on the logical data object.
    Type: Grant
    Filed: February 16, 2012
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventors: Chaim Koifman, Nadav Kedem, Avi Zohar
  • Patent number: 8954736
    Abstract: Systems, methods, routines and/or techniques for limiting the functionality of a software program based on a security model are described. One or more embodiments may include limiting the functionality of a software program (e.g., a widget) based on one or more operations that the widget intends to take. One or more embodiments may include limiting the functionality of a widget that is located on and/or accessible via a lock screen of a mobile device. One or more embodiments may include preventing a widget from causing an application to perform sensitive actions when a system is in an un-authenticated state. One or more embodiments may include preventing a widget from installing and/or displaying on a particular screen of a mobile device (e.g., a lock screen) if the widget includes a function that indicates that a sensitive operation will be taken.
    Type: Grant
    Filed: December 10, 2012
    Date of Patent: February 10, 2015
    Inventors: James Brooks Miller, Daniel Marc Gatan Shiplacoff
  • Patent number: 8955056
    Abstract: A terminal to assign permission to an application includes a storage device to store an application list including information of applications authorized to receive manager permission, and an application processor to receive a request for the manager permission from the application and to determine to allow the manager permission to the application in response to a determination that the application is included in the application list. A method that uses a processor to assign permission to an application includes receiving a request for manager permission from the application, determining, using the processor, whether the application is included in an application list including information of applications authorized to receive manager permission, and determining whether to allow the manager permission to the application if the application is included in the application list.
    Type: Grant
    Filed: October 16, 2012
    Date of Patent: February 10, 2015
    Assignee: Pantech Co., Ltd.
    Inventors: Suk Woon Choi, Jae Choon Park
  • Patent number: 8955032
    Abstract: All of the transit services that each device is expected to provide are determined and contrasted with the transit configuration of each device. Because the transit configuration of each device may be state-dependent, the service items within each application service are processed in sequential order. Sequences of service items are associated with connection groups, and each of the routes associated with each connection group is determined based on the sequential order of the service items. The configuration of each device along each route is processed to determine the services that will be permitted or denied, based on its current configuration. Each desired transit service item is compared to the transit configuration provided by each device to identify any inconsistencies and/or violations.
    Type: Grant
    Filed: July 12, 2007
    Date of Patent: February 10, 2015
    Assignee: Riverbed Technology, Inc.
    Inventors: Ankit Agarwal, Nick Bastin, Pradeep K. Singh, Seth Martin
  • Patent number: 8955104
    Abstract: A host system integrity monitor for monitoring memory, operating systems, applications, domain manager, and other host system's structures of interest is isolated and independent of the CPU and operating system of commodity systems. The system requires no modifications to the protected (monitored) host's software, and operates correctly even when the host system is compromised. Either arranged as a stand-alone computer on the add-in card which communicates with the monitored host system through the PCI bus, or as the co-processor based monitor located on the motherboard of the host system, or residing on one of the virtual CPU while the monitored system resides on another virtual CPU, or residing within the domain manager of the host system, the monitor monitors the integrity of the examined structure by calculating hash values of the structure, comparing them with expected hash values, and sending error reports once the discrepancy between these values is detected.
    Type: Grant
    Filed: July 6, 2005
    Date of Patent: February 10, 2015
    Assignee: University of Maryland College Park
    Inventors: William A. Arbaugh, Nick Louis Petroni, Jr., Timothy Jon Fraser, Jesus Maria Molina-Terriza
  • Patent number: 8947211
    Abstract: A communication data protection method based on symmetric key encryption, and an apparatus for enabling the method are provided. A communication data protection method using a Radio Frequency Identification (RFID) reader, the method including: receiving, from a tag, tag information including security parameter information and an encrypted Unique Item Identifier (UII); extracting the UII based on the security parameter information; transmitting, to the tag, a request message including a challenge value for replay prevention; and performing a tag authentication by receiving, from the tag, a response message including a handle and the challenge value.
    Type: Grant
    Filed: June 17, 2008
    Date of Patent: February 3, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Doo Ho Choi, Yong-Je Choi, Ho Won Kim, Kyo Il Chung
  • Patent number: 8949813
    Abstract: Systems and methods are disclosed that may be implemented to install and use a replacement BIOS code stored in non-volatile memory of the system BIOS to facilitate activation of a new or replacement OS on an information handling system. The replacement BIOS code may include an activation certificate of authority information to activate a different version operating system for use on an information handling system that has been previously configured with a different operating system version along with a previous BIOS code that did not include the updated OEM activation string.
    Type: Grant
    Filed: July 29, 2011
    Date of Patent: February 3, 2015
    Assignee: Dell Products LP
    Inventors: Andrew W. Wilks, Keung S. Kim, MyPhuong N. Sang
  • Patent number: 8949951
    Abstract: Embodiments of the present teachings relate to systems and methods for generating modular security delegates for applications. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured. Each machine can include a plurality of application instances and an authentication delegate. In addition, each network environment can include a communication interface to security services. The applications can include logic that indicates what security delegate to use for a given set of user authentication credentials. The logic can be configured to determine the appropriate authentication delegate using various methods. The authentication delegates can receive a set of user authentication credentials from application instances and determine whether the set of user authentication credentials are valid. Each authentication delegate corresponds to one and only one type of authentication mechanism.
    Type: Grant
    Filed: March 4, 2011
    Date of Patent: February 3, 2015
    Assignee: Red Hat, Inc.
