Patents Examined by Amir Mehrmanesh
-
Patent number: 8988609Abstract: A non-transitory computer readable storage medium stores one or more computer programs adapted to cause a processor based system to execute steps that include analyzing an image, identifying one or more faces in the image using a face recognition technique, designating at least one of the identified faces collectively as a first area of interest, and determining whether an insertion area exists in the image where additional content can be inserted without obstructing the first area of interest. Another computer program is adapted to cause a processor based system to execute steps that include determining whether the insertion area can be divided into two or more regions based on color. Methods and processor based apparatuses that perform one or more of these steps are also disclosed.Type: GrantFiled: February 7, 2014Date of Patent: March 24, 2015Assignee: Sony Computer Entertainment America LLCInventor: Gary M. Zalewski
-
Patent number: 8959633Abstract: The behavior of a group of resources, such as a fleet of servers, can be monitored to attempt to determine a baseline of acceptable behaviors. When a behavior is observed, the baseline can be consulted to determine whether the behavior is indicated to be acceptable. If not, the rate or extent at which the newly observed behavior is observed on groupings of similar resources can be monitored. This information can be used to determine whether the behavior is acceptable in which case information for the observed behavior can be used to automatically update the baseline such that the baseline is representative of current acceptable behavior within the group of resources.Type: GrantFiled: March 14, 2013Date of Patent: February 17, 2015Assignee: Amazon Technologies, Inc.Inventors: Aaron Douglas Dokey, Ian Roger Searle, Eric Jason Brandwine
-
Patent number: 8959576Abstract: Method, apparatus, and system for qualifying CPU transactions with security attributes. Immutable security attributes are generated for transactions initiator by a CPU or processor core that identifying the execution mode of the CPU/core being trusted or untrusted. The transactions may be targeted to an Input/Output (I/O) device or system memory via which a protected asset may be accessed. Policy enforcement logic blocks are implemented at various points in the apparatus or system that allow or deny transactions access to protected assets based on the immutable security attributes generated for the transactions. In one aspect, a multiple-level security scheme is implemented under which a mode register is updated via a first transaction to indicate the CPU/core is operating in a trusted execution mode, and security attributes are generated for a second transaction using execution mode indicia in the mode register to verify the transaction is from a trusted initiator.Type: GrantFiled: March 14, 2013Date of Patent: February 17, 2015Assignee: Intel CorporationInventors: Manoj R. Sastry, Ioannis T. Schoinas, Daniel M. Cermak
-
Patent number: 8959620Abstract: A method for composing an authentication password associated with an electronic device is implemented by a password composing system including a display, a receiving unit, and a processing unit. In the method, the display is configured to display a start point, and a plurality of displayed paths. The receiving unit is configured to detect a set of user-input movements of a contact point at the display. The processing unit is configured to determine whether the user-input movements conform with a predefined valid user-input gesture, store a plurality of codes corresponding to the valid user-input gestures, and to compose the authentication password according to valid ones of the series of the user-input movements.Type: GrantFiled: March 14, 2013Date of Patent: February 17, 2015Assignee: Mitac International Corp.Inventors: Ching-Teng Hsueh, Hui-Chun Yang
-
Patent number: 8959357Abstract: A system, method and program product for generating a private key. A system is disclosed that includes a signal acquisition system for obtaining biometric input from a user and encoding the biometric input into an acquired biometric; a recognition system for determining an identity based on the acquired biometric and outputting an absolute biometric associated with the identity; an input device for accepting a knowledge input from the user; and a key generator that generates a private key based on the knowledge input and the absolute biometric.Type: GrantFiled: July 15, 2010Date of Patent: February 17, 2015Assignee: International Business Machines CorporationInventor: Aaron Keith Baughman
-
Patent number: 8949605Abstract: Content is transmitted within a range of the user's legitimate use while limiting the number of equipment to which the content is transmitted at the same time. A content using apparatus periodically transmits an exchange key and the corresponding key ID using a command. Only while receiving the key ID at predetermined reception cycles, a content providing apparatus maintains the corresponding exchange key. When not periodically receiving the key ID, the content providing apparatus destroys the corresponding exchange key. After that, when receiving a command including the key ID, the content providing apparatus returns a response including information indicating that the exchange key has become invalid.Type: GrantFiled: June 2, 2011Date of Patent: February 3, 2015Assignee: Sony CorporationInventor: Takehiko Nakano
-
Patent number: 8949981Abstract: Techniques for providing protection against unsafe links on a social networking website are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for providing protection against unsafe links on a social networking website comprising: receiving, from the social networking website, user profile data associated with a user of the social networking website, scanning, from the user profile data, a plurality of links, accessing a safety rating for each of the plurality of links, and outputting, to a client device associated with the user, a link analysis report that indicates the safety rating of one or more of the plurality of links.Type: GrantFiled: February 28, 2011Date of Patent: February 3, 2015Assignee: Symantec CorporationInventors: Rowan Trollope, Chandrasekhar Cidambi, Lipphei Adam, Caskey L. Dickson
-
Patent number: 8935774Abstract: Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.Type: GrantFiled: May 14, 2012Date of Patent: January 13, 2015Assignee: Microsoft CorporationInventors: Jim Tom Belesiu, Gene Robert Obie, James Charles Marshall, Robert D. Young, Nathan C. Sherman, Edward C. Giaimo, III, David Neff, Jose R. Sousa
-
Patent number: 8929542Abstract: It is an object of this invention to implement a predicate encryption scheme with delegation capability. A cryptographic process is performed using dual vector spaces (dual distortion vector spaces) of a space V and a space V* paired through a pairing operation. An encryption device generates as a cipher vector a vector of the space V, the cipher vector being a vector in which transmission information is embedded. Using a predetermined vector of the space V* as a key vector, a decryption device performs the pairing operation on the cipher vector generated by the encryption device and the key vector to decrypt the cipher vector and to extract information concerning the transmission information. In particular, the encryption device and the decryption device perform the cryptographic process without using some dimensions of the space V and the space V*.Type: GrantFiled: December 20, 2010Date of Patent: January 6, 2015Assignees: Mitsubishi Electric Corporation, Nippon Telegraph and Telephone CorporationInventors: Katsuyuki Takashima, Tatsuaki Okamoto
-
Patent number: 8925053Abstract: An authentication technique involves receiving an authentication request which includes a set of authentication factors and performing, in response to the authentication request, an authentication operation based on a set of authentication factors. An authentication result of the authentication operation identifies a particular trust category among a set of trust categories. Each trust category of the set defines a unique set of user permissions. The technique further involves providing the authentication result for use by a web application. The particular trust category identified by the authentication result defines a particular set of user permissions to be imposed by the web application. For example, the trust categories may take the form of trust levels such as Low, Med, and High which control access to certain resources.Type: GrantFiled: May 16, 2012Date of Patent: December 30, 2014Assignee: EMC CorporationInventor: Nirav Mehta
-
Patent number: 8913751Abstract: A key management and node authentication method for a sensor network is disclosed. The method comprises the following steps of: 1) keys pre-distribution: before deploying the network, communication keys for establishing security connection between nodes are pre-distributed to all of nodes by a deployment server. 2) Keys establishment: after deploying the network, a pair key for the security connection is established between nodes, which includes the following steps of: 2.1) establishment of shared keys: the pair key is established between neighbor nodes in which the shared keys are existed; 2.2) path keys establishment: the pair key is established between the nodes in which there is no shared keys but there is a multi-hop security connection. 3) Node identity (ID) authentication: before formally communicating between nodes, the identity is authenticated so as to determine the legality and the validity of the identity of the other.Type: GrantFiled: June 2, 2010Date of Patent: December 16, 2014Assignee: China IWNCOMM Co. Ltd.Inventors: Zhiqiang Du, Jun Cao, Manxia Tie, Zhenhai Huang
-
Patent number: 8887285Abstract: Heterogeneous sensors simultaneously inspect network traffic for attacks. A signature-based sensor detects known attacks but has a blind spot, and a machine-learning based sensor that has been trained to detect attacks in the blind spot detects attacks that fail to conform to normal network traffic. False positive rates of the machine-learning based sensor are reduced by iterative testing using statistical techniques.Type: GrantFiled: March 14, 2013Date of Patent: November 11, 2014Assignee: Resurgo, LLCInventors: Eamon Hirata Jordan, Evan Joseph Kelly, Kevin Barry Jordan
-
Patent number: 8881286Abstract: A method and device for clustering virus files is provided. The method involves statically analyzing binary data of virus files to be clustered, so as to obtain PE structure data of the virus files. Further, based on a comparison of the PE structure data, those virus files with PE structure data meeting a specific similarity may be categorized into the same category. The device may include a first data analyzing module configured to extract PE structure data of virus files to be clustered by static analysis of binary data of the virus files. A first clustering module of the device may compare the PE structure data and cluster the virus files having the PE structure data meeting a specific similarity into the same category. The solution may improve efficiency of clustering computer virus files, reduce resource consumption, and avoid the risk of virus infection caused by dynamically running the virus files.Type: GrantFiled: July 3, 2012Date of Patent: November 4, 2014Assignee: Tencent Technology (Shenzhen) Company LimitedInventor: Tao Yu
-
Patent number: 8880887Abstract: Provided are system, methods, and computer-readable media for systems, methods, and computer-readable media for secure digital communications and networks. The system provides for secure communication between nodes through the use of a subscription between two nodes based on unique identifiers that are unique to each node, and communication between nodes without a subscription may be blocked. Additionally, secure communications between a node and a remote node are dynamically encrypted using asymmetric and symmetric encryption. The encryption algorithms and key lengths may be changed at each subsequent negotiation between a node and a remote node.Type: GrantFiled: March 14, 2013Date of Patent: November 4, 2014Assignee: STT LLC.Inventor: Matthew Tyrone Armatis
-
Patent number: 8881264Abstract: A method for controlling the execution of an applet for an IC Card including a java card platform, includes a phase for downloading the applet inside the IC Card, a phase for executing the applet through the java card platform and a phase for storing an identification platform number inside a memory portion of the IC Card. The phase for executing the applet has a first step for detecting the identification platform number to perform the phase for executing the applet with or without restrictions, respectively if the identification platform number is not or is detected by the step for detecting. The applet is a java card applet or a SIM toolkit applet.Type: GrantFiled: May 16, 2008Date of Patent: November 4, 2014Assignee: STMicroelectronics International N.V.Inventor: Maria Chichierchia
-
Patent number: 8875302Abstract: A computer receives an electronic document that includes a group of terms. The computer sends the electronic document to an information extraction program that extracts specific terms from the group of terms. Each of the specific terms that match to a certain extent with one of the attribute values in an electronic dictionary is identified. A value associated with the electronic document is generated based on the specific terms that match, and on an end-user that is attempting to access the electronic document.Type: GrantFiled: May 15, 2012Date of Patent: October 28, 2014Assignee: International Business Machines CorporationInventors: Sheshnarayan Agrawal, Prasad M. Deshpande, Mukesh K. Mohania, Karin Murthy, Deepak S. Padmanabhan
-
Patent number: 8875266Abstract: A virtualization system supports secure, controlled execution of application programs within virtual machines. The virtual machine encapsulates a virtual hardware platform and guest operating system executable with respect to the virtual hardware platform to provide a program execution space within the virtual machine. An application program, requiring license control data to enable execution of the application program, is provided within the program execution space for execution within the virtual machine. A data store providing storage of encrypted policy control information and the license control data is provided external to the virtual machine. The data store is accessed through a virtualization system including a policy controller that is selectively responsive to a request received from the virtual machine to retrieve the license control data dependent on an evaluation of the encrypted policy control information.Type: GrantFiled: May 16, 2008Date of Patent: October 28, 2014Assignee: VMware, Inc.Inventors: Benjamin A. Chambers, Matthew D. Ginzton
-
Patent number: 8868911Abstract: The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps: assigning each member an identification vector containing common group identification vector elements and an individual identification vector element, and generating an authentication vector and an access control vector for each member according to the identification vector; using the identification vector elements to generate public key elements and establish an authentication public key and an access control public key; and using a polynomial and the identification vector to generate a private key. The present invention uses these public keys and private keys, which are generated from the identification vectors, to implement serverless member authentication and data access control, whereby is protected privacy of members and promoted security of communication.Type: GrantFiled: May 15, 2012Date of Patent: October 21, 2014Assignee: National Chiao Tung UniversityInventors: Chien-Chao Tseng, Tzu-Hsin Ho
-
Methods, apparatuses, and computer program products for bootstrapping device and user authentication
Patent number: 8869252Abstract: An apparatus may include a processor configured to receive a security certificate request from a remote device comprising a public key of the remote device and an authentication credential based upon a legacy authentication mechanism of the remote device. The processor may be further configured to validate the received authentication credential in accordance with the legacy authentication mechanism. The processor may be additionally configured to generate a security certificate for the public key. The processor may be further configured to provide the generated security certificate to the remote device.Type: GrantFiled: May 19, 2008Date of Patent: October 21, 2014Assignee: Nokia CorporationInventors: Nadarajah Asokan, Jan-Erik Ekberg, Antti Kiiveri, Olli Muukka -
Patent number: 8863301Abstract: A computer receives an electronic document that includes a group of terms. The computer sends the electronic document to an information extraction program that extracts specific terms from the group of terms. Each of the specific terms that match to a certain extent with one of the attribute values in an electronic dictionary is identified. A value associated with the electronic document is generated based on the specific terms that match, and on an end-user that is attempting to access the electronic document.Type: GrantFiled: May 28, 2013Date of Patent: October 14, 2014Assignee: International Business Machines CorporationInventors: Sheshnarayan Agrawal, Prasad M. Deshpande, Mukesh K. Mohania, Karin Murthy, Deepak S. Padmanabhan