Security Levels Patents (Class 713/166)
  • Patent number: 8798270
    Abstract: To improve a communication system including two communication apparatuses in order to reduce a possibility of having communication thereof decrypted by a third party. The communication system includes a first communication apparatus and a second communication apparatus, where one of the communication apparatuses encrypts transmission subject data to generate encrypted data and transmits it to the other communication apparatus which then decrypts received encrypted data. Before performing encryption, each of the communication apparatuses cuts the transmission subject data by a predetermined number of bits to generate transmission subject cut data. In this case, each of the communication apparatuses varies the number of bits of the transmission subject cut data, and mixes dummy data of a size of which number of bits matches with the largest number of bits out of the numbers of bits of the transmission subject cut data into the transmission subject cut data other than that of the largest number of bits.
    Type: Grant
    Filed: January 4, 2006
    Date of Patent: August 5, 2014
    Assignee: NTI, Inc.
    Inventor: Takatoshi Nakamura
  • Patent number: 8800029
    Abstract: A method and a system for collecting and maintaining historical party reputation data and for using the historical party reputation data to calculate an access decision rating and recalculating the access decision rating when the historical party reputation data has changed has a reputation updater for updating a reputation when a party's reputation has changed, a reputation storer for storing the party's reputation, an access decision rating maker for making a rating on a party's access abilities based upon the party's reputation and reputation history storage for storing a party's reputation having access decision rating storage for storing previous and present access decision storage ratings.
    Type: Grant
    Filed: October 4, 2010
    Date of Patent: August 5, 2014
    Assignee: International Business Machines Corporation
    Inventors: Richard V. Horn, Eric M. Nelson, David C. Roxin
  • Patent number: 8793215
    Abstract: Systems and methods for publishing datasets are provided herein. According to some embodiments, methods for publishing datasets may include receiving a request to publish a dataset to at least one of an internal environment located within a secured zone and an external environment located outside the secured zone, the request comprising at least one selection criteria, selecting the dataset based upon the at least one selection criteria, the dataset being selected from an index of collected datasets, and responsive to the request, publishing the dataset to at least one of the internal environment and the external environment.
    Type: Grant
    Filed: June 4, 2011
    Date of Patent: July 29, 2014
    Assignee: Recommind, Inc.
    Inventor: Robert Tennant
  • Patent number: 8793510
    Abstract: Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object comprises creating in the storage device an encrypted logical data object comprising a header and one or more allocated encrypted sections with predefined size; encrypting one or more sequentially obtained chunks of plaintext data corresponding to the plaintext logical data object thus giving rise to the encrypted data chunks; and sequentially accommodating the processed data chunks into said encrypted sections in accordance with an order said chunks received, wherein said encrypted sections serve as atomic elements of encryption/decryption operations during input/output transactions on the logical data object.
    Type: Grant
    Filed: July 7, 2011
    Date of Patent: July 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Chaim Koifman, Nadav Kedem, Avi Zohar
  • Patent number: 8793773
    Abstract: System and method for providing reciprocity in a reputation system are described.
    Type: Grant
    Filed: January 30, 2008
    Date of Patent: July 29, 2014
    Assignee: Apple Inc.
    Inventor: Duane Buss
  • Patent number: 8793503
    Abstract: In a method for managing sequential access to secure content by a plurality of workflow participants, a key-map file for each of the participants is created. Each of the key-map files contains a subset of encryption and signature keys for the content. The key-map files are sorted in an order that is the reverse of a workflow order in which the workflow participants for which the key-map files were created are to access the secure content. An encrypted later wrap including a later key-map file for a later workflow participant along the workflow order and an encrypted first wrap including a prior key-map file for a prior workflow participant and the encrypted later wrap are created. In addition, the first wrap is incorporated into a document serialization for the content.
