Security Levels Patents (Class 713/166)
-
Patent number: 8798270Abstract: To improve a communication system including two communication apparatuses in order to reduce a possibility of having communication thereof decrypted by a third party. The communication system includes a first communication apparatus and a second communication apparatus, where one of the communication apparatuses encrypts transmission subject data to generate encrypted data and transmits it to the other communication apparatus which then decrypts received encrypted data. Before performing encryption, each of the communication apparatuses cuts the transmission subject data by a predetermined number of bits to generate transmission subject cut data. In this case, each of the communication apparatuses varies the number of bits of the transmission subject cut data, and mixes dummy data of a size of which number of bits matches with the largest number of bits out of the numbers of bits of the transmission subject cut data into the transmission subject cut data other than that of the largest number of bits.Type: GrantFiled: January 4, 2006Date of Patent: August 5, 2014Assignee: NTI, Inc.Inventor: Takatoshi Nakamura
-
Patent number: 8800029Abstract: A method and a system for collecting and maintaining historical party reputation data and for using the historical party reputation data to calculate an access decision rating and recalculating the access decision rating when the historical party reputation data has changed has a reputation updater for updating a reputation when a party's reputation has changed, a reputation storer for storing the party's reputation, an access decision rating maker for making a rating on a party's access abilities based upon the party's reputation and reputation history storage for storing a party's reputation having access decision rating storage for storing previous and present access decision storage ratings.Type: GrantFiled: October 4, 2010Date of Patent: August 5, 2014Assignee: International Business Machines CorporationInventors: Richard V. Horn, Eric M. Nelson, David C. Roxin
-
Patent number: 8793215Abstract: Systems and methods for publishing datasets are provided herein. According to some embodiments, methods for publishing datasets may include receiving a request to publish a dataset to at least one of an internal environment located within a secured zone and an external environment located outside the secured zone, the request comprising at least one selection criteria, selecting the dataset based upon the at least one selection criteria, the dataset being selected from an index of collected datasets, and responsive to the request, publishing the dataset to at least one of the internal environment and the external environment.Type: GrantFiled: June 4, 2011Date of Patent: July 29, 2014Assignee: Recommind, Inc.Inventor: Robert Tennant
-
Patent number: 8793510Abstract: Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object comprises creating in the storage device an encrypted logical data object comprising a header and one or more allocated encrypted sections with predefined size; encrypting one or more sequentially obtained chunks of plaintext data corresponding to the plaintext logical data object thus giving rise to the encrypted data chunks; and sequentially accommodating the processed data chunks into said encrypted sections in accordance with an order said chunks received, wherein said encrypted sections serve as atomic elements of encryption/decryption operations during input/output transactions on the logical data object.Type: GrantFiled: July 7, 2011Date of Patent: July 29, 2014Assignee: International Business Machines CorporationInventors: Chaim Koifman, Nadav Kedem, Avi Zohar
-
Patent number: 8793773Abstract: System and method for providing reciprocity in a reputation system are described.Type: GrantFiled: January 30, 2008Date of Patent: July 29, 2014Assignee: Apple Inc.Inventor: Duane Buss
-
Patent number: 8793503Abstract: In a method for managing sequential access to secure content by a plurality of workflow participants, a key-map file for each of the participants is created. Each of the key-map files contains a subset of encryption and signature keys for the content. The key-map files are sorted in an order that is the reverse of a workflow order in which the workflow participants for which the key-map files were created are to access the secure content. An encrypted later wrap including a later key-map file for a later workflow participant along the workflow order and an encrypted first wrap including a prior key-map file for a prior workflow participant and the encrypted later wrap are created. In addition, the first wrap is incorporated into a document serialization for the content.Type: GrantFiled: May 12, 2011Date of Patent: July 29, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Steven J. Simske, Helen Balinsky
-
Patent number: 8793489Abstract: Embodiments are described for a system and method of controlling access to information in an organization by defining a hierarchical organizational structure of boxes, and security configuration comprising user records, security roles, rules to map users to boxes, and rules to grant roles to users via mapped boxes. Access control is applied in the context of a defined organizational structure using the effective set of access control policies computed in real time per each data access request from any given user.Type: GrantFiled: March 1, 2012Date of Patent: July 29, 2014Assignee: HumanConcepts, LLCInventors: Roman Polunin, Bogdan Cirlig, Amit Bansal
-