    Inventors: Thomas Alexander Wood, John J. Eckersberg, II, Daniel P Radez
  • Patent number: 8942719
    Abstract: A method, system, and medium are provided for locating a lost mobile device utilizing a radio frequency signal associated with the lost mobile device. One embodiment of the method includes activating a signal on a lost mobile device. An identifier associated with the lost mobile device allows a locating mobile device to receive the signal from the lost mobile device and filter out interference. The strength of the signal is determined and a location of the lost mobile device is communicated to a user based on the strength of the signal.
    Type: Grant
    Filed: September 8, 2010
    Date of Patent: January 27, 2015
    Assignee: Sprint Communications Company L.P.
    Inventors: Caleb Sisson Hyde, Andrew Mark Wurtenberger, Clark Douglas Halferty
  • Patent number: 8938786
    Abstract: A system and method for using a declarative approach to enforce instance based security in a distributed environment is presented. The invention described herein includes security logic in declarative specifications that, in turn, decouples the security logic from distributed object administration logic. An access manager identifies access requirements by combining object name property keys included in a distributed object with property key specifications included in a declarative specification. In turn, the access manager compares a caller's access attributes with the access requirements to determine whether to create a distributed object instance and allow the caller to invoke a method on the distributed object instance. The access requirements may also include role specifications and method parameter specifications.
    Type: Grant
    Filed: January 12, 2007
    Date of Patent: January 20, 2015
    Assignee: International Business Machines Corporation
    Inventors: Michael Cheng, Vishwanath Venkataramappa, Tom Zhongyu Zhou
  • Patent number: 8938612
    Abstract: Techniques for a computing device operating in access-states are provided. One example method includes receiving, by the computing device operating in a first access state, an indication of first input and responsive to determining that at least one value of a characteristic of the first input exceeds a predetermined characteristic threshold, transitioning the computing device to operate in a second access state. While the computing device is operating in the second access state, the method further includes outputting instructions for transitioning the computing device from operating in the second access state. The method further includes receiving, by the computing device operating in the second access state, an indication of a second input and responsive to determining that the indication of the second input satisfies a threshold of compliance with the instructions, transitioning the computing device from operating in the second access state to operating in the first access state.
    Type: Grant
    Filed: October 28, 2013
    Date of Patent: January 20, 2015
    Assignee: Google Inc.
    Inventor: Sanjev Kumar Mittal
  • Patent number: 8930638
    Abstract: A cache coherency controller, a system comprising such, and a method of its operation are disclosed. The coherency controller ensures that target-side security checking rules are not violated by the performance-improving processes commonly used in coherency controllers such as dropping, merging, invalidating, forwarding, and snooping. This is done by ensuring that requests marked for target-side security checking and any other requests to overlapping addresses are forwarded directly to the target-side security filter without modification or side effects.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: January 6, 2015
    Assignee: QUALCOMM Technologies, Inc.
    Inventors: Laurent Moll, Jean-Jacques Lecler, Philippe Boucard
  • Patent number: 8925053
    Abstract: An authentication technique involves receiving an authentication request which includes a set of authentication factors and performing, in response to the authentication request, an authentication operation based on a set of authentication factors. An authentication result of the authentication operation identifies a particular trust category among a set of trust categories. Each trust category of the set defines a unique set of user permissions. The technique further involves providing the authentication result for use by a web application. The particular trust category identified by the authentication result defines a particular set of user permissions to be imposed by the web application. For example, the trust categories may take the form of trust levels such as Low, Med, and High which control access to certain resources.
    Type: Grant
    Filed: May 16, 2012
    Date of Patent: December 30, 2014
    Assignee: EMC Corporation
    Inventor: Nirav Mehta
  • Patent number: 8925076
    Abstract: System and method for re-adjustment of a security application to various application execution scenarios. Application execution scenarios for each of a set of software applications are created, each representing a specific subset of functionality of a corresponding application. Sets of security application configuration instructions are stored, each corresponding to at least one of the application execution scenarios. A current one or more of the application execution scenarios that is being executed in the computing device is determined and, in response, a set of security application configuration instructions corresponding to each current application execution scenario are carried out, such that the security application is adjusted to perform a specific subset of security functionality that is particularized to the current one or more of the application execution scenarios.
    Type: Grant
    Filed: December 11, 2012
    Date of Patent: December 30, 2014
    Assignee: Kaspersky Lab ZAO
    Inventor: Oleg V. Zaitsev
  • Patent number: 8924714
    Abstract: Techniques and systems for authentication with an untrusted root between a client and a server are disclosed. In some aspects, a client may connect to a server. The server and client may initiate a secure connection by exchanging certificates. The server may accept a client certificate having an untrusted root that does not chain up to a root certificate verifiable to the server certificate authority. In further aspects, the server may enable the client to associate an untrusted certificate with an existing account associated with the server. The client certificate may be hardware based or generated in software, and may be issued to the client independent of interactions with the server.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: December 30, 2014
    Assignee: Microsoft Corporation
    Inventors: Kristjan E. Hatlelid, Kelvin S. Yiu
  • Patent number: RE45473
    Abstract: Based on the detailed reproduction control information defining the reproduction control state of data to be transmitted, the CPU 12 of the data transmission apparatus creates a simplified reproduction control information roughly defining the reproduction control state of the data, stores the simplified reproduction control information of the data in the packet header of a data packet carrying the data, stores the detailed reproduction control information in the data, and transmits the simplified reproduction control information and the detailed reproduction control information as well as the data to the data receiving apparatus 20 through the transmission channel 30 from the input-output interface 16.
    Type: Grant
    Filed: August 6, 2010
    Date of Patent: April 14, 2015
    Assignee: Sony Corporation
    Inventors: Tomoyuki Asano, Yoshitomo Osawa, Teruyoshi Komuro, Ichiro Hamada