Patents Examined by Abdulhakim Nobahar
  • Patent number: 7890772
    Abstract: A document processing device configured to communicate with a first device and a user input device. The document processing device includes a controller having memory. The controller is operable to receive a first communication from the first device. The first communication includes a job to be processed by the printing device and a first shortcut access code associated with the job. The first shortcut access code is stored in the memory of the controller. The controller is also operable to receive a second communication from the user input device. The second communication includes a second shortcut access code. The controller holds the job to be processed until the controller receives the second communication and verifies the second shortcut access code matches the first shortcut access code.
    Type: Grant
    Filed: August 10, 2005
    Date of Patent: February 15, 2011
    Assignee: Lexmark International, Inc.
    Inventors: Amanda Kay Bridges, William James Gardner Flowers, Charles Edward Grieshaber, Chad Eugene McQuillen, Michael Ray Timperman
  • Patent number: 7882539
    Abstract: Abstracting access control policy from access check mechanisms allows for richer expression of policy, using a declarative model with semantics, than what is permitted by the access check mechanisms. Further, abstracting access control policy allows for uniform expression of policy across multiple access check mechanisms. Proof-like reasons for any access query are provided, such as who has access to what resource, built from the policy statements themselves, independent of the access check mechanism that provide access. Access is audited and policy-based reasons for access are provided based on the access control policy.
    Type: Grant
    Filed: June 2, 2006
    Date of Patent: February 1, 2011
    Assignee: Microsoft Corporation
    Inventors: Muthukrishnan Paramasivam, Charles F. Rose, III, Dave M. McPherson, Raja Pazhanivel Perumal, Satyajit Nath, Paul J. Leach, Ravindra Nath Pandya
  • Patent number: 7865717
    Abstract: Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.
    Type: Grant
    Filed: July 18, 2006
    Date of Patent: January 4, 2011
    Assignee: Motorola, Inc.
    Inventors: George Calcev, Bogdan O Carbunar, Madjid F. Nakhjiri
  • Patent number: 7865938
    Abstract: A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).
    Type: Grant
    Filed: May 26, 2006
    Date of Patent: January 4, 2011
    Assignee: McAfee, Inc.
    Inventor: Majid Shahbazi
  • Patent number: 7856555
    Abstract: A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The informational data is protected by a security methodology that is accessible to authorized entities. A reader device may be used to help make a verification determination of whether encrypted or encoded data has been altered. In some instances an output alert operably coupled to the reader device serves as a verification status indicator.
    Type: Grant
    Filed: December 13, 2006
    Date of Patent: December 21, 2010
    Assignee: The Invention Science Fund I, LLC
    Inventors: Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, John D. Rinaldo, Jr.
  • Patent number: 7841003
    Abstract: A method for preventing phishing attacks is provided. The method in one aspect includes identifying a source image file that was used fraudulently, replacing the content of the source image file with a warning, and allowing the source image file having the warning to be accessed.
    Type: Grant
    Filed: May 4, 2005
    Date of Patent: November 23, 2010
    Assignee: Capital One Financial Corporation
    Inventor: Warner Allen Brandt Emdee
  • Patent number: 7836490
    Abstract: A method and apparatus for providing network security using security labeling is disclosed. The method includes comparing first security level information and second security level information, and indicating processing to be performed on the packet based on the comparing. The first security level information is stored in a security label of a packet received at a network node, while the second security level information is stored at the network node.
    Type: Grant
    Filed: October 29, 2003
    Date of Patent: November 16, 2010
    Assignee: Cisco Technology, Inc.
    Inventor: Michael R. Smith
  • Patent number: 7832006
    Abstract: The present disclosure provides a system and method configured to manage and facilitate network security. When a lack of security in a communication network is detected by a security agent or when a remote device requests security, a security profile can be determined by a security manager based on the detection or the request and the available network equipment. The security profile may contain numerous executable security objects that are selected based on the security issue and parameters of the specific network device(s) that will be implementing the security feature. The system and method may include a plurality of executable security objects configured to provide security for operations associated with multiple network devices communication over the network.
    Type: Grant
    Filed: August 9, 2005
    Date of Patent: November 9, 2010
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Zesen Chen, Yongdong Zhao, Peter Chou, Brian A. Gonsalves, Michael Taylor
  • Patent number: 7827415
    Abstract: An image processing apparatus is disclosed including a document data analysis unit and an authentication unit. The document data analysis unit can identify policy data related to the authentication of a document based on information related to a document and/or the type of the document, identify items in document data to be verified, conversion to be performed on data of the items, and verification information contained in the document data based on the identified policy data, and perform the identified conversion on data of the identified items. The authentication unit can authenticate the document based on the data on which the identified conversion is performed and the identified verification information.
    Type: Grant
    Filed: April 6, 2005
    Date of Patent: November 2, 2010
    Assignee: Ricoh Company, Ltd.
    Inventor: Yoko Nishiyama
  • Patent number: 7827596
    Abstract: An apparatus and method authenticate computed results in a public distributed computing environment without the need for fully recomputing the results. The work unit is operated on by client code that computes one or more partial results along with the completed result. When the results are returned to the server, the server may decide to have a trusted computer system process the same work unit to compute the partial result according to a defined acceptance policy. In addition, the work unit name, user identity and current date are encrypted using a time-sensitive key. Should the server detect a problem with the results (e.g., decrypted work unit name does not match, recomputed partial result does not match), the results may be rejected according to a defined rejection policy. In this manner, it becomes very difficult to fool a server into thinking a work unit has been processed when it has not.