    Type: Grant
    Filed: May 12, 2011
    Date of Patent: July 29, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Steven J. Simske, Helen Balinsky
  • Patent number: 8793489
    Abstract: Embodiments are described for a system and method of controlling access to information in an organization by defining a hierarchical organizational structure of boxes, and security configuration comprising user records, security roles, rules to map users to boxes, and rules to grant roles to users via mapped boxes. Access control is applied in the context of a defined organizational structure using the effective set of access control policies computed in real time per each data access request from any given user.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: July 29, 2014
    Assignee: HumanConcepts, LLC
    Inventors: Roman Polunin, Bogdan Cirlig, Amit Bansal
  • Patent number: 8782782
    Abstract: A computer system is protected against harmful activity of a privileged user. A risk agent is deployed which is communicatively coupled to a risk engine, the risk engine being operative in response to queries to perform model-based risk assessments of activities and to provide responses conveying risk assessment results. The risk agent monitors computer system activity of the privileged user to detect initiation of a sensitive operation, and formulates and sends a query to the risk engine requesting risk assessment. The risk agent takes an appropriate control action based on a risk assessment result in a response to a query. The control action may be one of allowing the sensitive operation to proceed; preventing the sensitive operation from proceeding; issuing a notification that the sensitive computer operation is proceeding; and obtaining further confirmation as a condition to allowing the sensitive operation to proceed.
    Type: Grant
    Filed: December 23, 2010
    Date of Patent: July 15, 2014
    Assignee: EMC Corporation
    Inventors: Gregory Dicovitsky, Robert William Bryan
  • Patent number: 8782404
    Abstract: A method and system of synergizing hardware, firmware, software, and useful feature(s) into a trusted, secure, and verifiable operating environment (TSVOE) that is critical for businesses and consumers that rely on information technology products and/or services. Such products provide various capabilities such as protecting the corporate infrastructure from attack, protecting the client from attack, designing a customizable operating schema, advanced validation of client authentication, establishing a clean environment within a dirty environment, etcetera. Moreover, by ensuring that operating environment security is achieved, a product can provide guarantees that modern state-of-the-art systems cannot. Finally, diversification of hardware, software, firmware, and features creates robust products.
    Type: Grant
    Filed: September 7, 2010
    Date of Patent: July 15, 2014
    Inventor: Nicholas L. Lamb
  • Patent number: 8782436
    Abstract: A method and system for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object comprises creating in the storage device an encrypted logical data object comprising a header and one or more allocated encrypted sections with predefined size; encrypting one or more sequentially obtained chunks of plaintext data corresponding to the plaintext logical data object thus giving rise to the encrypted data chunks; and sequentially accommodating the processed data chunks into said encrypted sections in accordance with an order said chunks received, wherein said encrypted sections serve as atomic elements of encryption/decryption operations during input/output transactions on the logical data object.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Chaim Koifman, Nadav Kedem, Avi Zohar
  • Patent number: 8775802
    Abstract: A method is provided for protecting a computer system, comprising creating an isolated process, then assigning a first process group to the process; creating an additional group process within the first process group; performing a first determination by an application programming interface (API) that the additional group process is within the first process group, and as a result of the first determination, causing the additional group process to inherit and duplicate a handle of the process. Process communications and control within isolated groups is permitted freely, whereas process control by an isolated process for non-isolated processes or isolated processes in different groups is constrained or prohibited.
    Type: Grant
    Filed: April 22, 2013
    Date of Patent: July 8, 2014
    Assignee: Secure Vector
    Inventors: James B. Kargman, Peter Scott, Jeffrey Bromberger
  • Patent number: 8775801
    Abstract: A radio communication apparatus executes communication by establishing a communication link according to a security level with other device. The radio communication apparatus sets a security level according to a type of service, and discriminates whether the security level is necessary for the communication with the other device. If the security level is necessary, the communication link according to the security level is established. If the security level is not necessary, security level is lowered and the communication link according to the lowered security level is established.
    Type: Grant
    Filed: March 18, 2010
    Date of Patent: July 8, 2014
    Assignee: Fujitsu Mobile Communications Limited
    Inventors: Toshiya Tamura, Shigeo Terabe
  • Patent number: 8775819
    Abstract: A method of authorising a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of available user information entry devices in communication with the workstation. The system then determines predetermined user authorization methods each requiring data only from available user information entry devices. The user then selects one of the determined authorization methods for use in user authorization. Optionally, each authorization method is associated with a security level relating to user access to resources. Once the authorization method is selected, the user provides user authorization information in accordance with a determined user authorization method and registration proceeds.
    Type: Grant
    Filed: August 31, 2012
    Date of Patent: July 8, 2014
    Assignee: Activcard Ireland Limited
    Inventors: Laurence Hamid, Robert D. Hillhouse
  • Patent number: 8769662
    Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS.
