Patents Examined by Abdulhakim Nobahar
-
Patent number: 8958549Abstract: The present disclosure relates to a countermeasure method in an integrated circuit comprising at least one first logic circuit and at least one first input register supplying the first logic circuit with a datum, the method comprising steps of introducing a random datum into each first input register of the first logic circuit and of the first logic circuit reading the random datum in each first input register, then of introducing a datum to be processed into each first input register, and of the first logic circuit processing the datum in each first input register.Type: GrantFiled: January 14, 2011Date of Patent: February 17, 2015Assignee: STMicroelectronics (Rousset) SASInventor: Fabrice Romain
-
Patent number: 8949962Abstract: A service providing method of a server is provided. The method includes registering a service hub according to a service request; setting a service hub program corresponding to the service hub; receiving a request for the service hub program from a user terminal device belonging to an organization associated with the service hub; providing the service hub program to the user terminal device; and providing an application program corresponding to the user terminal device and the service hub program to the user terminal device.Type: GrantFiled: September 30, 2011Date of Patent: February 3, 2015Assignee: Samsung Electronics Co., Ltd.Inventors: Seon-hak Kim, Nam-geol Lee, Il-ho Lee
-
Patent number: 8931067Abstract: Methods and apparatus for facilitating access to public wireless access points in a fixed-mobile convergence system. A mobile terminal is pre-provisioned with one or more security parameters corresponding to one or more WLAN access points that the mobile terminal might need to access should a current WLAN access point fail or otherwise become unreachable. The WLAN access points are similarly pre-provisioned with a security parameter corresponding to the mobile terminal. With these pro-provisioned security parameters, the mobile terminal and any one of the potential target WLAN access points conduct an abbreviated authentication process in the event that a switch-over becomes necessary.Type: GrantFiled: January 31, 2012Date of Patent: January 6, 2015Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Wassim Haddad, Samy Touati
-
Patent number: 8914906Abstract: A system and method for controlling use of content in accordance with usage rights associated with the content and determined in accordance with the environment of a user device. A request is received for secure content from a user device and the integrity of the environment of the user device is verified. Appropriate usage rights are retrieved based upon the results of the verification of integrity and the content is rendered on the user device in accordance with the appropriate usage rights.Type: GrantFiled: June 14, 2012Date of Patent: December 16, 2014Assignee: ContentGuard Holdings, Inc.Inventors: Michael Raley, Daniel Chen, Hsi-Cheng Wu, Thanh Ta
-
Patent number: 8904557Abstract: Extracting data from a source system includes generating an authorization model of the data protection controls applied to the extracted data by the source system. The authorization model is used to map the data protection control applied to the extracted data to generate corresponding data protection controls provided in target system. The extracted data is imported to the target system including implementing the corresponding data protection controls.Type: GrantFiled: February 15, 2012Date of Patent: December 2, 2014Assignee: SAP AGInventors: John C. Radkowski, Swetta Singh
-
Patent number: 8904495Abstract: A user transaction request is received at a client device. A web browser plug-in communicates the user transaction request to a server that determines whether the user transaction request is a secure transaction. Transaction data is received from the server via the web browser plug-in. If the received transaction data indicates a secure transaction, the user is prompted to provide biometric data, which is received from the user. The web browser plug-in then communicates a transaction confirmation to the server.Type: GrantFiled: March 31, 2010Date of Patent: December 2, 2014Assignee: Synaptics IncorporatedInventors: Davit Baghdasaryan, Ramesh Kesanupalli, Frank Schwab, Philip Yiu Kwong Chan, Larry Hattery
-
Patent number: 8898793Abstract: An approach is provided for selecting a security policy. A security policy manager determines one or more factors for adjusting a safety score associated with a device. The safety score is based, at least in part, on a context associated with the device. The security policy manager then processes and/or facilitates a processing of the one or more factors and the safety score to calculate an adjusted safety score, and determines to select a security policy based, at least in part, on the adjusted safety score.Type: GrantFiled: January 14, 2011Date of Patent: November 25, 2014Assignee: Nokia CorporationInventors: Markus Juhani Miettinen, Nadarajah Asokan, Aditi Gupta
-
Patent number: 8879724Abstract: Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.Type: GrantFiled: December 14, 2009Date of Patent: November 4, 2014Assignee: Rambus Inc.Inventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun
-
Patent number: 8850530Abstract: A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).Type: GrantFiled: September 28, 2012Date of Patent: September 30, 2014Assignee: McAfee, Inc.Inventor: Majid Shahbazi
-
Patent number: 8839432Abstract: A method and apparatus for performing a reputation based analysis on a malicious infection to secure a computer. In one embodiment, the method includes monitoring application activity occurring at computers, generating reputation information associated with the application activity, in response to a malicious infection to at least one of the computers, examining the reputation information to access unreputed portions of the application activity that occurred at the at least one of the computers and determining a malicious signature based on the unreputed portions of the application activity.Type: GrantFiled: April 1, 2010Date of Patent: September 16, 2014Assignee: Symantec CorporationInventor: Deepak Patil
-
Patent number: 8832852Abstract: A method and apparatus for dynamically protecting content in a system for managing use of the content in accordance with usage rights. A request is received from a user device for content stored on a server. Information is gathered from at least one source to build the content in accordance with the request and the content is mapped to usage rights. A reply including the usage rights is sent to the user device, and use of the content is permitted based on the usage rights under control of a security module for enforcing usage rights.Type: GrantFiled: April 30, 2003Date of Patent: September 9, 2014Assignee: ContentGuard Holdings, Inc.Inventors: Michael Raley, Daniel Chen, Hsi-Cheng Wu, Thanh Ta
-
Patent number: 8831223Abstract: Handset, computer software and method for protecting sensitive network information, available in the handset, from disclosure to an unauthorized server, by using an abstraction function module, the handset being connected to a network.Type: GrantFiled: December 30, 2008Date of Patent: September 9, 2014Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Johan Bolin, Karl Torbjörn Wigren, Per Willars
-
Methods and systems for state synchronization over a non-reliable network using signature processing
Patent number: 8812856Abstract: Systems and methods for facilitating confirmation of completion of a transaction(s) for state synchronization over a non reliable network using signature processing are described. One of the methods includes receiving a read request from a first client, sending a last known signature with a context object to the first client in response to receiving the read request, and receiving an appended signature from the first client with a context object for a transaction at the first client. The appended signature includes the last known signature and an increment by the first client. The operation of receiving the appended signature occurs upon execution of the transaction at the first client. The method further includes updating the last known signature to the appended signature and sending the updated last known signature to the first client to facilitate marking of the transaction as complete resulting in a definitive state synchronization.Type: GrantFiled: February 10, 2012Date of Patent: August 19, 2014Assignee: Zynga Inc.Inventor: Leela Tamma -
Patent number: 8806220Abstract: Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a host computer system. The device compares hashes of host system data against valid hashes maintained in protected storage of the device. The host data may be a file, data block, and/or memory contents. The device takes action when the host system data does not match the information in protected storage, such as to log information about the mismatch and/or provide an indication of validation failure, e.g., via an LED and/or display screen output. Further, the comparison may be part of a boot process validation, and the action may prevent the boot process from continuing, or replace an invalid file. Alternatively, the validation may take place at anytime.Type: GrantFiled: January 7, 2009Date of Patent: August 12, 2014Assignee: Microsoft CorporationInventors: David Abzarian, Todd L. Carpenter, Harish S. Kulkarni, Salahuddin J. Khan
-