    Type: Grant
    Filed: August 25, 2005
    Date of Patent: November 2, 2010
    Assignee: International Business Machines Corporation
    Inventor: Larry Wayne Loen
  • Patent number: 7818805
    Abstract: The present invention is directed to methods of and systems for adaptive networking that monitors a network resource of a network. The method monitors an application performance. The method categorizes a first subset of traffic of the network. The categories for the first subset include trusted, known to be bad, and suspect. The method determines an action for a second subset of traffic based on the category for the first subset of traffic. Some embodiments provide a system for adaptive networking that includes a first device and traffic that has a first subset and a second subset. The system also includes a first resource and a second resource for the transmission of the traffic. The first device receives the traffic and categorizes the traffic into the first and second subsets. The first device assigns the first subset to the first resource.
    Type: Grant
    Filed: September 25, 2008
    Date of Patent: October 19, 2010
    Assignee: Avaya Inc.
    Inventors: Michael A. Lloyd, Mansour J. Karam, Pierre Fraval, Sean P. Finn, James G. McGuire, Omar C. Baldonado
  • Patent number: 7806938
    Abstract: A method and apparatus are described that control the supply of electrical power to one or more components of a computing device. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 16, 2005
    Date of Patent: October 5, 2010
    Assignee: Intel Corporation
    Inventors: Eng Yeow Ng, Ze-Yng Cheong, Choon Hooi Khor
  • Patent number: 7802105
    Abstract: A method of securely storing and authenticating biometric data against attacks of a third party includes encoding input biometric data, and applying a one-way function to the encoded biometric data. A first exclusive OR operation is performed to the result of the one-way function and a selected secret key. The result of the first exclusive OR operation is encoded, and a second exclusive OR operation is performed to the encoded result of the first exclusive OR operation and the encoded biometric data. The result of the second exclusive OR operation is stored. In the same manner, the biometric data is authenticated. Accordingly, the biometric data can be securely stored against the attacks of a third party by processing and storing the biometric data according to a predetermined procedure.
    Type: Grant
    Filed: May 11, 2005
    Date of Patent: September 21, 2010
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Andrey L. Chmora, Alexei V. Ourivski
  • Patent number: 7801308
    Abstract: A device and method for protecting HDCP cryptographic keys are presented herein. The device and method include receiving a set of HDCP cryptographic keys, encoding the set of HDCP cryptographic keys such that the resultant encoded cryptographic data is enabled to be represented in rows and columns, and storing the set of keys in a storage device of an HDCP appliance in the rows and columns, wherein at least one of the rows does not include a complete cryptographic key and at least one of the columns does not include a complete cryptographic key. The method can use block interleaving or convolution interleaving encoding.
    Type: Grant
    Filed: July 17, 2006
    Date of Patent: September 21, 2010
    Assignee: Integrated Device Technology, Inc.
    Inventor: Chia Lun Hang
  • Patent number: 7793095
    Abstract: A system and methods for identity management and authentication are provided herein. The present invention employs shadow domains to prove entity membership in an identity management system where responsibility for trust relationships is devolved to the user. The present invention additionally teaches doubly signed certificate transmission for authentication of assertions made by third parties in the identity management network.
    Type: Grant
    Filed: June 6, 2003
    Date of Patent: September 7, 2010
    Inventor: Dick C. Hardt
  • Patent number: 7792287
    Abstract: We disclose methods and apparatuses for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: September 7, 2010
    Assignee: Cryptography Research, Inc.
    Inventors: Paul C. Kocher, Joshua M. Jaffe
  • Patent number: 7784087
    Abstract: A system and method for the selective sharing of an electronic document. The method enables a user to share access to an electronic document stored on a repository on a document management system. A user, via a document processing services network, generates a password and token corresponding to the document to be shared. The token provides information regarding the electronic document to be shared and the way the shared document will be made available to other users. The user then gives the token along with the password to the other users desiring to have access to the shared document. The other users are then able to retrieve the electronic document via email, viewing on a web browser, or printing at a multifunction peripheral device.
    Type: Grant
    Filed: August 4, 2005
    Date of Patent: August 24, 2010
    Assignees: Toshiba Corporation, Toshiba Tec Kabushiki Kaisha
    Inventors: Sameer Yami, Peter Tran
  • Patent number: 7774606
    Abstract: A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The informational data is protected by a security methodology that is accessible to authorized entities. A reader device may be used to help make a verification determination of whether encrypted or encoded data has been altered. In some instances an output alert operably coupled to the reader device serves as a verification status indicator.
    Type: Grant
    Filed: December 12, 2006
    Date of Patent: August 10, 2010
    Assignee: The Invention Science Fund I, Inc
    Inventors: Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, John D. Rinaldo, Jr.
  • Patent number: 7757275
    Abstract: A domain controller (DC) side plugin supports one time passwords natively in Kerberos, Part of the key material is static and the other part is dynamic, thereby leveraging properties unique to each to securely support one time passwords in an operating system. The user is permitted to type in the one time passcode into a logon user interface. Rather than calling the SAM APIs to get the static passwords, vendors may register callbacks on the DC to plugin their algorithm. These callback functions will return the dynamically calculated passcodes for the user at a specific point in time. This passcode will then be treated as a normal password by the DC.
    Type: Grant
    Filed: June 15, 2005
    Date of Patent: July 13, 2010
    Assignee: Microsoft Corporation
    Inventors: Christopher J. Crall, Karthik Jaganathan, Liqiang Zhu, Paul J. Leach
  • Patent number: 7739510
    Abstract: A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The informational data is protected by a security methodology that is accessible to authorized entities. A reader device may be used to help make a verification determination of whether encrypted or encoded data has been altered. In some instances an output alert operably coupled to the reader device serves as a verification status indicator.
    Type: Grant
    Filed: May 12, 2005
    Date of Patent: June 15, 2010
    Assignee: The Invention Science Fund I, Inc
    Inventors: Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, John D. Rinaldo, Jr.