    Type: Grant
    Filed: October 22, 2012
    Date of Patent: July 1, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Lusheng Ji, Dan Pei, Jia Wang
  • Patent number: 8769268
    Abstract: System and methods providing secure workspace sessions is described. In one embodiment a method for providing multiple workspace sessions for securely running applications comprises steps of: initiating a first workspace session on an existing operating system instance running on the computer system, the first workspace session having a first set of privileges for running applications under that session; while the first workspace session remains active, initiating a second workspace session on the existing operating system instance running on the computer system, the second workspace session having a second set of privileges for running applications under the second workplace session; and securing the second workspace session so that applications running under the second workplace session are protected from applications running outside the second workspace session.
    Type: Grant
    Filed: July 20, 2007
    Date of Patent: July 1, 2014
    Assignee: Check Point Software Technologies, Inc.
    Inventors: Artiom Morozov, Dzmitry Konanka
  • Patent number: 8769272
    Abstract: Systems and methods are provided for data protection across connected, disconnected, attended, and unattended environments. Embodiments of the inventions may include differential encryption based on network connectivity, attended/unattended status, or a combination thereof. Additional embodiments of the invention incorporate “trust windows” that provide granular and flexible data access as function of the parameters under which sensitive data is accessed. Further embodiments refine the trust windows concept by incorporating dynamic intrusion detection techniques.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: July 1, 2014
    Assignee: Protegrity Corporation
    Inventor: Ulf Mattsson
  • Patent number: 8763076
    Abstract: Techniques are disclosed for implementing dynamic endpoint management. In accordance with one embodiment, whenever an endpoint joins a managed network for the first time, or rejoins that network, a local security module submits a list of applications (e.g., all or incremental) to a security server. The server validates the list and sends back a rule set (e.g., allow/block rules and/or required application security settings) for those applications. If the server has no information for a given application, it may further subscribe to content from a content provider or service. When the server is queried regarding an unknown application, the server sends a query to the service provider to obtain a trust rating for that unknown application. The trust rating can then be used to generate a rule set for the unknown application. Functionality can be shifted from server to client, and vice-versa if so desired.
    Type: Grant
    Filed: June 4, 2012
    Date of Patent: June 24, 2014
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Brian Hernacki
  • Patent number: 8763158
    Abstract: In some embodiments, an activation object used to activate a software product is stored in a directory service. The activation object may, for example, comprise a proof of purchase token and/or information about the directory service, and may be communicated from the directory service to a client computer after the directory service authenticates a request from a client computer for access to the activation object. In some embodiments, a directory service is interrogated for an activation object used to activate software on a client computer. A client computer may, for example, receive an activation object from the interrogated directory service, and use the received activation object to activate a software product on the client computer. In some embodiments, a non-transitory computer-readable medium has instructions stored thereon that, when executed by a computer, cause the computer to interrogate a directory service for an activation object used to activate software on the computer.
    Type: Grant
    Filed: December 6, 2010
    Date of Patent: June 24, 2014
    Assignee: Microsoft Corporation
    Inventors: Aaron J. Smith, Ajay Bhave
  • Patent number: 8762717
    Abstract: According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in the identification information storage area, determines the information recorded in the identification information record area when an access request selects the hidden area, validates an access to the hidden area when determined that the identification information is recorded, and invalidates an access to the hidden area when determined that the identification information is not recorded.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: June 24, 2014
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita
  • Patent number: 8756419
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.
    Type: Grant
    Filed: July 12, 2013
    Date of Patent: June 17, 2014
    Assignee: Apple Inc.
    Inventors: Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy, Jr., Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja
  • Patent number: 8756417
    Abstract: A multi-mode Trusted Computing Platform (TCP) comprising a Field Programmable Gate Array (FPGA) device that includes a Type-1-compliant root of trust (ROT), a memory containing a Type-1 security boot image and at least one lower-security boot image, and a memory containing a Type-1-associated operating system (OS) image and at least one lower-security-associated OS image. The TCP is configured to execute a multi-stage boot process that, depending on the presence of one or more valid external inputs, selects and initiates either a Type-1 TCP computing mode or a lower-assurance computing mode.
    Type: Grant
    Filed: February 4, 2014
    Date of Patent: June 17, 2014
    Assignee: Sypris Electronics, LLC
    Inventor: Douglas J. Gardner
  • Patent number: 8756652
    Abstract: A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password.
    Type: Grant
    Filed: October 25, 2011
    Date of Patent: June 17, 2014
    Assignee: eBay Inc.