Patent number: 8782782Abstract: A computer system is protected against harmful activity of a privileged user. A risk agent is deployed which is communicatively coupled to a risk engine, the risk engine being operative in response to queries to perform model-based risk assessments of activities and to provide responses conveying risk assessment results. The risk agent monitors computer system activity of the privileged user to detect initiation of a sensitive operation, and formulates and sends a query to the risk engine requesting risk assessment. The risk agent takes an appropriate control action based on a risk assessment result in a response to a query. The control action may be one of allowing the sensitive operation to proceed; preventing the sensitive operation from proceeding; issuing a notification that the sensitive computer operation is proceeding; and obtaining further confirmation as a condition to allowing the sensitive operation to proceed.Type: GrantFiled: December 23, 2010Date of Patent: July 15, 2014Assignee: EMC CorporationInventors: Gregory Dicovitsky, Robert William Bryan
-
Patent number: 8782404Abstract: A method and system of synergizing hardware, firmware, software, and useful feature(s) into a trusted, secure, and verifiable operating environment (TSVOE) that is critical for businesses and consumers that rely on information technology products and/or services. Such products provide various capabilities such as protecting the corporate infrastructure from attack, protecting the client from attack, designing a customizable operating schema, advanced validation of client authentication, establishing a clean environment within a dirty environment, etcetera. Moreover, by ensuring that operating environment security is achieved, a product can provide guarantees that modern state-of-the-art systems cannot. Finally, diversification of hardware, software, firmware, and features creates robust products.Type: GrantFiled: September 7, 2010Date of Patent: July 15, 2014Inventor: Nicholas L. Lamb
-
Patent number: 8782436Abstract: A method and system for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and restoring thereof. Encrypting the plaintext logical data object comprises creating in the storage device an encrypted logical data object comprising a header and one or more allocated encrypted sections with predefined size; encrypting one or more sequentially obtained chunks of plaintext data corresponding to the plaintext logical data object thus giving rise to the encrypted data chunks; and sequentially accommodating the processed data chunks into said encrypted sections in accordance with an order said chunks received, wherein said encrypted sections serve as atomic elements of encryption/decryption operations during input/output transactions on the logical data object.Type: GrantFiled: May 31, 2007Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Chaim Koifman, Nadav Kedem, Avi Zohar
-
Patent number: 8775802Abstract: A method is provided for protecting a computer system, comprising creating an isolated process, then assigning a first process group to the process; creating an additional group process within the first process group; performing a first determination by an application programming interface (API) that the additional group process is within the first process group, and as a result of the first determination, causing the additional group process to inherit and duplicate a handle of the process. Process communications and control within isolated groups is permitted freely, whereas process control by an isolated process for non-isolated processes or isolated processes in different groups is constrained or prohibited.Type: GrantFiled: April 22, 2013Date of Patent: July 8, 2014Assignee: Secure VectorInventors: James B. Kargman, Peter Scott, Jeffrey Bromberger
-
Patent number: 8775801Abstract: A radio communication apparatus executes communication by establishing a communication link according to a security level with other device. The radio communication apparatus sets a security level according to a type of service, and discriminates whether the security level is necessary for the communication with the other device. If the security level is necessary, the communication link according to the security level is established. If the security level is not necessary, security level is lowered and the communication link according to the lowered security level is established.Type: GrantFiled: March 18, 2010Date of Patent: July 8, 2014Assignee: Fujitsu Mobile Communications LimitedInventors: Toshiya Tamura, Shigeo Terabe
-
Patent number: 8775819Abstract: A method of authorising a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of available user information entry devices in communication with the workstation. The system then determines predetermined user authorization methods each requiring data only from available user information entry devices. The user then selects one of the determined authorization methods for use in user authorization. Optionally, each authorization method is associated with a security level relating to user access to resources. Once the authorization method is selected, the user provides user authorization information in accordance with a determined user authorization method and registration proceeds.Type: GrantFiled: August 31, 2012Date of Patent: July 8, 2014Assignee: Activcard Ireland LimitedInventors: Laurence Hamid, Robert D. Hillhouse
-
Patent number: 8769662Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS.Type: GrantFiled: October 22, 2012Date of Patent: July 1, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Lusheng Ji, Dan Pei, Jia Wang
-
