Abstract: A content sharing device may receive, from a content providing device, information that identifies content to be shared with a dongle device via a content sharing service. The content sharing device may receive, from the content providing device, information that identifies a contact with which the content is to be shared. The content sharing device may determine, based on the information that identifies the contact, a dongle device identifier. The dongle device identifier may include a network address associated with the dongle device. The content sharing device may provide, to the dongle device and based on determining the dongle device identifier, information that identifies the content. The information that identifies the content may cause the content to be accessible by a content receiving device connected to the dongle device.
Type:
Grant
Filed:
January 7, 2016
Date of Patent:
August 1, 2017
Assignee:
VERIZON PATENT AND LICENSING INC.
Inventors:
Nisheeth Gupta, Momin Mirza, Farooq Muzaffar, Neenu Sohi Kainth, Brian H. Whitton
Abstract: Certain embodiments employ an “out-of-band” mechanism to remove the physical controls for activating input peripherals from a portable device operating system and instead controlled by a separate peripheral control domain, isolated from the operating system domain by a machine virtualization/isolation technology. No additional hardware may be required. An adjunct I/O virtualization mechanism may also be included to abstract the guarded input peripheral interfaces, such that all attempts to turn them on from within the operating system are automatically redirected by the I/O virtualization mechanism to the peripheral control domain. The peripheral control domain may then conduct a policy-driven decision process to either allow, disallow, or request manual/explicit authorization of an access attempts. Physical access may be performed within the peripheral control domain.
Type:
Grant
Filed:
June 16, 2014
Date of Patent:
August 1, 2017
Assignee:
Green Hills Software, Inc.
Inventors:
Daniel O'Dowd, David Kleidermacher, Thomas Cantrell, Dennis Kou, Daniel Hettena
Abstract: Fraud and identity theft are enabled by two faulty assumptions about the way that the identity of a person is verified in our society. The first is that someone who demonstrates knowledge of certain items of personal or financial information about a particular person is presumed to be that person. The second assumption, which gives rise to the first assumption, is that these items of information can be kept confidential. Because fraudsters and identity thieves often seek to use their victim's personal and financial information, this invention proposes a direct authentication system and method that does not depend on these assumptions. The proposed method enables businesses to determine whether the customer is truly the person who he says he is by adopting a new “two-factor” authentication technique and authenticating customer's identity utilizing customer's trusted authenticator.
Abstract: An electronic lock in which new passcodes can be added and/or deleted without specifying the user slot to which the new passcode should be assigned. A circuit in the electronic lock determines whether the new passcode to be added is unique compared to existing passcodes stored in memory. If so, the circuit searches for an available user slot for which no authorized passcodes are associated and associates the new passcode with an available user slot.
Abstract: A schedule recording method includes the following steps: an authentication server receiving triggering information and then acquiring key information from the triggering information, the key information comprising an authentication code; acquiring an authentication window, and searching the authentication window for the authentication code; if the authentication code is found, extracting a time factor corresponding to the authentication code, and generating and storing an authentication code list and/or staff log.
Abstract: A device may determine that a user device should be authenticated; and determine a confidence measurement based on an established activity pattern of the user device. The confidence measurement may relate to a likelihood that an authorized user of the user device is in possession of the user device. The device may authenticate the user device based on the confidence measurement.
Type:
Grant
Filed:
March 25, 2014
Date of Patent:
June 27, 2017
Assignee:
Verizon Patent and Licensing Inc.
Inventors:
Rezwanul Azim, Rafael A. Gaviria, Gowtham Javaregowda, James J. Ni, Robert A. Sartini, Paul T. Schultz, Wenbo Su, Elliot G. Eichen
Abstract: An application processor circuit comprises an interface circuit configured to communicate with a separate modem device, a user application module configured to execute one or more user-installed applications, and a core application module configured to execute one or more core applications and to access one or more modem services on the modem device, using the interface circuit and an IP socket application protocol interface (API), wherein packets sent to the modem device for accessing the one or more modem services include a destination IP address corresponding to the modem device. The application processor circuit further comprises an IP filter module configured to identify and discard outbound packets that include a destination IP address corresponding to the modem device and that originate from any of one or more disallowed applications in the application processor, without sending the identified packets to the modem device.
Abstract: A UE communicates with a network gateway to access a provisioning device via a provisioning network. The provisioning device uses identification data of the UE to authenticate the UE for a primary network, and provides primary network configuration data to the UE. Using the primary network configuration data, the UE communicates with the network gateway to access the primary network. The primary network configuration data can include data to enable the UE to establish communications with one or more private networks accessible via the primary network.
Abstract: In one example embodiment, a remediating system may include a mobile communication device, to which an application is to be installed, and a remediator that may be configured to remediate the application and transmit the remediated version of the application to the mobile communication device for installation.
Abstract: Methods of providing policy based access to master keys, enabling keys to be distributed to groups of users in a secure manner while minimizing disruptions to the user in the event of changes to group membership or changes to user attributes. User attributes are identified. Policies are rewritten in terms of user attributes. New unique user attribute keys are generated for each attribute for each user. An access tree is constructed with user attribute keys as leaf nodes and Boolean algebra operations as internal nodes. Shamir polynomials are used for AND nodes, and broadcast polynomials are used for OR nodes. Master keys are accessible by traversing the access tree from the leaf nodes to the root node constructing the polynomials attached to all the nodes along the access path.
Abstract: A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. Secured Devices request content from the Distribution Hub, the Distribution Hub retrieves the content from the Data Warehouse, and then Distribution Hub manages the transfer of content to the Secured Devices. In some embodiments, Distribution Hub utilizes Content Filter to determine whether or not a particular Secured Device can access particular content.
Abstract: A computer-implemented method for detecting malware-induced crashes may include (1) identifying, by analyzing a health log associated with a previously stable computing device, the occurrence of an unexpected stability problem on the previously stable computing device, (2) identifying, by analyzing an event log associated with the previously stable computing device, an event that is potentially responsible for the occurrence of the unexpected stability problem on the previously stable computing device, (3) determining, due at least in part to the event being potentially responsible for the occurrence of the unexpected stability problem on the previously stable computing device, that the event is potentially malicious, and (4) performing a security action in response to determining that the event is potentially malicious. Various other methods, systems, and computer-readable media are also disclosed.
Type:
Grant
Filed:
December 23, 2013
Date of Patent:
May 30, 2017
Assignee:
Symantec Corporation
Inventors:
Kevin Roundy, Sandeep Bhatkar, Fanglu Guo, Daniel Marino
Abstract: Systems and methods for filtering unsafe content at a network security appliance are provided. According to one embodiment, a network security appliance captures network traffic and extracts a media file from the network traffic. The network security appliance then determines the presence of a hidden data item embedded in the media file in a machine-readable form. When such a hidden data item is identified, the network security appliance performs one or more actions on the media file based on a predefined security policy.
Abstract: Network interface devices with remote storage control. In some embodiments, a network interface device may include receiver circuitry and remote storage device control circuitry. The remote storage device control circuitry may be coupled to the receiver circuitry and may share a physical support with the receiver circuitry. The remote storage device control circuitry may be configured to control writing of data from the receiver circuitry to a remote storage device that does not share a physical support with the remote storage device control circuitry.
Type:
Grant
Filed:
March 18, 2015
Date of Patent:
May 23, 2017
Assignee:
Intel Corporation
Inventors:
Iosif Gasparakis, Scott P. Dubal, Patrick Connor, Kapil Sood, Eliezer Tamir
Abstract: A system is disclosed for enhancing detection of a security threat to a managed infrastructure device operating within a data center. The system may have a data center infrastructure management (DCIM) system for monitoring operation of the managed infrastructure device. The DCIM system may include a remote access appliance for communicating with the managed infrastructure device. The managed infrastructure device may include an on-board computer. The remote access appliance may include an engine configured to detect if information to be communicated to the on-board computer poses a security threat to the managed infrastructure device.
Type:
Grant
Filed:
November 20, 2012
Date of Patent:
May 23, 2017
Inventors:
Bharat A. Khuti, Steven Geffin, James Robinson, Mario Costa
Abstract: One example method for securing data on untrusted devices includes the steps of identifying, by a first process, a command in a command queue, the command from a second process and comprising an action on secure data; determining whether the command is permitted based on the action and a user credential; and responsive to determining the command is not permitted, removing, by the first process, the command from the command queue.
Abstract: Making a determination of originality of content is disclosed. At least one originality factor related to the content is analyzed, wherein the originality factor is independent of a time when the content is detected. Based on the analysis of the at least one originality factor, automatically the determination is automatically made. The determination is outputted.
Abstract: A token-based storage service may comprise a repository of key-value data. In response to a request to store a data item, the storage service may generate a token comprising a namespace and a unique identifier. The token may be used as a key to store and retrieve the data item from the repository. Requests to access the data may be validated based on ownership information stored with the data item and information indicative of the origin of the request for access. In response to a request to store a new version of the data item, a new token may be generated.
Type:
Grant
Filed:
June 17, 2015
Date of Patent:
May 9, 2017
Assignee:
Amazon Technologies, Inc.
Inventors:
Matthew Ross Sterling, Oscar Padilla, Thomas James Rader, Eric Dominique Gober, Scott Eric Geiser, Dimitar Todorov Zlatkov
Abstract: An apparatus and method are provided for enhancing resilience to attacks on reset of the apparatus. The apparatus comprises at least one storage element, and update circuitry that is configured to receive obscuring data, and which is responsive to a reset event to store in each of the at least one storage element a data value that is dependent on the current value of the obscuring data. For each such storage element, this ensures that the data value stored in that storage element is unpredictable following each reset event, thereby preventing the reproducibility of certain steps that would typically be taken by an attacker during an attack on the apparatus.
Type:
Grant
Filed:
September 8, 2014
Date of Patent:
May 9, 2017
Assignee:
ARM Limited
Inventors:
Yohann Fred Arifidy Rabefarihy, Carlo Dario Fanara, Stephane Zonza, Jean-Baptiste Brelot