    Inventor: Markus Jakobsson
  • Patent number: 8756437
    Abstract: Digital image storage and management systems capable of producing encrypted DICOM volumes on different types of media (e.g., Blu-ray, CD, DVD, memory stick, USB flash drive, etc.), with or without the automatic generation of labels, systems and mechanisms to generate and manage passwords for the encrypted volumes, and systems and mechanisms to manage access to encrypted data on such volumes are disclosed. Generated encrypted DICOM volumes, which can comprise confidential patient data, can be securely interchanged, archived, and distributed to users. The disclosed systems and methods can permit authorized users to access encrypted data, even if the users do not have access to the original encryption mechanism. Encrypted data stored on the volume can be easily and securely accessed by a variety of authorized users.
    Type: Grant
    Filed: August 24, 2009
    Date of Patent: June 17, 2014
    Assignee: Datcard Systems, Inc.
    Inventors: David Monk, John C. Canessa, Giancarlo Canessa, Gino G. Canessa
  • Patent number: 8752137
    Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: June 10, 2014
    Assignee: Bladelogic, Inc.
    Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David Allen Solin, Carl Adams
  • Patent number: 8745385
    Abstract: A data security system includes a single central processing unit (CPU), a plurality of different security zones corresponding to different levels of security classification, a plurality of operating systems, a communications interface, a global zone, and a memory coupled to the plurality of security zones and the global zone. The CPU includes a plurality of processing cores and each security zone is associated with a different one of the processing cores. The global zone is communicatively coupled to the communications interface and the plurality of security zones, and is associated with a different one of the processing cores than the plurality of security zones. The global zone directs communications between the communications interface and the plurality of security zones. Each processing core executes a separate one of the plurality of operating systems, thereby providing separate processing capability on the single CPU for each of the different levels of security classification.
    Type: Grant
    Filed: June 24, 2009
    Date of Patent: June 3, 2014
    Assignee: Raytheon Company
    Inventors: Jonathan D. Goding, Randall S. Brooks
  • Patent number: 8745406
    Abstract: The invention provides for a method of encrypting and executing an executable image, comprising; flagging sections of the executable image to be encrypted using commands in source files and compiling said executable images so as to generate object files, linking one or more of said executable images using a linker to produce a final executable image, passing said linked executable images to a post-linker encryption engine to encrypt a relocation fix-up patch table and sections of executable images flagged for encryption, and at load time decrypting relocating and executing the executable images.
    Type: Grant
    Filed: October 10, 2006
    Date of Patent: June 3, 2014
    Assignee: Nytell Software LLC
    Inventor: Colin King
  • Patent number: 8739275
    Abstract: A computationally implemented method includes, but is not limited to: determining that a computing device that was presenting one or more portions of one or more items and that was in possession of a first user has been transferred from the first user to a second user; and marking, in response to said determining, the one or more portions of the one or more items to facilitate the computing device in returning to the one or more portions upon the computing device being at least transferred back to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
    Type: Grant
    Filed: December 8, 2011
    Date of Patent: May 27, 2014
    Assignee: Elwha LLC
    Inventors: Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene
  • Patent number: 8739270
    Abstract: The methods and systems of the present disclosure provide a high assurance means for multiple legacy communication (e.g., Mil-Std-1553 communications protocol) system users and/or devices and multiple IP based network users and/or devices to seamlessly, and in real time, share information across various security domains. Specifically, the system enables multiple legacy communication system protocols and interfaces to communicate with existing IP interfaces and protocols with a high degree of trust. The system includes a configurable filtering capability to allow for the data to be inspected prior to being passed from one security domain to another security domain.
    Type: Grant
    Filed: April 19, 2011
    Date of Patent: May 27, 2014
    Assignee: The Boeing Company
    Inventor: Steven L. Arnold
  • Patent number: 8739280
    Abstract: A taint processing applied to a tainted value of an application is identified and an output context of the application associated with output of the tainted value is determined. It is determined whether the taint processing is effective in mitigating a security vulnerability caused by the tainted value for the output context.
    Type: Grant
    Filed: September 29, 2011
    Date of Patent: May 27, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Brian V Chess, Sean Patrick Fay
  • Patent number: 8739245
    Abstract: Systems, methods, and other embodiments associated with flexible supplicant access control are described. One example method includes collecting a network information associated with a network to which an endpoint is to be communicatively coupled. The network information comprises a network identification and information to facilitate the evaluation of network threats. The example method may also include classifying the network based, at least in part, on the network information, to assign a variable level access parameter (VLAP) to the network based on the policy locally configured on the endpoint or centrally managed by the administrator. The VLAP may establish three or more access levels for the network at the endpoint. The example method may also include communicating the network identification and the network VLAP to a second endpoint, a security agent, a security application, and so on.