Patent number: 8769268Abstract: System and methods providing secure workspace sessions is described. In one embodiment a method for providing multiple workspace sessions for securely running applications comprises steps of: initiating a first workspace session on an existing operating system instance running on the computer system, the first workspace session having a first set of privileges for running applications under that session; while the first workspace session remains active, initiating a second workspace session on the existing operating system instance running on the computer system, the second workspace session having a second set of privileges for running applications under the second workplace session; and securing the second workspace session so that applications running under the second workplace session are protected from applications running outside the second workspace session.Type: GrantFiled: July 20, 2007Date of Patent: July 1, 2014Assignee: Check Point Software Technologies, Inc.Inventors: Artiom Morozov, Dzmitry Konanka
-
Patent number: 8769272Abstract: Systems and methods are provided for data protection across connected, disconnected, attended, and unattended environments. Embodiments of the inventions may include differential encryption based on network connectivity, attended/unattended status, or a combination thereof. Additional embodiments of the invention incorporate “trust windows” that provide granular and flexible data access as function of the parameters under which sensitive data is accessed. Further embodiments refine the trust windows concept by incorporating dynamic intrusion detection techniques.Type: GrantFiled: June 15, 2012Date of Patent: July 1, 2014Assignee: Protegrity CorporationInventor: Ulf Mattsson
-
Patent number: 8763076Abstract: Techniques are disclosed for implementing dynamic endpoint management. In accordance with one embodiment, whenever an endpoint joins a managed network for the first time, or rejoins that network, a local security module submits a list of applications (e.g., all or incremental) to a security server. The server validates the list and sends back a rule set (e.g., allow/block rules and/or required application security settings) for those applications. If the server has no information for a given application, it may further subscribe to content from a content provider or service. When the server is queried regarding an unknown application, the server sends a query to the service provider to obtain a trust rating for that unknown application. The trust rating can then be used to generate a rule set for the unknown application. Functionality can be shifted from server to client, and vice-versa if so desired.Type: GrantFiled: June 4, 2012Date of Patent: June 24, 2014Assignee: Symantec CorporationInventors: Sourabh Satish, Brian Hernacki
-
Patent number: 8763158Abstract: In some embodiments, an activation object used to activate a software product is stored in a directory service. The activation object may, for example, comprise a proof of purchase token and/or information about the directory service, and may be communicated from the directory service to a client computer after the directory service authenticates a request from a client computer for access to the activation object. In some embodiments, a directory service is interrogated for an activation object used to activate software on a client computer. A client computer may, for example, receive an activation object from the interrogated directory service, and use the received activation object to activate a software product on the client computer. In some embodiments, a non-transitory computer-readable medium has instructions stored thereon that, when executed by a computer, cause the computer to interrogate a directory service for an activation object used to activate software on the computer.Type: GrantFiled: December 6, 2010Date of Patent: June 24, 2014Assignee: Microsoft CorporationInventors: Aaron J. Smith, Ajay Bhave
-
Patent number: 8762717Abstract: According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in the identification information storage area, determines the information recorded in the identification information record area when an access request selects the hidden area, validates an access to the hidden area when determined that the identification information is recorded, and invalidates an access to the hidden area when determined that the identification information is not recorded.Type: GrantFiled: June 15, 2012Date of Patent: June 24, 2014Assignee: Kabushiki Kaisha ToshibaInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita
-
Patent number: 8756419Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.Type: GrantFiled: July 12, 2013Date of Patent: June 17, 2014Assignee: Apple Inc.Inventors: Dallas Blake De Atley, Gordon Freedman, Thomas Brogan Duffy, Jr., Tahoma Madrone Toelkes, Michael John Smith, Paul William Chinn, David Rahardja
-
Patent number: 8756417Abstract: A multi-mode Trusted Computing Platform (TCP) comprising a Field Programmable Gate Array (FPGA) device that includes a Type-1-compliant root of trust (ROT), a memory containing a Type-1 security boot image and at least one lower-security boot image, and a memory containing a Type-1-associated operating system (OS) image and at least one lower-security-associated OS image. The TCP is configured to execute a multi-stage boot process that, depending on the presence of one or more valid external inputs, selects and initiates either a Type-1 TCP computing mode or a lower-assurance computing mode.Type: GrantFiled: February 4, 2014Date of Patent: June 17, 2014Assignee: Sypris Electronics, LLCInventor: Douglas J. Gardner
-
Patent number: 8756652Abstract: A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password.Type: GrantFiled: October 25, 2011Date of Patent: June 17, 2014Assignee: eBay Inc.Inventor: Markus Jakobsson
