Patents Examined by Abdulhakim Nobahar
  • Patent number: 8958549
    Abstract: The present disclosure relates to a countermeasure method in an integrated circuit comprising at least one first logic circuit and at least one first input register supplying the first logic circuit with a datum, the method comprising steps of introducing a random datum into each first input register of the first logic circuit and of the first logic circuit reading the random datum in each first input register, then of introducing a datum to be processed into each first input register, and of the first logic circuit processing the datum in each first input register.
    Type: Grant
    Filed: January 14, 2011
    Date of Patent: February 17, 2015
    Assignee: STMicroelectronics (Rousset) SAS
    Inventor: Fabrice Romain
  • Patent number: 8949962
    Abstract: A service providing method of a server is provided. The method includes registering a service hub according to a service request; setting a service hub program corresponding to the service hub; receiving a request for the service hub program from a user terminal device belonging to an organization associated with the service hub; providing the service hub program to the user terminal device; and providing an application program corresponding to the user terminal device and the service hub program to the user terminal device.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: February 3, 2015
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Seon-hak Kim, Nam-geol Lee, Il-ho Lee
  • Patent number: 8931067
    Abstract: Methods and apparatus for facilitating access to public wireless access points in a fixed-mobile convergence system. A mobile terminal is pre-provisioned with one or more security parameters corresponding to one or more WLAN access points that the mobile terminal might need to access should a current WLAN access point fail or otherwise become unreachable. The WLAN access points are similarly pre-provisioned with a security parameter corresponding to the mobile terminal. With these pro-provisioned security parameters, the mobile terminal and any one of the potential target WLAN access points conduct an abbreviated authentication process in the event that a switch-over becomes necessary.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: January 6, 2015
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Wassim Haddad, Samy Touati
  • Patent number: 8914906
    Abstract: A system and method for controlling use of content in accordance with usage rights associated with the content and determined in accordance with the environment of a user device. A request is received for secure content from a user device and the integrity of the environment of the user device is verified. Appropriate usage rights are retrieved based upon the results of the verification of integrity and the content is rendered on the user device in accordance with the appropriate usage rights.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: December 16, 2014
    Assignee: ContentGuard Holdings, Inc.
    Inventors: Michael Raley, Daniel Chen, Hsi-Cheng Wu, Thanh Ta
  • Patent number: 8904557
    Abstract: Extracting data from a source system includes generating an authorization model of the data protection controls applied to the extracted data by the source system. The authorization model is used to map the data protection control applied to the extracted data to generate corresponding data protection controls provided in target system. The extracted data is imported to the target system including implementing the corresponding data protection controls.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 2, 2014
    Assignee: SAP AG
    Inventors: John C. Radkowski, Swetta Singh
  • Patent number: 8904495
    Abstract: A user transaction request is received at a client device. A web browser plug-in communicates the user transaction request to a server that determines whether the user transaction request is a secure transaction. Transaction data is received from the server via the web browser plug-in. If the received transaction data indicates a secure transaction, the user is prompted to provide biometric data, which is received from the user. The web browser plug-in then communicates a transaction confirmation to the server.
    Type: Grant
    Filed: March 31, 2010
    Date of Patent: December 2, 2014
    Assignee: Synaptics Incorporated
    Inventors: Davit Baghdasaryan, Ramesh Kesanupalli, Frank Schwab, Philip Yiu Kwong Chan, Larry Hattery
  • Patent number: 8898793
    Abstract: An approach is provided for selecting a security policy. A security policy manager determines one or more factors for adjusting a safety score associated with a device. The safety score is based, at least in part, on a context associated with the device. The security policy manager then processes and/or facilitates a processing of the one or more factors and the safety score to calculate an adjusted safety score, and determines to select a security policy based, at least in part, on the adjusted safety score.
    Type: Grant
    Filed: January 14, 2011
    Date of Patent: November 25, 2014
    Assignee: Nokia Corporation
    Inventors: Markus Juhani Miettinen, Nadarajah Asokan, Aditi Gupta
  • Patent number: 8879724
    Abstract: Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.