    Type: Grant
    Filed: January 14, 2009
    Date of Patent: May 27, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Joseph Salowey, Hao Zhou, Jason Frazier
  • Patent number: 8738919
    Abstract: A method for recording at least one information block in a first volatile memory external to a circuit, a first digital signature being calculated based on information and data internal to the circuit and a second digital signature being calculated based on first signatures of a group of information blocks and on a digital quantity internal to the circuit and assigned to said group. A method for checking the content of an information block recorded by this recording method.
    Type: Grant
    Filed: April 18, 2008
    Date of Patent: May 27, 2014
    Assignee: STMicroelectronics S.A.
    Inventor: Michel Bardouillet
  • Patent number: 8738906
    Abstract: A system may identify one or more attributes associated with traffic. The system may then determine that at least one attribute, of the one or more attributes, matches an attribute of a set of attributes that correspond to a set of categories of traffic. Based on determining that the at least one attribute matches the attribute of the set of attributes, the system may identify a category, of the set of categories, that corresponds to the attribute. The system may associate the category with the traffic, and process the traffic based on the associated category.
    Type: Grant
    Filed: November 30, 2011
    Date of Patent: May 27, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Dhananjay Sampath, Chetan Anand, Arjun Sambamoorthy, Anand Deshpande
  • Patent number: 8739296
    Abstract: A first user's trust level with regard to a second user can be determined by providing questions to the second user, with the questions based on a previously-collected knowledge base including information about the first user. The information about the first user may be partitioned into levels of trust, and the second user's responses to the questions may be evaluated to determine which level of trust the second user is entitled to. The knowledge base may be assembled by prompting the first user for information and/or by scanning or otherwise collecting already-existing data about the first user. The knowledge base and/or trust assessment may be distributed across a network, and in some embodiments the knowledge base or parts thereof is distributed to other users according to the trust level of those users.
    Type: Grant
    Filed: July 30, 2012
    Date of Patent: May 27, 2014
    Assignee: Qurio Holdings, Inc.
    Inventors: Richard Walsh, Christopher Amidon, Alfredo Issa
  • Patent number: 8738905
    Abstract: A system and method for providing third party secure hosting of an application. The system and method includes providing a host system with a main memory and a third party secured memory, the third party secured memory storing third party information; encrypting the third party information stored on the third party secured memory upon access by a user, the encrypting being via a security key, the security key being held at a customer location; and, enabling access to the third party information only to users having the security key.
    Type: Grant
    Filed: December 10, 2007
    Date of Patent: May 27, 2014
    Assignee: International Business Machines Corporation
    Inventors: Christopher B. Ferris, Daniel E. House, Kelvin Lawrence, John R. McGarvey, Dirk Nicol
  • Patent number: 8739274
    Abstract: A device that implements a method for performing integrated caching in a data communication network. The device is configured to receive a packet from a client over the data communication network, wherein the packet includes a request for an object. At the operating system/kernel level of the device, one or more of decryption processing of the packet, authentication and/or authorization of the client, and decompression of the request occurs prior to and integrated with caching operations. The caching operations include determining if the object resides within a cache, serving the request from the cache in response to a determination that the object is stored within the cache, and sending the request to a server in response to a determination that the object is not stored within the cache.
    Type: Grant
    Filed: June 29, 2005
    Date of Patent: May 27, 2014
    Assignee: Citrix Systems, Inc.
    Inventors: Prakash Khemani, Prabakar Sundarrajan, Lakshmi Kumar, Kailash Kailash, Ajay Soni, Rajiv Sinha, Saravanakumar Annamalaisami
  • Patent number: 8726347
    Abstract: Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other servers are disclosed. Embodiments of a method for authenticating a user to a server may include receiving a request to authenticate the user to the server and determining whether authenticating the user requires matching an authentication plan. If a plan is required, the method may also include accessing a stored authentication plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user's current authentication plan from an authentication store where the plan has authorization records each having current information relating to user access. Embodiments of the method may also include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response to a match, authenticating the user.