-
Patent number: 8756437Abstract: Digital image storage and management systems capable of producing encrypted DICOM volumes on different types of media (e.g., Blu-ray, CD, DVD, memory stick, USB flash drive, etc.), with or without the automatic generation of labels, systems and mechanisms to generate and manage passwords for the encrypted volumes, and systems and mechanisms to manage access to encrypted data on such volumes are disclosed. Generated encrypted DICOM volumes, which can comprise confidential patient data, can be securely interchanged, archived, and distributed to users. The disclosed systems and methods can permit authorized users to access encrypted data, even if the users do not have access to the original encryption mechanism. Encrypted data stored on the volume can be easily and securely accessed by a variety of authorized users.Type: GrantFiled: August 24, 2009Date of Patent: June 17, 2014Assignee: Datcard Systems, Inc.Inventors: David Monk, John C. Canessa, Giancarlo Canessa, Gino G. Canessa
-
Patent number: 8752137Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.Type: GrantFiled: May 28, 2010Date of Patent: June 10, 2014Assignee: Bladelogic, Inc.Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David Allen Solin, Carl Adams
-
Patent number: 8745385Abstract: A data security system includes a single central processing unit (CPU), a plurality of different security zones corresponding to different levels of security classification, a plurality of operating systems, a communications interface, a global zone, and a memory coupled to the plurality of security zones and the global zone. The CPU includes a plurality of processing cores and each security zone is associated with a different one of the processing cores. The global zone is communicatively coupled to the communications interface and the plurality of security zones, and is associated with a different one of the processing cores than the plurality of security zones. The global zone directs communications between the communications interface and the plurality of security zones. Each processing core executes a separate one of the plurality of operating systems, thereby providing separate processing capability on the single CPU for each of the different levels of security classification.Type: GrantFiled: June 24, 2009Date of Patent: June 3, 2014Assignee: Raytheon CompanyInventors: Jonathan D. Goding, Randall S. Brooks
-
Patent number: 8745406Abstract: The invention provides for a method of encrypting and executing an executable image, comprising; flagging sections of the executable image to be encrypted using commands in source files and compiling said executable images so as to generate object files, linking one or more of said executable images using a linker to produce a final executable image, passing said linked executable images to a post-linker encryption engine to encrypt a relocation fix-up patch table and sections of executable images flagged for encryption, and at load time decrypting relocating and executing the executable images.Type: GrantFiled: October 10, 2006Date of Patent: June 3, 2014Assignee: Nytell Software LLCInventor: Colin King
-
Patent number: 8739275Abstract: A computationally implemented method includes, but is not limited to: determining that a computing device that was presenting one or more portions of one or more items and that was in possession of a first user has been transferred from the first user to a second user; and marking, in response to said determining, the one or more portions of the one or more items to facilitate the computing device in returning to the one or more portions upon the computing device being at least transferred back to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: December 8, 2011Date of Patent: May 27, 2014Assignee: Elwha LLCInventors: Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene
-
Patent number: 8739270Abstract: The methods and systems of the present disclosure provide a high assurance means for multiple legacy communication (e.g., Mil-Std-1553 communications protocol) system users and/or devices and multiple IP based network users and/or devices to seamlessly, and in real time, share information across various security domains. Specifically, the system enables multiple legacy communication system protocols and interfaces to communicate with existing IP interfaces and protocols with a high degree of trust. The system includes a configurable filtering capability to allow for the data to be inspected prior to being passed from one security domain to another security domain.Type: GrantFiled: April 19, 2011Date of Patent: May 27, 2014Assignee: The Boeing CompanyInventor: Steven L. Arnold
-
Patent number: 8739280Abstract: A taint processing applied to a tainted value of an application is identified and an output context of the application associated with output of the tainted value is determined. It is determined whether the taint processing is effective in mitigating a security vulnerability caused by the tainted value for the output context.Type: GrantFiled: September 29, 2011Date of Patent: May 27, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Brian V Chess, Sean Patrick Fay
-