Patent number: 8799678Abstract: A system and method for the secure storage of executable code and the secure movement of such code from memory to a processor. The method includes the storage of an encrypted version of the code. The code is then decrypted and decompressed as necessary, before re-encryption in storage. The re-encrypted executable code is then written to external memory. As a cache line of executable code is required, a fetch is performed but intercepted. In the interception, the cache line is decrypted. The plain text cache line is then stored in an instruction cache associated with a processor.Type: GrantFiled: June 1, 2010Date of Patent: August 5, 2014Assignee: Broadcom CorporationInventor: Mark Buer
-
Patent number: 8800012Abstract: The present invention is directed to perform high-reliable authentication using a one-way function that a communication is a communication which was performed with the same apparatus to be authenticated by storing a password only in an apparatus to be authenticated (it is unnecessary to store a password in both of an authentication apparatus and an apparatus to be authenticated) without transmitting a challenge code. When a setting is updated in a setting management server, authentication is performed by using a one-time password obtained last time. A sound communication terminal performs a process using a hash function once on a one-time password transmitted this time, and performs authentication by determining whether the processed one-time password matches a one-time password obtained last time or not. Whether the information at the time of the change in the setting is proper or not is determined by a sound terminal.Type: GrantFiled: November 1, 2012Date of Patent: August 5, 2014Assignee: NEC CorporationInventor: Yasuhiro Mizukoshi
-
Patent number: 8789145Abstract: A system and a related method are disclosed for authenticating an electronic transaction. Input behavioral data is captured related to measured interactions with at least one input device. The input data is compared to probability distribution representations for a demographic group and for a wide population, performing the measured interaction(s). The system is configured to authenticate the electronic transaction based on the comparing.Type: GrantFiled: April 4, 2012Date of Patent: July 22, 2014Assignee: Identity Metrics, Inc.Inventors: Timothy Erickson Meehan, Herbert Lewis Alward
-
Patent number: 8782427Abstract: This invention provides for progressive processing of biometric samples to facilitate user verification. A security token performs initial processing. Due to storage and processing limitations, false rejections may occur. To overcome this, the biometric sample is routed to a stateless server with greater processing power and data enhancement capabilities. The stateless server processes and returns an enhanced biometric sample to the security token for another attempt at verification. In another embodiment, the security token may have a second failure when verifying the enhanced biometric sample. It can then send the enhanced or raw biometric sample to a stateful server. The stateful server processes the biometric sample and performs a one to many search of a biometric database having a master set of enrolled authorized user biometric templates. The security token uses signals from the stateful server to grant or deny access. In both embodiments, heuristics remain with the security token.Type: GrantFiled: March 20, 2012Date of Patent: July 15, 2014Assignee: Actividentity, Inc.Inventors: Dominique Louis Joseph Fedronic, Eric F. Le Saint
-
Patent number: 8776181Abstract: Methods for authenticating and authorizing a mobile device using tunneled extensible authentication protocol are provided. The methods include evaluating an inner user identifier against a policy engine to determine a home AAA server to route an access request for inner user authentication. Instead of having a static route configured based on an outer identifier/roaming identity, the policy engine can have multiple rules and actions for routing the request. The evaluation can be based on the conditions of the inner user identifier and or other AAA attributes received in the request. The request is transmitted within a secure communication tunnel. There are several embodiments of evaluating an inner user identifier against a policy engine.Type: GrantFiled: November 8, 2012Date of Patent: July 8, 2014Assignee: Bridgewater Systems Corp.Inventors: Giulio Graziani, Yong Li
-
Patent number: 8752181Abstract: A system and method of providing identity theft security is provided. The system and method utilizes a computer program that identifies, locates, secures, and/or removes from computers, computer systems and/or computer networks personally identifying and/or other sensitive information in different data formats. The computer program utilizes a multi-tiered escalation model of searching/identifying sensitive information. The computer program of the instant invention utilizes a self-learning process for fine-tuning a level of scrutiny for identifying potentially sensitive information.Type: GrantFiled: May 7, 2010Date of Patent: June 10, 2014Assignee: TouchNet Information Systems, Inc.Inventors: Withold J. Grzymala-Busse, Dean R. Vermeire, Daniel J. Toughey