    Type: Grant
    Filed: April 27, 2007
    Date of Patent: May 13, 2014
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
  • Patent number: 8726351
    Abstract: Systems and/or methods for controlling access to a plurality of records and/or documentary materials to be persisted in an electronic archives system are provided. The plurality of records and/or documentary material and all preserved information may be stored and accessed on the basis of user and/or object attributes. The user attributes include group affiliation, ownership, and state (e.g., workflow step and time of day). The object attributes include group affiliation, business role, clearance or access level, and network address from which access is requested. Access to the plurality of records and/or documentary material can be obtained both from within a single security domain as well as across more than one security domain.
    Type: Grant
    Filed: May 4, 2007
    Date of Patent: May 13, 2014
    Assignees: Lockheed Martin Corporation, Electric Data Systems Corporation, Business Performance Systems, Fenestra Technologies Corporation
    Inventors: Richard L. Metzer, James E. Grant, William T. Jackson, David P. Isaac, Matthew J. McKennirey, Kenneth L. Bedford
  • Patent number: 8713307
    Abstract: A computer system regarding which there is no possibility that data loss or data leakage will occur caused by volume migration is provided. The computer system includes: a memory resource to be accessed by a host computer; a storage system for providing a volume, which logicizes the memory resource, to the host computer; and a management device for managing migration of the volume. When detecting a task of migration of the volume based on a request from a first administrator, the management device compares an encryption function setting status of the volume with the encryption function setting status of a migration destination object of the volume; and sends notice of this comparison result to a second administrator, who is different from the first administrator, for security management of the storage system.
    Type: Grant
    Filed: December 16, 2011
    Date of Patent: April 29, 2014
    Assignee: Hitachi, Ltd.
    Inventors: Hirotaka Nakagawa, Mioko Mori
  • Patent number: 8713688
    Abstract: A secure collaboration mechanism between two organizations may be created based on a set of security system definitions provided by a receiving organization to a providing organization. The providing organization may create a shared portal that has a federated access between both organizations and has access and other security functions. The data collection process may be automated using digitally signed forms or other documents to analyze the security practices of the receiving organization and create a shared portal that has increased or decreased security provisions compared to the providing organization's standard procedures. The collaboration mechanism may be implemented in a bilateral arrangement, a hub and spoke arrangement, and a multilateral arrangement.
    Type: Grant
    Filed: March 24, 2010
    Date of Patent: April 29, 2014
    Assignee: Microsoft Corporation
    Inventors: Mark Wahl, Alex Weinert, Phil Stradling, Matthew Penarczyk, Craig Wittenberg, Dave Shute
  • Patent number: 8713704
    Abstract: A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint. A level of authentication determination may additionally/alternatively include at least determining a behavioral fingerprint via establishing a statistical predictability of one or more future actions of an authorized user of a computing device. A level of authentication determination may additionally/alternatively include at least determining an authentication level with respect to a computing device at least partially based on a behavioral fingerprint determined from interaction(s) with another device.
    Type: Grant
    Filed: May 18, 2012
    Date of Patent: April 29, 2014
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
  • Publication number: 20140115330
    Abstract: A media processing device, such as a set top box, having a plurality of selectable hardware and software components for supporting multiple media pathways providing differing levels of security. In general, each security level corresponds to a particular certification service boundary definition(s) or key/authentication and security management scheme for managing resources such as hardware acceleration blocks and software interfaces. Different sets of components may be adaptively employed to ensure composited compliance with one or more security constraints and to address component unavailability. Security constraints may be applied, for example, on a source or media specific basis, and different versions of a media item may be provided over multiple pathways providing corresponding levels of security. In one embodiment, a service operator or content provider may provide requisite certification or security requirements, or otherwise assist in selection of pathway components.
    Type: Application
    Filed: December 17, 2012
    Publication date: April 24, 2014
    Applicant: BROADCOM CORPORATION
    Inventor: Xuemin (Sherman) Chen
  • Patent number: 8707036
    Abstract: A method of formatting data for transmission to another party including the step of incorporating in the data a flag indicative of the absence of data for authentication of the sender. An authentication tag length is also included to permit variable length tags to be used.
    Type: Grant
    Filed: October 17, 2011
    Date of Patent: April 22, 2014
    Assignee: Certicom Corp.