Patent number: 8739245Abstract: Systems, methods, and other embodiments associated with flexible supplicant access control are described. One example method includes collecting a network information associated with a network to which an endpoint is to be communicatively coupled. The network information comprises a network identification and information to facilitate the evaluation of network threats. The example method may also include classifying the network based, at least in part, on the network information, to assign a variable level access parameter (VLAP) to the network based on the policy locally configured on the endpoint or centrally managed by the administrator. The VLAP may establish three or more access levels for the network at the endpoint. The example method may also include communicating the network identification and the network VLAP to a second endpoint, a security agent, a security application, and so on.Type: GrantFiled: January 14, 2009Date of Patent: May 27, 2014Assignee: Cisco Technology, Inc.Inventors: Joseph Salowey, Hao Zhou, Jason Frazier
-
Patent number: 8738919Abstract: A method for recording at least one information block in a first volatile memory external to a circuit, a first digital signature being calculated based on information and data internal to the circuit and a second digital signature being calculated based on first signatures of a group of information blocks and on a digital quantity internal to the circuit and assigned to said group. A method for checking the content of an information block recorded by this recording method.Type: GrantFiled: April 18, 2008Date of Patent: May 27, 2014Assignee: STMicroelectronics S.A.Inventor: Michel Bardouillet
-
Patent number: 8738906Abstract: A system may identify one or more attributes associated with traffic. The system may then determine that at least one attribute, of the one or more attributes, matches an attribute of a set of attributes that correspond to a set of categories of traffic. Based on determining that the at least one attribute matches the attribute of the set of attributes, the system may identify a category, of the set of categories, that corresponds to the attribute. The system may associate the category with the traffic, and process the traffic based on the associated category.Type: GrantFiled: November 30, 2011Date of Patent: May 27, 2014Assignee: Juniper Networks, Inc.Inventors: Dhananjay Sampath, Chetan Anand, Arjun Sambamoorthy, Anand Deshpande
-
Patent number: 8739296Abstract: A first user's trust level with regard to a second user can be determined by providing questions to the second user, with the questions based on a previously-collected knowledge base including information about the first user. The information about the first user may be partitioned into levels of trust, and the second user's responses to the questions may be evaluated to determine which level of trust the second user is entitled to. The knowledge base may be assembled by prompting the first user for information and/or by scanning or otherwise collecting already-existing data about the first user. The knowledge base and/or trust assessment may be distributed across a network, and in some embodiments the knowledge base or parts thereof is distributed to other users according to the trust level of those users.Type: GrantFiled: July 30, 2012Date of Patent: May 27, 2014Assignee: Qurio Holdings, Inc.Inventors: Richard Walsh, Christopher Amidon, Alfredo Issa
-
Patent number: 8738905Abstract: A system and method for providing third party secure hosting of an application. The system and method includes providing a host system with a main memory and a third party secured memory, the third party secured memory storing third party information; encrypting the third party information stored on the third party secured memory upon access by a user, the encrypting being via a security key, the security key being held at a customer location; and, enabling access to the third party information only to users having the security key.Type: GrantFiled: December 10, 2007Date of Patent: May 27, 2014Assignee: International Business Machines CorporationInventors: Christopher B. Ferris, Daniel E. House, Kelvin Lawrence, John R. McGarvey, Dirk Nicol
-
Patent number: 8739274Abstract: A device that implements a method for performing integrated caching in a data communication network. The device is configured to receive a packet from a client over the data communication network, wherein the packet includes a request for an object. At the operating system/kernel level of the device, one or more of decryption processing of the packet, authentication and/or authorization of the client, and decompression of the request occurs prior to and integrated with caching operations. The caching operations include determining if the object resides within a cache, serving the request from the cache in response to a determination that the object is stored within the cache, and sending the request to a server in response to a determination that the object is not stored within the cache.Type: GrantFiled: June 29, 2005Date of Patent: May 27, 2014Assignee: Citrix Systems, Inc.Inventors: Prakash Khemani, Prabakar Sundarrajan, Lakshmi Kumar, Kailash Kailash, Ajay Soni, Rajiv Sinha, Saravanakumar Annamalaisami
-
Patent number: 8726347Abstract: Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other servers are disclosed. Embodiments of a method for authenticating a user to a server may include receiving a request to authenticate the user to the server and determining whether authenticating the user requires matching an authentication plan. If a plan is required, the method may also include accessing a stored authentication plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user's current authentication plan from an authentication store where the plan has authorization records each having current information relating to user access. Embodiments of the method may also include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response to a match, authenticating the user.Type: GrantFiled: April 27, 2007Date of Patent: May 13, 2014Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
-
Patent number: 8726351Abstract: Systems and/or methods for controlling access to a plurality of records and/or documentary materials to be persisted in an electronic archives system are provided. The plurality of records and/or documentary material and all preserved information may be stored and accessed on the basis of user and/or object attributes. The user attributes include group affiliation, ownership, and state (e.g., workflow step and time of day). The object attributes include group affiliation, business role, clearance or access level, and network address from which access is requested. Access to the plurality of records and/or documentary material can be obtained both from within a single security domain as well as across more than one security domain.Type: GrantFiled: May 4, 2007Date of Patent: May 13, 2014Assignees: Lockheed Martin Corporation, Electric Data Systems Corporation, Business Performance Systems, Fenestra Technologies CorporationInventors: Richard L. Metzer, James E. Grant, William T. Jackson, David P. Isaac, Matthew J. McKennirey, Kenneth L. Bedford
-
Patent number: 8713307Abstract: A computer system regarding which there is no possibility that data loss or data leakage will occur caused by volume migration is provided. The computer system includes: a memory resource to be accessed by a host computer; a storage system for providing a volume, which logicizes the memory resource, to the host computer; and a management device for managing migration of the volume. When detecting a task of migration of the volume based on a request from a first administrator, the management device compares an encryption function setting status of the volume with the encryption function setting status of a migration destination object of the volume; and sends notice of this comparison result to a second administrator, who is different from the first administrator, for security management of the storage system.Type: GrantFiled: December 16, 2011Date of Patent: April 29, 2014Assignee: Hitachi, Ltd.Inventors: Hirotaka Nakagawa, Mioko Mori
-
Patent number: 8713688Abstract: A secure collaboration mechanism between two organizations may be created based on a set of security system definitions provided by a receiving organization to a providing organization. The providing organization may create a shared portal that has a federated access between both organizations and has access and other security functions. The data collection process may be automated using digitally signed forms or other documents to analyze the security practices of the receiving organization and create a shared portal that has increased or decreased security provisions compared to the providing organization's standard procedures. The collaboration mechanism may be implemented in a bilateral arrangement, a hub and spoke arrangement, and a multilateral arrangement.Type: GrantFiled: March 24, 2010Date of Patent: April 29, 2014Assignee: Microsoft CorporationInventors: Mark Wahl, Alex Weinert, Phil Stradling, Matthew Penarczyk, Craig Wittenberg, Dave Shute
-
Patent number: 8713704Abstract: A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint. A level of authentication determination may additionally/alternatively include at least determining a behavioral fingerprint via establishing a statistical predictability of one or more future actions of an authorized user of a computing device. A level of authentication determination may additionally/alternatively include at least determining an authentication level with respect to a computing device at least partially based on a behavioral fingerprint determined from interaction(s) with another device.Type: GrantFiled: May 18, 2012Date of Patent: April 29, 2014Assignee: Elwha LLCInventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
-
Publication number: 20140115330Abstract: A media processing device, such as a set top box, having a plurality of selectable hardware and software components for supporting multiple media pathways providing differing levels of security. In general, each security level corresponds to a particular certification service boundary definition(s) or key/authentication and security management scheme for managing resources such as hardware acceleration blocks and software interfaces. Different sets of components may be adaptively employed to ensure composited compliance with one or more security constraints and to address component unavailability. Security constraints may be applied, for example, on a source or media specific basis, and different versions of a media item may be provided over multiple pathways providing corresponding levels of security. In one embodiment, a service operator or content provider may provide requisite certification or security requirements, or otherwise assist in selection of pathway components.Type: ApplicationFiled: December 17, 2012Publication date: April 24, 2014Applicant: BROADCOM CORPORATIONInventor: Xuemin (Sherman) Chen
-
Patent number: 8707036Abstract: A method of formatting data for transmission to another party including the step of incorporating in the data a flag indicative of the absence of data for authentication of the sender. An authentication tag length is also included to permit variable length tags to be used.Type: GrantFiled: October 17, 2011Date of Patent: April 22, 2014Assignee: Certicom Corp.Inventor: Marinus Struik
-
Patent number: 8707032Abstract: A system includes a controller and a certificate authority. The controller is configured to control a process. The certificate authority (CA) is configured to issue and to revoke certificates, wherein the controller is configured to use the CA to mutually authenticate a user to enter into a secure mode of operation.Type: GrantFiled: April 30, 2012Date of Patent: April 22, 2014Assignee: General Electric CompanyInventors: David Richard Socky, Robert James Boring, Roy Leguire Jackson, Timothy David Rian, William Robert Pettigrew
-
Patent number: 8701205Abstract: A device may include a trusted component. The trusted component may be verified by a trusted third party and may have a certificate of verification stored therein based on the verification by the trusted third party. The trusted component may include a root of trust that may provide secure code and data storage and secure application execution. The root of trust may also be configured to verify an integrity of the trusted component via a secure boot and to prevent access to the certain information in the device if the integrity of the trusted component may not be verified.Type: GrantFiled: April 15, 2010Date of Patent: April 15, 2014Assignee: InterDigital Patent Holdings, Inc.Inventors: Yogendra C. Shah, Inhyok Cha, Andreas Schmidt, Andreas Leicher, Joseph Gredone, Samian Kaur
-
Patent number: 8695061Abstract: A document process system, which includes: an authentication section that authenticates an operator of an operation target document; an extraction section that extracts specific information for setting operation restriction information of the document; a setting section that sets the operation restriction information of the document based on authentication information of the operator authenticated by the authentication section and the specific information extracted by the extraction section; and a generation section that generates a protected document to which the operation restriction information is set by the setting section based on the operation target document.Type: GrantFiled: April 16, 2008Date of Patent: April 8, 2014Assignee: Fuji Xerox Co., Ltd.Inventor: Shusaku Kubo
-
Patent number: 8695104Abstract: A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the storage device, receives a request for the object, determines if the request includes the key, and, if the request has authorization information, permits access to the object. The data handler receives another request for the object, determines if the request includes the key, and, if the request does not have the authorization information, denies access to the object.Type: GrantFiled: April 23, 2010Date of Patent: April 8, 2014Assignee: Dell Products, LPInventors: Farzad Khosrowpour, Marco A. Peereboom
-
Patent number: 8694788Abstract: A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a product. The main computer stores documents related to the product and generates a pair of localized encryption keys. The encryption keys include a first key that encrypts data and second key that decrypts the data. An application server that is remote from the interface transmits and receives the document from the interface. The main computer authenticates the integrity of the document in a local operation by signing the document with the first key before it is transmitted to the interface and by signing the document with the second key after it is received from the interface.Type: GrantFiled: April 29, 2005Date of Patent: April 8, 2014Assignee: Progressive Casualty Insurance CompanyInventors: Michael F. Thomas, Martin R. Polak, Dennis C. Kunc, Frank N. Stanich, Jr., Raymond S. Ling
-
Patent number: 8695056Abstract: A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, ?I. The method provides a unified information-tracking framework that supports multiple, interdependent dimensions of information. An expressive policy-specification system is separated from the underlying information-flow tracking mechanism. Arbitrary domain-specific policies are supported that can be developed and enforced independent of information flow tracking. Information-flow metadata is treated as a first-class entity, and information flow is correctly tracked on the metadata itself. Classes of information flow polices are defined using multiple dimensions that are application to both information flow data and to the information flows themselves. These classes of polices accurately model more realistic security policies, based on partial trust relations.Type: GrantFiled: January 26, 2008Date of Patent: April 8, 2014Assignee: International Business Machines CorporationInventors: Anindya Banerjee, Marco Pistoia, Avraham Shinnar
-
Patent number: 8693025Abstract: Systems and methods are provided for pre-authorizing print jobs. The system detects that a printer has entered a secure printing mode that prevents incoming print jobs from printing until credentials have been entered at a console of the printer. The system also receives a print job, receives credentials associated with the print job that identify a user, and determines from the credentials that the user is authorized to use the printer. Additionally, the system is able to transmit the print job to the printer along with a bypass instruction directing the printer to disregard the secure printing mode for this print job.Type: GrantFiled: September 19, 2011Date of Patent: April 8, 2014Assignee: Ricoh Production Print SolutionsInventors: Mary Gale Cochran, Silviu Nanau, Adrian Vilceanu
-
Patent number: 8688980Abstract: A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one or more network accessible users; and determining whether to authenticate one or more transactions via the trust verification schema. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: November 23, 2011Date of Patent: April 1, 2014Assignee: Elwha LLCInventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene