Patents Assigned to Security, Inc.
-
Publication number: 20140082732Abstract: A system and method are described that will enable mobile smart devices, such as a cellular phones, PDAs, or iPads, smartphones, mobile payment systems, mobile healthcare systems, handheld law enforcement systems, and other types of tablet devices, to trust download applications and for the download applications to trust the mobile smart devices onto which they are downloaded. The system and method enables charging a mobile smart device and while charging the mobile smart device scans for malware and other viruses in the applications and the operating system on the mobile smart device.Type: ApplicationFiled: November 26, 2013Publication date: March 20, 2014Applicant: KAPRICA SECURITY, INC.Inventors: Douglas BRITTON, Andrew Michael WESIE
-
Publication number: 20140068272Abstract: Strong authentication tokens for generating dynamic security values having an acoustical input interface for acoustically receiving input data are disclosed. The tokens may also include an optical interface for receiving input data and may have a selection mechanism to select either the acoustical or the optical input interface to receive data. A communication interface may be provided to communicate with a removable security device such as a smart card and the token may be adapted to generate dynamic security values in cooperation with the removable security device. The acoustic signal received by the token may comprise a plurality of modulated carrier frequencies whereby each carrier frequency has been modulated with a data signal representing the full input data such that the input data are redundantly emitted over more than one modulated carrier frequency.Type: ApplicationFiled: August 30, 2012Publication date: March 6, 2014Applicant: Vasco Data Security, Inc.Inventors: Serguei KONSTANTINOVITCH SAVTCHENKO, Dirk Marien
-
Publication number: 20140068612Abstract: Trusted execution of a self-modifying executable is facilitated. An attempt to access a data portion of a self-modifying executable during execution of the self-modifying executable is detected. The self-modifying executable includes the data portion, for storing data to be accessed during execution of the self-modifying executable, and an instruction portion including instructions for execution of the self-modifying executable. The attempt to access the data portion is retargeted to a separate portion of memory space that is separate from another portion of memory space in which the self-modifying executable is loaded for execution. Meaningful measurability of the integrity of the self-modifying executable is thereby provided.Type: ApplicationFiled: September 6, 2012Publication date: March 6, 2014Applicant: ASSURED INFORMATION SECURITY, INC.Inventor: Jacob TORREY
-
Patent number: 8667285Abstract: The invention provides a method, apparatus, computer readable medium and signal which allows the usage of devices containing PKI private keys such as PKI-enabled smart cards or USB sticks to authenticate users and to sign transactions. The authenticity of the user and/or the message is verified. Furthermore the operation (authentication and/or signing) occurs without the need for an application to have some kind of a direct or indirect digital connection with the device containing the private key. In addition the operation occurs without the need for the PKI-enabled device containing the private key (e.g. a PKI smart card or USB stick) to either support symmetric cryptographic operations or to have been personalized with some secret or confidential data element that can be read by a suitable reader.Type: GrantFiled: April 13, 2011Date of Patent: March 4, 2014Assignee: Vasco Data Security, Inc.Inventors: Frank Coulier, Frank Hoornaert, Frederik Mennes
-
Patent number: 8666823Abstract: A system may include a point-of-sale system that gathers payment card track data from a payment card and a payment card gateway that processes the track data to authorize purchase transactions. The point-of-sale system may remove sensitive data such as a portion of a primary account number from the track data and may compress the removed data. The compressed version of the data may be appended to a discretionary field in the track data. The discretionary field may be encrypted following insertion of the compressed data. Track data that has been modified in this way may be conveyed to the payment gateway for processing.Type: GrantFiled: April 1, 2011Date of Patent: March 4, 2014Assignee: Voltage Security, Inc.Inventors: Terence Spies, Matthew J. Pauker, Jacob Green, Michael S. Leong, Richard T. Minner
-
Patent number: 8661258Abstract: The present invention relates to the field of securing electronic transactions and more specifically to methods to indicate and verify the approval of the risk level of a transaction and to apparatuses for generating transaction risk level approval codes. In a method according to the invention transactions are classified into a limited number of categories. A user submitting a transaction to a server is requested to also generate and submit a dynamic transaction category approval code for the submitted transaction. On the server side a corresponding verification value is generated for the received transaction. In an alternative method according to the invention transactions are assigned one of a limited number of risk levels. A user submitting a transaction to a server is requested to also generate and submit a dynamic risk level approval code for the submitted transaction. On the server side a corresponding verification value is generated for the received transaction.Type: GrantFiled: October 23, 2009Date of Patent: February 25, 2014Assignee: Vasco Data Security, Inc.Inventors: Frank Hoornaert, Dirk Marien
-
Publication number: 20140052642Abstract: Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The point-of-sale equipment may encrypt the payment card information. An encryption algorithm may be used that takes as inputs a first part of the payment card information, a tweak formed by a second part of the payment card information, and an encryption key. The encrypted payment card information may be conveyed to a gateway over a communications network. The gateway may identify which encryption algorithm was used in encrypting the payment card information and may re-encrypt the payment card information using a format preserving encryption algorithm. A network-based service may be used to remotely perform functions for the gateway.Type: ApplicationFiled: October 22, 2013Publication date: February 20, 2014Applicant: Voltage Security, Inc.Inventors: Terence Spies, Matthew J. Pauker
-
Patent number: 8656177Abstract: A system is provided that uses identity-based encryption (IBE) to allow a sender to securely convey information in a message to a recipient. A service name such as a universal resource locator based at least partly on the name of an organization may be associated with a local key server at the organization and a public key server external to the organization. Users at the organization may use the service name to access the local key server to obtain IBE public parameter information for performing message encryption and to obtain IBE private keys for message decryption. External to the organization, users may obtain IBE public parameter information and IBE private keys from the public key server using the same service name. The local key generator and the public key generator may maintain identical copies of the same IBE master secret.Type: GrantFiled: June 23, 2008Date of Patent: February 18, 2014Assignee: Voltage Security, Inc.Inventor: Ingrum O. Putz
-
Patent number: 8656504Abstract: A method and apparatus are provided for protecting confidential information. The method includes the steps of providing a plurality of files where each file contains at least one item of secret information, password protecting the plurality of files with a master password, detecting entry of passwords into a master password entry field, comparing entered passwords with the master password to identify incorrect master passwords and deleting the plurality of files upon successive entry of incorrect master passwords a predetermined number of times.Type: GrantFiled: August 25, 2009Date of Patent: February 18, 2014Assignee: Keeper Security, Inc.Inventors: Craig B. Lurey, Darren S. Guccione
-
Publication number: 20140046853Abstract: A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information may include sensitive numbers such as social security numbers, credit card numbers or other private numbers. A tokenization system may include multiple physically distinct hardware platforms each having a tokenization server and a database. A tokenization server may run portions of a sensitive number through a predetermined number of rounds of a Feistel network. Each round of the Feistel network may include tokenizing portions of the sensitive number using a fractional token table stored an associated database and modifying the tokenized portions by reversibly adding portions of the sensitive number to the tokenized portions. The fractional token table may include partial sensitive numbers and corresponding partial tokens.Type: ApplicationFiled: October 22, 2013Publication date: February 13, 2014Applicant: Voltage Security, Inc.Inventors: Terence Spies, Richard T. Minner
-
Publication number: 20140041030Abstract: A code finder system deployed as a software module, a web service or as part of a larger security system, identifies and processes well-formed code sequences. For a data flow that is expected to be free of executable or interpreted code, or free of one or more known styles of executable or interpreted code, the code finder system can protect participants in the communications network. Examples of payload carried by data flows that can be monitored include, but are not limited to, user input data provided as part of interacting with a web application, data files or entities, such as images or videos, and user input data provided as part of interacting with a desktop application.Type: ApplicationFiled: February 15, 2013Publication date: February 6, 2014Applicant: SHAPE SECURITY, INCInventors: Justin David Call, Oscar Hunter Steele, III
-
Publication number: 20140040628Abstract: Methods, apparatus, and systems for securing application interactions are disclosed.Type: ApplicationFiled: August 2, 2013Publication date: February 6, 2014Applicant: Vasco Data Security, Inc.Inventors: NICOLAS FORT, Frank Coulier, Guilaume Teixeron
-
Publication number: 20140022387Abstract: A method and apparatus is described for specifying regions of interest within a two-dimensional view of visual information that comprises a series of frames. Visual changes that occur in the view are stored. A user enters search criteria that specify at least one first region of interest within the view and a visual change. A visual change may include a change in pixel values or a detection of motion of one or more objects within the view. The first search criteria are compared against the stored visual changes to identify a sequence of frames in which the specified visual change occurred within the first region of interest. The search criteria may specify multiple regions of interest, each with one or more types of visual changes. If a motion is specified, then a direction, speed, and behavior of a moving object may also be specified.Type: ApplicationFiled: September 24, 2013Publication date: January 23, 2014Applicant: 3VR Security, Inc.Inventors: Robert P. Vallone, Michael E. Wells, Shannon P. Hale, Stephen D. Fleischer, Colvin H. Pitts, Gordon T. Haupt
-
Publication number: 20140013436Abstract: The system and method for enabling remote registry service security audits described herein may include scanning a network to construct a model or topology of the network. In particular, the model or topology of the network may include characteristics describing various devices in the network, which may be analyzed to determine whether a remote registry service has been enabled on the devices. For example, the security audits may include performing one or more credentialed policy scans to enable the remote registry service for certain devices that have disabled the remote registry service, auditing the devices in response to enabling the remote registry service, and then disabling the remote registry service on the devices. Thus, the system and method described herein may enable remotely scanning information contained in device registries during a security audit without exposing the device registries to malicious activity.Type: ApplicationFiled: October 31, 2012Publication date: January 9, 2014Applicant: Tenable Network Security, Inc.Inventor: Renaud Deraison
-
Publication number: 20140013434Abstract: The system and method described herein may leverage active network scanning and passive network monitoring to provide strategic anti-malware monitoring in a network. In particular, the system and method described herein may remotely connect to managed hosts in a network to compute hashes or other signatures associated with processes running thereon and suspicious files hosted thereon, wherein the hashes may communicated to a cloud database that aggregates all known virus or malware signatures that various anti-virus vendors have catalogued to detect malware infections without requiring the hosts to have a local or resident anti-virus agent. Furthermore, running processes and file system activity may be monitored in the network to further detect malware infections. Additionally, the network scanning and network monitoring may be used to detect hosts that may potentially be participating in an active botnet or hosting botnet content and audit anti-virus strategies deployed in the network.Type: ApplicationFiled: December 3, 2012Publication date: January 9, 2014Applicant: Tenable Network Security, Inc.Inventors: Marcus J. Ranum, Ron Gula
-
Patent number: 8627084Abstract: A system is provided that uses cryptographic techniques to support secure messaging between senders and recipients. A sender may encrypt a message for a recipient using the recipient's public key. The sender may send the encrypted message to the message address of a given recipient. A server may be used to decrypt the encrypted message for the recipient, so that the recipient need not install a decryption engine on the recipient's equipment.Type: GrantFiled: October 23, 2012Date of Patent: January 7, 2014Assignee: Voltage Security, Inc.Inventors: Matthew J. Pauker, Terence Spies, Rishi Kacker, Guido Appenzeller
-
Publication number: 20140005842Abstract: A door closer comprises a piston cooperating with a rotating pinion. Upon rotation of the pinion in the door opening direction, the piston moves toward the second end of the housing forcing fluid from a second variable volume chamber through a passage to a first variable volume chamber and compressing a spring assembly for storing energy. The spring assembly urges the piston toward the first end of the housing for forcing fluid from the first variable volume chamber to the second variable volume chamber and rotating the pinion in the door closing direction. A controller controls the position of a valve in the passage based on the sensed angular position of a door and the position of the valve for determining the amount of hydraulic fluid flowing through the valve.Type: ApplicationFiled: September 3, 2013Publication date: January 2, 2014Applicant: Yale Security Inc.Inventors: Charles E. Burris, Robert L. Tadlock, JR., John White, Jason Scott Gurley, Steven Michael Faes, Joseph McGinty, Wade Patterson
-
Publication number: 20140007241Abstract: The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.Type: ApplicationFiled: October 17, 2012Publication date: January 2, 2014Applicant: Tenable Network Security, Inc.Inventors: Ron Gula, Renaud Deraison
-
Patent number: 8621639Abstract: A system provides for fuzzy classification in comparisons of scanner responses. A web application test suite performs tests against a web application by sending client requests from a testing computer to the server running the web application and checking how the web application responds. A thorough web application security scan might involve thousands of checks and responses. As a result, some sort of programmatic analysis is needed. One such evaluation involves comparing one response against another. Response matching that compares two HTTP responses might use fuzzy classification processes.Type: GrantFiled: November 30, 2011Date of Patent: December 31, 2013Assignee: WhiteHat Security, Inc.Inventors: William Pennington, Jeremiah Grossman, Robert Stone, Siamak Pazirandeh
-
Patent number: 8621552Abstract: A method for evaluating a deployment of a network access change request, the method includes: (a) formatting a network access change request to provide a formatted network access change request; wherein the formatted network access change request includes multiple formatted request items; wherein the multiple formatted request items includes a requested access type, an address of an access source, an address of an access destination; (b) determining multiple relationships between the multiple formatted request items and corresponding items of at least one entity out of a network model and a current network policy; and (c) responding to the network access change request in response to the multiple determined relationships.Type: GrantFiled: May 21, 2008Date of Patent: December 31, 2013Assignee: Skybox Security Inc.Inventors: Amnon Lotem, Alexander Haiut, Ravid Circus, Moshe Raab, Amos Arev, Gideon Cohen, Tal Sheffer