Patents Examined by Abdulhakim Nobahar
-
Patent number: 7890772Abstract: A document processing device configured to communicate with a first device and a user input device. The document processing device includes a controller having memory. The controller is operable to receive a first communication from the first device. The first communication includes a job to be processed by the printing device and a first shortcut access code associated with the job. The first shortcut access code is stored in the memory of the controller. The controller is also operable to receive a second communication from the user input device. The second communication includes a second shortcut access code. The controller holds the job to be processed until the controller receives the second communication and verifies the second shortcut access code matches the first shortcut access code.Type: GrantFiled: August 10, 2005Date of Patent: February 15, 2011Assignee: Lexmark International, Inc.Inventors: Amanda Kay Bridges, William James Gardner Flowers, Charles Edward Grieshaber, Chad Eugene McQuillen, Michael Ray Timperman
-
Patent number: 7882539Abstract: Abstracting access control policy from access check mechanisms allows for richer expression of policy, using a declarative model with semantics, than what is permitted by the access check mechanisms. Further, abstracting access control policy allows for uniform expression of policy across multiple access check mechanisms. Proof-like reasons for any access query are provided, such as who has access to what resource, built from the policy statements themselves, independent of the access check mechanism that provide access. Access is audited and policy-based reasons for access are provided based on the access control policy.Type: GrantFiled: June 2, 2006Date of Patent: February 1, 2011Assignee: Microsoft CorporationInventors: Muthukrishnan Paramasivam, Charles F. Rose, III, Dave M. McPherson, Raja Pazhanivel Perumal, Satyajit Nath, Paul J. Leach, Ravindra Nath Pandya
-
Patent number: 7865717Abstract: Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.Type: GrantFiled: July 18, 2006Date of Patent: January 4, 2011Assignee: Motorola, Inc.Inventors: George Calcev, Bogdan O Carbunar, Madjid F. Nakhjiri
-
Patent number: 7865938Abstract: A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).Type: GrantFiled: May 26, 2006Date of Patent: January 4, 2011Assignee: McAfee, Inc.Inventor: Majid Shahbazi
-
Patent number: 7856555Abstract: A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The informational data is protected by a security methodology that is accessible to authorized entities. A reader device may be used to help make a verification determination of whether encrypted or encoded data has been altered. In some instances an output alert operably coupled to the reader device serves as a verification status indicator.Type: GrantFiled: December 13, 2006Date of Patent: December 21, 2010Assignee: The Invention Science Fund I, LLCInventors: Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, John D. Rinaldo, Jr.
-
Patent number: 7841003Abstract: A method for preventing phishing attacks is provided. The method in one aspect includes identifying a source image file that was used fraudulently, replacing the content of the source image file with a warning, and allowing the source image file having the warning to be accessed.Type: GrantFiled: May 4, 2005Date of Patent: November 23, 2010Assignee: Capital One Financial CorporationInventor: Warner Allen Brandt Emdee
-
Patent number: 7836490Abstract: A method and apparatus for providing network security using security labeling is disclosed. The method includes comparing first security level information and second security level information, and indicating processing to be performed on the packet based on the comparing. The first security level information is stored in a security label of a packet received at a network node, while the second security level information is stored at the network node.Type: GrantFiled: October 29, 2003Date of Patent: November 16, 2010Assignee: Cisco Technology, Inc.Inventor: Michael R. Smith
-
Patent number: 7832006Abstract: The present disclosure provides a system and method configured to manage and facilitate network security. When a lack of security in a communication network is detected by a security agent or when a remote device requests security, a security profile can be determined by a security manager based on the detection or the request and the available network equipment. The security profile may contain numerous executable security objects that are selected based on the security issue and parameters of the specific network device(s) that will be implementing the security feature. The system and method may include a plurality of executable security objects configured to provide security for operations associated with multiple network devices communication over the network.Type: GrantFiled: August 9, 2005Date of Patent: November 9, 2010Assignee: AT&T Intellectual Property I, L.P.Inventors: Zesen Chen, Yongdong Zhao, Peter Chou, Brian A. Gonsalves, Michael Taylor
-
Patent number: 7827415Abstract: An image processing apparatus is disclosed including a document data analysis unit and an authentication unit. The document data analysis unit can identify policy data related to the authentication of a document based on information related to a document and/or the type of the document, identify items in document data to be verified, conversion to be performed on data of the items, and verification information contained in the document data based on the identified policy data, and perform the identified conversion on data of the identified items. The authentication unit can authenticate the document based on the data on which the identified conversion is performed and the identified verification information.Type: GrantFiled: April 6, 2005Date of Patent: November 2, 2010Assignee: Ricoh Company, Ltd.Inventor: Yoko Nishiyama
-
Patent number: 7827596Abstract: An apparatus and method authenticate computed results in a public distributed computing environment without the need for fully recomputing the results. The work unit is operated on by client code that computes one or more partial results along with the completed result. When the results are returned to the server, the server may decide to have a trusted computer system process the same work unit to compute the partial result according to a defined acceptance policy. In addition, the work unit name, user identity and current date are encrypted using a time-sensitive key. Should the server detect a problem with the results (e.g., decrypted work unit name does not match, recomputed partial result does not match), the results may be rejected according to a defined rejection policy. In this manner, it becomes very difficult to fool a server into thinking a work unit has been processed when it has not.Type: GrantFiled: August 25, 2005Date of Patent: November 2, 2010Assignee: International Business Machines CorporationInventor: Larry Wayne Loen
-
Patent number: 7818805Abstract: The present invention is directed to methods of and systems for adaptive networking that monitors a network resource of a network. The method monitors an application performance. The method categorizes a first subset of traffic of the network. The categories for the first subset include trusted, known to be bad, and suspect. The method determines an action for a second subset of traffic based on the category for the first subset of traffic. Some embodiments provide a system for adaptive networking that includes a first device and traffic that has a first subset and a second subset. The system also includes a first resource and a second resource for the transmission of the traffic. The first device receives the traffic and categorizes the traffic into the first and second subsets. The first device assigns the first subset to the first resource.Type: GrantFiled: September 25, 2008Date of Patent: October 19, 2010Assignee: Avaya Inc.Inventors: Michael A. Lloyd, Mansour J. Karam, Pierre Fraval, Sean P. Finn, James G. McGuire, Omar C. Baldonado
-
Patent number: 7806938Abstract: A method and apparatus are described that control the supply of electrical power to one or more components of a computing device. Other embodiments are described and claimed.Type: GrantFiled: June 16, 2005Date of Patent: October 5, 2010Assignee: Intel CorporationInventors: Eng Yeow Ng, Ze-Yng Cheong, Choon Hooi Khor
-
Patent number: 7802105Abstract: A method of securely storing and authenticating biometric data against attacks of a third party includes encoding input biometric data, and applying a one-way function to the encoded biometric data. A first exclusive OR operation is performed to the result of the one-way function and a selected secret key. The result of the first exclusive OR operation is encoded, and a second exclusive OR operation is performed to the encoded result of the first exclusive OR operation and the encoded biometric data. The result of the second exclusive OR operation is stored. In the same manner, the biometric data is authenticated. Accordingly, the biometric data can be securely stored against the attacks of a third party by processing and storing the biometric data according to a predetermined procedure.Type: GrantFiled: May 11, 2005Date of Patent: September 21, 2010Assignee: Samsung Electronics Co., Ltd.Inventors: Andrey L. Chmora, Alexei V. Ourivski
-
Patent number: 7801308Abstract: A device and method for protecting HDCP cryptographic keys are presented herein. The device and method include receiving a set of HDCP cryptographic keys, encoding the set of HDCP cryptographic keys such that the resultant encoded cryptographic data is enabled to be represented in rows and columns, and storing the set of keys in a storage device of an HDCP appliance in the rows and columns, wherein at least one of the rows does not include a complete cryptographic key and at least one of the columns does not include a complete cryptographic key. The method can use block interleaving or convolution interleaving encoding.Type: GrantFiled: July 17, 2006Date of Patent: September 21, 2010Assignee: Integrated Device Technology, Inc.Inventor: Chia Lun Hang
-
Patent number: 7793095Abstract: A system and methods for identity management and authentication are provided herein. The present invention employs shadow domains to prove entity membership in an identity management system where responsibility for trust relationships is devolved to the user. The present invention additionally teaches doubly signed certificate transmission for authentication of assertions made by third parties in the identity management network.Type: GrantFiled: June 6, 2003Date of Patent: September 7, 2010Inventor: Dick C. Hardt
-
Patent number: 7792287Abstract: We disclose methods and apparatuses for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption.Type: GrantFiled: October 30, 2007Date of Patent: September 7, 2010Assignee: Cryptography Research, Inc.Inventors: Paul C. Kocher, Joshua M. Jaffe
-
Patent number: 7784087Abstract: A system and method for the selective sharing of an electronic document. The method enables a user to share access to an electronic document stored on a repository on a document management system. A user, via a document processing services network, generates a password and token corresponding to the document to be shared. The token provides information regarding the electronic document to be shared and the way the shared document will be made available to other users. The user then gives the token along with the password to the other users desiring to have access to the shared document. The other users are then able to retrieve the electronic document via email, viewing on a web browser, or printing at a multifunction peripheral device.Type: GrantFiled: August 4, 2005Date of Patent: August 24, 2010Assignees: Toshiba Corporation, Toshiba Tec Kabushiki KaishaInventors: Sameer Yami, Peter Tran
-
Patent number: 7774606Abstract: A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The informational data is protected by a security methodology that is accessible to authorized entities. A reader device may be used to help make a verification determination of whether encrypted or encoded data has been altered. In some instances an output alert operably coupled to the reader device serves as a verification status indicator.Type: GrantFiled: December 12, 2006Date of Patent: August 10, 2010Assignee: The Invention Science Fund I, IncInventors: Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, John D. Rinaldo, Jr.
-
Patent number: 7757275Abstract: A domain controller (DC) side plugin supports one time passwords natively in Kerberos, Part of the key material is static and the other part is dynamic, thereby leveraging properties unique to each to securely support one time passwords in an operating system. The user is permitted to type in the one time passcode into a logon user interface. Rather than calling the SAM APIs to get the static passwords, vendors may register callbacks on the DC to plugin their algorithm. These callback functions will return the dynamically calculated passcodes for the user at a specific point in time. This passcode will then be treated as a normal password by the DC.Type: GrantFiled: June 15, 2005Date of Patent: July 13, 2010Assignee: Microsoft CorporationInventors: Christopher J. Crall, Karthik Jaganathan, Liqiang Zhu, Paul J. Leach
-
Patent number: 7739510Abstract: A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The informational data is protected by a security methodology that is accessible to authorized entities. A reader device may be used to help make a verification determination of whether encrypted or encoded data has been altered. In some instances an output alert operably coupled to the reader device serves as a verification status indicator.Type: GrantFiled: May 12, 2005Date of Patent: June 15, 2010Assignee: The Invention Science Fund I, IncInventors: Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, John D. Rinaldo, Jr.