    Type: Grant
    Filed: December 14, 2009
    Date of Patent: November 4, 2014
    Assignee: Rambus Inc.
    Inventors: Paul C. Kocher, Joshua M. Jaffe, Benjamin C. Jun
  • Patent number: 8850530
    Abstract: A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: September 30, 2014
    Assignee: McAfee, Inc.
    Inventor: Majid Shahbazi
  • Patent number: 8839432
    Abstract: A method and apparatus for performing a reputation based analysis on a malicious infection to secure a computer. In one embodiment, the method includes monitoring application activity occurring at computers, generating reputation information associated with the application activity, in response to a malicious infection to at least one of the computers, examining the reputation information to access unreputed portions of the application activity that occurred at the at least one of the computers and determining a malicious signature based on the unreputed portions of the application activity.
    Type: Grant
    Filed: April 1, 2010
    Date of Patent: September 16, 2014
    Assignee: Symantec Corporation
    Inventor: Deepak Patil
  • Patent number: 8832852
    Abstract: A method and apparatus for dynamically protecting content in a system for managing use of the content in accordance with usage rights. A request is received from a user device for content stored on a server. Information is gathered from at least one source to build the content in accordance with the request and the content is mapped to usage rights. A reply including the usage rights is sent to the user device, and use of the content is permitted based on the usage rights under control of a security module for enforcing usage rights.
    Type: Grant
    Filed: April 30, 2003
    Date of Patent: September 9, 2014
    Assignee: ContentGuard Holdings, Inc.
    Inventors: Michael Raley, Daniel Chen, Hsi-Cheng Wu, Thanh Ta
  • Patent number: 8831223
    Abstract: Handset, computer software and method for protecting sensitive network information, available in the handset, from disclosure to an unauthorized server, by using an abstraction function module, the handset being connected to a network.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: September 9, 2014
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventors: Johan Bolin, Karl Torbjörn Wigren, Per Willars
  • Patent number: 8812856
    Abstract: Systems and methods for facilitating confirmation of completion of a transaction(s) for state synchronization over a non reliable network using signature processing are described. One of the methods includes receiving a read request from a first client, sending a last known signature with a context object to the first client in response to receiving the read request, and receiving an appended signature from the first client with a context object for a transaction at the first client. The appended signature includes the last known signature and an increment by the first client. The operation of receiving the appended signature occurs upon execution of the transaction at the first client. The method further includes updating the last known signature to the appended signature and sending the updated last known signature to the first client to facilitate marking of the transaction as complete resulting in a definitive state synchronization.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: August 19, 2014
    Assignee: Zynga Inc.
    Inventor: Leela Tamma
  • Patent number: 8806220
    Abstract: Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a host computer system. The device compares hashes of host system data against valid hashes maintained in protected storage of the device. The host data may be a file, data block, and/or memory contents. The device takes action when the host system data does not match the information in protected storage, such as to log information about the mismatch and/or provide an indication of validation failure, e.g., via an LED and/or display screen output. Further, the comparison may be part of a boot process validation, and the action may prevent the boot process from continuing, or replace an invalid file. Alternatively, the validation may take place at anytime.
    Type: Grant
    Filed: January 7, 2009
    Date of Patent: August 12, 2014
    Assignee: Microsoft Corporation
    Inventors: David Abzarian, Todd L. Carpenter, Harish S. Kulkarni, Salahuddin J. Khan
  • Patent number: 8799678
    Abstract: A system and method for the secure storage of executable code and the secure movement of such code from memory to a processor. The method includes the storage of an encrypted version of the code. The code is then decrypted and decompressed as necessary, before re-encryption in storage. The re-encrypted executable code is then written to external memory. As a cache line of executable code is required, a fetch is performed but intercepted. In the interception, the cache line is decrypted. The plain text cache line is then stored in an instruction cache associated with a processor.
    Type: Grant
    Filed: June 1, 2010
    Date of Patent: August 5, 2014
    Assignee: Broadcom Corporation
    Inventor: Mark Buer
  • Patent number: 8800012
    Abstract: The present invention is directed to perform high-reliable authentication using a one-way function that a communication is a communication which was performed with the same apparatus to be authenticated by storing a password only in an apparatus to be authenticated (it is unnecessary to store a password in both of an authentication apparatus and an apparatus to be authenticated) without transmitting a challenge code. When a setting is updated in a setting management server, authentication is performed by using a one-time password obtained last time. A sound communication terminal performs a process using a hash function once on a one-time password transmitted this time, and performs authentication by determining whether the processed one-time password matches a one-time password obtained last time or not. Whether the information at the time of the change in the setting is proper or not is determined by a sound terminal.
    Type: Grant
    Filed: November 1, 2012
    Date of Patent: August 5, 2014
    Assignee: NEC Corporation
    Inventor: Yasuhiro Mizukoshi
  • Patent number: 8789145
    Abstract: A system and a related method are disclosed for authenticating an electronic transaction. Input behavioral data is captured related to measured interactions with at least one input device. The input data is compared to probability distribution representations for a demographic group and for a wide population, performing the measured interaction(s). The system is configured to authenticate the electronic transaction based on the comparing.
    Type: Grant
    Filed: April 4, 2012
    Date of Patent: July 22, 2014
    Assignee: Identity Metrics, Inc.
    Inventors: Timothy Erickson Meehan, Herbert Lewis Alward
  • Patent number: 8782427
    Abstract: This invention provides for progressive processing of biometric samples to facilitate user verification. A security token performs initial processing. Due to storage and processing limitations, false rejections may occur. To overcome this, the biometric sample is routed to a stateless server with greater processing power and data enhancement capabilities. The stateless server processes and returns an enhanced biometric sample to the security token for another attempt at verification. In another embodiment, the security token may have a second failure when verifying the enhanced biometric sample. It can then send the enhanced or raw biometric sample to a stateful server. The stateful server processes the biometric sample and performs a one to many search of a biometric database having a master set of enrolled authorized user biometric templates. The security token uses signals from the stateful server to grant or deny access. In both embodiments, heuristics remain with the security token.
    Type: Grant
    Filed: March 20, 2012
    Date of Patent: July 15, 2014
    Assignee: Actividentity, Inc.
    Inventors: Dominique Louis Joseph Fedronic, Eric F. Le Saint
  • Patent number: 8776181
    Abstract: Methods for authenticating and authorizing a mobile device using tunneled extensible authentication protocol are provided. The methods include evaluating an inner user identifier against a policy engine to determine a home AAA server to route an access request for inner user authentication. Instead of having a static route configured based on an outer identifier/roaming identity, the policy engine can have multiple rules and actions for routing the request. The evaluation can be based on the conditions of the inner user identifier and or other AAA attributes received in the request. The request is transmitted within a secure communication tunnel. There are several embodiments of evaluating an inner user identifier against a policy engine.
    Type: Grant
    Filed: November 8, 2012
    Date of Patent: July 8, 2014
    Assignee: Bridgewater Systems Corp.
    Inventors: Giulio Graziani, Yong Li
  • Patent number: 8752181
    Abstract: A system and method of providing identity theft security is provided. The system and method utilizes a computer program that identifies, locates, secures, and/or removes from computers, computer systems and/or computer networks personally identifying and/or other sensitive information in different data formats. The computer program utilizes a multi-tiered escalation model of searching/identifying sensitive information. The computer program of the instant invention utilizes a self-learning process for fine-tuning a level of scrutiny for identifying potentially sensitive information.
    Type: Grant
    Filed: May 7, 2010
    Date of Patent: June 10, 2014
    Assignee: TouchNet Information Systems, Inc.
    Inventors: Withold J. Grzymala-Busse, Dean R. Vermeire, Daniel J. Toughey