    Inventor: Marinus Struik
  • Patent number: 8707032
    Abstract: A system includes a controller and a certificate authority. The controller is configured to control a process. The certificate authority (CA) is configured to issue and to revoke certificates, wherein the controller is configured to use the CA to mutually authenticate a user to enter into a secure mode of operation.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: April 22, 2014
    Assignee: General Electric Company
    Inventors: David Richard Socky, Robert James Boring, Roy Leguire Jackson, Timothy David Rian, William Robert Pettigrew
  • Patent number: 8701205
    Abstract: A device may include a trusted component. The trusted component may be verified by a trusted third party and may have a certificate of verification stored therein based on the verification by the trusted third party. The trusted component may include a root of trust that may provide secure code and data storage and secure application execution. The root of trust may also be configured to verify an integrity of the trusted component via a secure boot and to prevent access to the certain information in the device if the integrity of the trusted component may not be verified.
    Type: Grant
    Filed: April 15, 2010
    Date of Patent: April 15, 2014
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Yogendra C. Shah, Inhyok Cha, Andreas Schmidt, Andreas Leicher, Joseph Gredone, Samian Kaur
  • Patent number: 8695061
    Abstract: A document process system, which includes: an authentication section that authenticates an operator of an operation target document; an extraction section that extracts specific information for setting operation restriction information of the document; a setting section that sets the operation restriction information of the document based on authentication information of the operator authenticated by the authentication section and the specific information extracted by the extraction section; and a generation section that generates a protected document to which the operation restriction information is set by the setting section based on the operation target document.
    Type: Grant
    Filed: April 16, 2008
    Date of Patent: April 8, 2014
    Assignee: Fuji Xerox Co., Ltd.
    Inventor: Shusaku Kubo
  • Patent number: 8695104
    Abstract: A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the storage device, receives a request for the object, determines if the request includes the key, and, if the request has authorization information, permits access to the object. The data handler receives another request for the object, determines if the request includes the key, and, if the request does not have the authorization information, denies access to the object.
    Type: Grant
    Filed: April 23, 2010
    Date of Patent: April 8, 2014
    Assignee: Dell Products, LP
    Inventors: Farzad Khosrowpour, Marco A. Peereboom
  • Patent number: 8694788
    Abstract: A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a product. The main computer stores documents related to the product and generates a pair of localized encryption keys. The encryption keys include a first key that encrypts data and second key that decrypts the data. An application server that is remote from the interface transmits and receives the document from the interface. The main computer authenticates the integrity of the document in a local operation by signing the document with the first key before it is transmitted to the interface and by signing the document with the second key after it is received from the interface.
    Type: Grant
    Filed: April 29, 2005
    Date of Patent: April 8, 2014
    Assignee: Progressive Casualty Insurance Company
    Inventors: Michael F. Thomas, Martin R. Polak, Dennis C. Kunc, Frank N. Stanich, Jr., Raymond S. Ling
  • Patent number: 8695056
    Abstract: A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, ?I. The method provides a unified information-tracking framework that supports multiple, interdependent dimensions of information. An expressive policy-specification system is separated from the underlying information-flow tracking mechanism. Arbitrary domain-specific policies are supported that can be developed and enforced independent of information flow tracking. Information-flow metadata is treated as a first-class entity, and information flow is correctly tracked on the metadata itself. Classes of information flow polices are defined using multiple dimensions that are application to both information flow data and to the information flows themselves. These classes of polices accurately model more realistic security policies, based on partial trust relations.
    Type: Grant
    Filed: January 26, 2008
    Date of Patent: April 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: Anindya Banerjee, Marco Pistoia, Avraham Shinnar
  • Patent number: 8693025
    Abstract: Systems and methods are provided for pre-authorizing print jobs. The system detects that a printer has entered a secure printing mode that prevents incoming print jobs from printing until credentials have been entered at a console of the printer. The system also receives a print job, receives credentials associated with the print job that identify a user, and determines from the credentials that the user is authorized to use the printer. Additionally, the system is able to transmit the print job to the printer along with a bypass instruction directing the printer to disregard the secure printing mode for this print job.
    Type: Grant
    Filed: September 19, 2011
    Date of Patent: April 8, 2014
    Assignee: Ricoh Production Print Solutions
    Inventors: Mary Gale Cochran, Silviu Nanau, Adrian Vilceanu
  • Patent number: 8688980
    Abstract: A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one or more network accessible users; and determining whether to authenticate one or more transactions via the trust verification schema. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
    Type: Grant
    Filed: November 23, 2011
    Date of Patent: April 1, 2014
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene