Patents Represented by Attorney Gunnison, McKay & Hodgson, L.L.P.
  • Patent number: 7398557
    Abstract: Access to digital content may be controlled by determining digital content to be made accessible via a rights locker describing a user's access rights for digital content associated with the rights locker, determining enrollment authentication data, and sending a rights locker enrollment request to a rights locker provider, where the rights locker enrollment request comprises a digital content request and the enrollment authentication data. An authenticated rights locker access request is received in response to the sending, where the authenticated rights locker access request is for subsequent use in accessing digital content associated with the rights locker.
    Type: Grant
    Filed: October 15, 2003
    Date of Patent: July 8, 2008
    Assignee: Sun Microsystems, Inc.
    Inventor: Eduard K. de Jong
  • Patent number: 7395535
    Abstract: A small footprint device can securely run multiple programs from unrelated vendors by the inclusion of a context barrier isolating the execution of the programs. The context barrier performs security checks to see that principal and object are within the same namespace or memory space and to see that a requested action is appropriate for an object to be operated upon. Each program or set of programs runs in a separate context. Access from one program to another program across the context barrier can be achieved under controlled circumstances by using a global data structure.
    Type: Grant
    Filed: November 22, 2004
    Date of Patent: July 1, 2008
    Assignee: Sun Microsystems, Inc.
    Inventors: Joshua Susser, Mitchel B. Butler, Andy Streich
  • Patent number: 7395244
    Abstract: A method includes determining usage of assets, and determining criticality classifications of the assets based on the usage. The criticality classifications of assets are calculated automatically and without requiring security personnel to classify assets and enter the criticality classifications manually. The calculation of criticality classifications is performed repeatedly insuring that the criticality classifications remain current over time.
    Type: Grant
    Filed: June 23, 2004
    Date of Patent: July 1, 2008
    Assignee: Symantec Corporation
    Inventor: Bryan Kingsford
  • Patent number: 7392543
    Abstract: Host computer systems automatically detect malicious code. The host computer systems automatically generate and send malicious code packets of the malicious code to a local analysis center (LAC) computer system. Based on the received malicious code packets, the LAC computer system provides a signature update to a network intrusion detection system. Further, the LAC computer system also automatically sends malicious code signatures of the malicious code to a global analysis center. In this manner, the spread of the malicious code is rapidly detected and prevented.
    Type: Grant
    Filed: June 30, 2003
    Date of Patent: June 24, 2008
    Assignee: Symantec Corporation
    Inventor: Peter Szor
  • Patent number: 7383568
    Abstract: A method includes defining areas of ownership for users of a computer system; receiving a proposed modification from a first user of the users, the first user being an owner of the proposed modification, wherein a set of the users are stakeholders in the proposed modification; and receiving decisions from a selected set of the stakeholders on approval of the proposed modification. Upon receiving the approvals from all of the selected stakeholders, the owner is granted permission to implement the proposed modification.
    Type: Grant
    Filed: May 5, 2004
    Date of Patent: June 3, 2008
    Assignee: Symantec Corporation
    Inventor: Keith Newstadt
  • Patent number: 7383534
    Abstract: A system includes a security management system for a plurality of managed products. The security management system stores configuration data for managed products and managed nodes in a directory. Configuration data is stored in the directory in the form of configuration objects and setting objects. A revision history of a configuration object and/or a setting object can be maintained. Inheritance between configuration objects is supported so that a configuration inheritance chain is available. To determine an effective configuration at a point in time, a parent-child inheritance merge process is used. To assist the parent-child inheritance process, name attributes and collision resolution mode attributes are used.
    Type: Grant
    Filed: September 10, 2003
    Date of Patent: June 3, 2008
    Assignee: Symantec Corporation
    Inventors: Paul M. Agbabian, David R. Hertel
  • Patent number: 7380280
    Abstract: Access to digital content may be controlled by receiving a rights locker enrollment request from a user device associated with a user, where the rights locker enrollment request comprises a digital content request and enrollment authentication data. A determination of whether the user is authorized comprises determining the rights of the user to access the rights locker and the rights of the user to digital content specified by the digital content request. If the user is authorized, the rights locker is initialized with rights to the digital content. If a first token used to create the authenticated rights locker access request has been fully redeemed, a new token that authenticates future access to a rights locker corresponding to the digital content is obtained. An authenticated rights locker access request that is based at least in part on the new token is created and then sent.
    Type: Grant
    Filed: October 15, 2003
    Date of Patent: May 27, 2008
    Assignee: Sun Microsystems, Inc.
    Inventor: Eduard K. de Jong
  • Patent number: 7380110
    Abstract: An efficient branch prediction structure is described that bifurcates a branch prediction structure into at least two portions where information stored in the second portion is aliased amongst multiple entries of the first portion. In this way, overall storage (and layout area) can be reduced and scaling with a branch prediction structure that includes a (2N)K×1 branch direction entries and a (N/2)K×1 branch prediction qualifier entries is less dramatic than conventional techniques. An efficient branch prediction structure includes entries for branch direction indications and entries for branch prediction qualifier indications. The branch direction indication entries are more numerous than the branch prediction qualifier entries.
    Type: Grant
    Filed: September 11, 2003
    Date of Patent: May 27, 2008
    Assignee: Sun Microsystems, Inc.
    Inventors: Robert D. Nuckolls, Rabin A. Sugumar, Chandra M. R. Thimmannagari
  • Patent number: 7376683
    Abstract: The analysis of the lifetime of objects in a garbage-collected system may be accomplished quickly and effectively using reference counts and cyclic garbage analysis. A reference count is maintained for each of the objects to indicate the number of incoming pointers. Each time the graph structure is altered, the reference counts are updated. Timestamps are recorded each time the reference count for objects change. If a reference count goes to zero, the corresponding object may be indicated as dead. A garbage collection need only be run once (perhaps at the end), and after it is run the system may indicate which objects are cyclic garbage. The timestamps for objects which are cyclic garbage are then reviewed in reverse chronological order. For each timestamp found, the corresponding object and any object reachable from the corresponding object are indicated as dead. These objects are then removed from the set of cyclic garbage.
    Type: Grant
    Filed: March 8, 2004
    Date of Patent: May 20, 2008
    Assignee: Sun Microsystems, Inc.
    Inventors: Mario Wolczko, Antonio Cunei
  • Patent number: 7374099
    Abstract: An application identifier (AID) for an application installed on a smart card comprises a registered application provider identifier (RID). The AID may be processed by determining the RID for an application from the AID of the application, generating an identifier for a network resource from the RID, transmitting a request to the network resource using the identifier, and receiving a response to the request. The response comprises material for use in handling the application on the smart card.
    Type: Grant
    Filed: February 24, 2004
    Date of Patent: May 20, 2008
    Assignee: Sun Microsystems, Inc.
    Inventor: Eduard K. de Jong
  • Patent number: 7370356
    Abstract: Methods and systems for protecting the computer network against unauthorized access are disclosed. Information is reported about each network device connected to the network and/or one or more corresponding users. The reported information is correlated to determine if any unauthorized devices are connected to the network. To report the desired information, each device authorized to use the network may be provided with an agent configured to report information about the device to which it corresponds and information about one or more neighboring devices. A “reporting your neighbor” method may be used wherein each network device report its address and the address of its neighbors may be used to determine if any device is not reporting its address. Alternatively, each agent may report information about its device's physical location, e.g., by global positioning satellite (GPS). A door badge system may be used to provide user location information.
    Type: Grant
    Filed: January 22, 2003
    Date of Patent: May 6, 2008
    Assignee: Symantec Corporation
    Inventor: Yi Guo
  • Patent number: 7365006
    Abstract: A semiconductor package and substrate having multi-level plated vias provide a high density blind via solution at low incremental cost. Via are half-plated atop a circuit pattern and then a second via half is added to complete the via after isolation of elements of the circuit pattern. Successive resist pattern applications and etching are used to form a via tier atop a circuit pattern that is connected by a thin plane of metal. After the tier is deposited, the thin metal plane is etched to isolate the circuit pattern elements. Dielectric is then deposited and the top half of the via is deposited over the tier. The tier may have a larger or smaller diameter with respect to the other half of the via, so that the via halves may be properly registered. Tin plating may also be used to control the etching process to provide etching control.
    Type: Grant
    Filed: September 26, 2006
    Date of Patent: April 29, 2008
    Assignee: Amkor Technology, Inc.
    Inventors: Ronald Patrick Huemoeller, David Jon Hiner, Sukianto Rusli
  • Patent number: 7361533
    Abstract: A method of forming a stackable embedded leadframe package includes coupling an electronic component having bond pads to a substrate; coupling on the substrate a leadframe having a plurality of leads, each lead having a lower mounting portion; encapsulating the electronic component and partially encapsulating the leadframe; singulating each lead; forming via apertures through the substrate to expose the bond pads and the lower mounting portions; and filling the via apertures with an electrically conductive material to form vias electrically coupled to the bond pads and to the lower mounting portions. This permits stacking of electronic components in a small geometry.
    Type: Grant
    Filed: December 7, 2005
    Date of Patent: April 22, 2008
    Assignee: Amkor Technology, Inc.
    Inventors: Ronald Patrick Huemoeller, Sukianto Rusli, David Jon Hiner
  • Patent number: 7363330
    Abstract: When the user works at home on his home computer, a work monitor logs his file activities on all the drives of his home computer in a work monitor log, which can be displayed in a work monitor window. The user can choose to update from the work monitor window. When update is selected, the files in the work monitor log are selected for file synchronization. When file synchronization is performed, files on the user's home computer are synchronized with corresponding files on the user's office computer. Preferably, the date and time of a file on the home computer selected for file synchronization are compared to the corresponding date and time of the corresponding file on the office computer to determine the direction of file synchronization. The newer version of the file overwrites the older version of the file on either the home or office computer.
    Type: Grant
    Filed: June 7, 1999
    Date of Patent: April 22, 2008
    Assignee: Symantec Corporation
    Inventors: Nancy Ellman, John Bonamico
  • Patent number: 7363620
    Abstract: Obfuscating an application program comprises reading a first application program, determining an application program instruction location permutation that transforms the first application program into an obfuscated application program having at least one application program instruction stored at a memory location that is based at least in part on a permutation of the memory location where the corresponding application program instruction is stored in the first application program, applying the application program instruction location permutation to the first application program to create an obfuscated application program, and sending the obfuscated application program.
    Type: Grant
    Filed: September 25, 2003
    Date of Patent: April 22, 2008
    Assignee: Sun Microsystems, Inc.
    Inventor: Eduard K. de Jong
  • Patent number: 7363651
    Abstract: A system for digital content access control comprises a first user device configured to send an authenticated digital content request received in response to sending a digital content request comprising a request for digital content. The system also comprises one or more content provisioners configured to send the authenticated digital content request to the first user device if a user associated with the digital content request is authorized to access the digital content. The system also comprises one or more content repositories configured to send the digital content to a second user device if the authenticated digital content request is associated with the digital content. The system also comprises a synchronizer configured to synchronize information used by the one or more content provisioners to create an authenticated digital content request with information used by the one or more content repositories to validate the authenticated digital content request.
    Type: Grant
    Filed: September 13, 2002
    Date of Patent: April 22, 2008
    Assignee: Sun Microsystems, Inc.
    Inventors: Eduard de Jong, Aaron Cooley, Jon Bostrom
  • Patent number: 7358174
    Abstract: A method of forming an electronic structure may include providing a substrate having a metal pad thereon. A conductive barrier layer may be formed on a first portion of the metal pad, and a second exposed portion of the metal pad may be free of the conductive barrier layer. In addition, an interconnection structure may be provided on the conductive barrier layer with the conductive barrier layer being between the interconnection structure and the metal pad. Moreover, the interconnection structure and the conductive barrier layer may include different materials. Related structures are also discussed.
    Type: Grant
    Filed: April 12, 2005
    Date of Patent: April 15, 2008
    Assignee: Amkor Technology, Inc.
    Inventor: J. Daniel Mis
  • Patent number: 7359579
    Abstract: Disclosed are an image sensor package and a method for manufacturing the same. A sealing portion is formed between an image sensor die and a glass substrate to completely isolate the sensing portion of the image sensor die from external environment. Electrically conductive bumps are formed outside of the sealing portion to electrically connect the image sensor die to the glass substrate. The image sensor die can be sealed by a cap while the image sensor die is connected to the glass substrate via the electrically conductive bumps.
    Type: Grant
    Filed: October 8, 2004
    Date of Patent: April 15, 2008
    Assignee: Amkor Technology, Inc.
    Inventors: Jong Sik Paek, Ho Cheol Jang, Seong Min Seo
  • Patent number: 7353499
    Abstract: Obfuscating an application program comprises reading an application program comprising code, determining multiple dispatch tables associated with the application program, transforming the application program into application program code configured to utilize the dispatch tables during application program execution to determine the location of instruction implementation methods to be executed based at least in part on a current instruction counter value, and sending the application program code.
    Type: Grant
    Filed: September 25, 2003
    Date of Patent: April 1, 2008
    Assignee: Sun Microsystems, Inc.
    Inventor: Eduard K. de Jong
  • Patent number: 7353363
    Abstract: Mechanisms have been developed for providing great flexibility in processor instruction handling, sequencing and execution. In particular, it has been discovered that a configurable predecode mechanism can be employed to select, for respective instruction patterns, between fixed decode and programmable decode paths provided by a processor. In this way, a patchable and/or programmable decode mechanism can be efficiently provided. In some realizations, either (or both) predecode or (and) decode may be configured or reconfigured post-manufacture. In some realizations, either (or both) predecode or (and) decode may be configured at (or about) initialization. In some realizations, either (or both) predecode or (and) decode may be configured at run-time.
    Type: Grant
    Filed: March 28, 2006
    Date of Patent: April 1, 2008
    Assignee: Microsystems, Inc.
    Inventors: Shailender Chaudhry, Paul Caprioli, Quinn A. Jacobson, Marc Tremblay