Patents Examined by Angela Holmes
  • Patent number: 9092635
    Abstract: A secure portable electronic device for providing secure services when used in conjunction with a host computer. The secure portable device includes a read-only memory partition, a read/write memory partition, and a secure memory partition. The secure portable device includes instructions stored in the read-only partition including a host agent containing instructions executable by the host computer. The secure portable device also includes instructions stored in the secure memory partition. These instructions include a card agent containing instructions executable by central processing units secure portable electronic device, and includes a card agent communications module for communicating with the host agent; and a security module for accessing private information stored in the secure memory partition.
    Type: Grant
    Filed: March 30, 2007
    Date of Patent: July 28, 2015
    Assignee: Gemalto SA
    Inventors: Asad Ali, HongQian Karen Lu, Apostol Vassilev, Ed Dolph
  • Patent number: 9092646
    Abstract: Systems and methods for identifying consumer electronic products using a playback device with a product identifier in accordance with embodiments of the invention are disclosed. One embodiment includes a processor, and memory configured to store a product identifier, where the product identifier is associated with a specific product and is associated with cryptographic information, and user account data, where the user account data is associated with a user account. In addition, the processor is configured by an application to receive a request for registration from a playback device, receive a product identifier from the playback device, retrieve cryptographic information using the playback device, and send user account data to the playback device encrypted using at least the cryptographic information associated with the product identifier.
    Type: Grant
    Filed: March 31, 2012
    Date of Patent: July 28, 2015
    Assignee: Sonic IP, Inc.
    Inventors: Eric William Grab, Kourosh Soroushian, Tung Lin, Francis Yee-Dug Chan, Evan Wallin
  • Patent number: 9083716
    Abstract: There are provided a system and method for detecting Address Resolution Protocol (ARP) attacks. The ARP spoofing attack detection system includes: a reception module which receives an ARP packet, and which determines whether the received ARP packet is an unsolicited ARP packet; a transmission module which creates, if the ARP packet is an unsolicited ARP packet, an ARP request packet corresponding to the unsolicited ARP packet, and which broadcasts the ARP request packet; and a detection module which determines, if an ARP response packet corresponding to the ARP request packet is received, whether an input port of the ARP response packet is identical to an input port of the unsolicited ARP packet, and which determines that an ARP spoofing attack has occurred if the input port of the ARP response packet is not identical to the input port of the unsolicited ARP packet.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: July 14, 2015
    Assignee: SAMSUNG SDS CO., LTD.
    Inventor: Seong-Myun Cho
  • Patent number: 9076022
    Abstract: A biometric trait capture device includes a biometric trait capture sensor contained in a housing and configured to capture biometric data, such as a handwritten signature or other biometric trait(s) of a signor, in digitized form. A memory is provided in the housing and is not electronically accessible from outside of the housing. A value, such as an encryption key, is stored in the memory. A memory-erasure device erases or overwrites the value in response to an opening of the housing, thereby providing information indicating that the biometric trait capture device has possibly been tampered with by an unauthorized person.
    Type: Grant
    Filed: October 26, 2012
    Date of Patent: July 7, 2015
    Assignee: StepOver GmbH
    Inventor: Andreas Guenther
  • Patent number: 9065792
    Abstract: The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device has been automatically adapted to parameters associated with the wireless device without end-user input (e.g. the application has been configured in dependence on the device OS and firmware, related bugs, screen size, pixel number, security models, connection handling, memory etc. This application enables an end-user to browse and search music content on a remote server using a wireless network; to download music content from that remote server using the wireless network and to playback and manage that downloaded music content. The application also includes a digital rights management system that enables unlimited legal downloads of different music tracks to the device and also enables any of those tracks stored on the device to be played so long as a subscription service has not terminated.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: June 23, 2015
    Assignee: OMNIFONE LIMITED
    Inventors: Mark Stephen Knight, Michael Ian Lamb, Robert John Lewis, Stephen William Pocock, Philip Anthony Sant, Mark Peter Sullivan, Christopher John Evans
  • Patent number: 9065826
    Abstract: Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: June 23, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ryan Charles Colvin, Elliott Jeb Haber, Ameya Bhatawdekar, Anthony P. Penta
  • Patent number: 9059996
    Abstract: Systems and methods are used to provide distributed processing on a service provider network that includes a plurality of remotely located consumer devices. Each of the remotely located consumer devices includes a processing device. A service is provided from the service provider network to the remotely located consumer devices. Distributed processing of a task on the processing devices of the remotely located consumer devices occurs, the distributed processing being unrelated to the service provided to the consumers. The distributed processing occurs even when the processing devices are in use by corresponding remotely located consumer devices.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: June 16, 2015
    Assignee: CSC Holdings, LLC
    Inventors: Richard W. Neill, Leon Rivkin
  • Patent number: 9059989
    Abstract: Techniques for preventing unauthorized access to a server system using stolen passwords are provided. In one embodiment, the server system can store an ordered set of hash values for a user, where each hash value in the ordered set of hash values is generated by applying a hash function in an ordered set of hash functions to the user's password. The server system can further receive, from a client device, a login request for the user that includes a hashed version of the password, and can select a hash value in the ordered set of hash values using a server-side index that is synchronized with a client-side index on the client device. The server system can then grant the login request if the selected hash value matches the hashed version of the password.
    Type: Grant
    Filed: July 18, 2013
    Date of Patent: June 16, 2015
    Assignee: VMware, Inc.
    Inventor: Uday Kurkure
  • Patent number: 9054871
    Abstract: A device, including one or more Communication Physical Unclonable Function (CPUF) and key storage devices, the CPUF devices each including: a coherent Electromagnetic (EM) radiation source; a spatial light modulator (SLM) connected to the coherent EM radiation source; a volumetric scattering medium connected to the SLM; a detector connected to the volumetric scattering medium; and one or more processors or circuits connected to the detector and one or more processors or circuits connected to the SLM. A communication protocol is also provided.
    Type: Grant
    Filed: February 21, 2013
    Date of Patent: June 9, 2015
    Assignees: California Institute of Technology, London School of Hygiene & Tropical Medicine
    Inventors: Roarke Horstmeyer, Benjamin Judkewitz, Changhuei Yang, Ivo M. Vellekoop
  • Patent number: 9027127
    Abstract: A system and method is disclosed for affecting action associated with machine-generated traffic. First historical information associated with Internet traffic to an Internet service at a first time is accessed and a first Internet Protocol Address (“IPA”) size representing a first number of devices sharing at least one IP address that accessed the Internet service at the first time is determined. Second historical information associated with Internet traffic to the Internet service that occurred at a second time is accessed and a second IPA size is determined. An algorithm is applied that uses the first IPA size to estimate a third IPA size, representing a third number of devices sharing at least one IP address at the second time. A difference between the third and the second IPA sizes is computed, and evaluated to a threshold. An action is taken at a resource-provider system when the difference exceeds the threshold.
    Type: Grant
    Filed: December 4, 2012
    Date of Patent: May 5, 2015
    Assignee: Google Inc.
    Inventors: Fabio Soldo, Ahmed Metwally
  • Patent number: 9021254
    Abstract: A security system for defending online users against fraudsters and malicious websites comprises a back-end network server and appropriate apps for each protected user device. An otherwise conventional network server is enhanced with application software instructions for a centralized software-as-a-service (SaaS) to respond to network requests from user devices operating variously under ANDROID-type, APPLE IOS-type, and MICROSOFT WINDOWS-type operating systems. The SaaS investigates, surveys, and watches websites. It calculates confidence scores related to financial fraud and the acceptability and risk to said users of visiting particular websites. It maintains a trusted network database of website URL's calculated to belong to financial websites that can be trusted and present acceptable levels of fraud and financial risk to its visitors. Each user device application provides for secure password management and access via a security browser to websites in the trusted network.
    Type: Grant
    Filed: March 1, 2014
    Date of Patent: April 28, 2015
    Assignee: White Sky, Inc.
    Inventors: Konstantin Bokarius, Juan Gamez, Pankaj Srivastava
  • Patent number: 9009475
    Abstract: Apparatus and methods for storing and controlling access control clients. In one embodiment, transmitting and receiving devices ensure that only one copy of an eSIM is active at any time. Specifically, each transferred eSIM is encrypted for the destination device; the eSIM from the source device is deleted, deactivated, or otherwise rendered unusable. Various aspects of network infrastructure are also described, including electronic Universal Integrated Circuit Card (eUICC) appliances, and mobile devices. Various scenarios for transfer of eSIMs are also disclosed.
    Type: Grant
    Filed: April 25, 2011
    Date of Patent: April 14, 2015
    Assignee: Apple Inc.
    Inventors: Jerrold Von Hauck, David T. Haggerty, Kevin McLaughlin
  • Patent number: 9003485
    Abstract: A configuration service comprises a deployment package and a production configuration for a network security device. One or more configuration parameters of the production configuration may be defined by an administrator of the network security device (e.g., the customer). The network security device may be preconfigured with a network address and identifier. The network security device may be configured to automatically request and apply the deployment package at deployment time by use of the preconfigured network address and identifier. The network security device may automatically request and apply the production configuration from the configuration service in response to applying the deployment package.
    Type: Grant
    Filed: August 5, 2014
    Date of Patent: April 7, 2015
    Assignee: WatchGuard Technologies, Inc.
    Inventors: Nick Marvais, Sin-Yaw Wang, Lee W. Bothwell, Shari Marlie McLaren, Roger Brian Alan Klorese, Johnni M. Aguirre, William James Smith, Yong Wang, Han Zhang, Todd Alan Wallen
  • Patent number: 8990921
    Abstract: Method and apparatus for secure processing. The method includes detecting communication among secure and non-secure data entities, prohibiting execution of non-secure executable instructions on secure data entities unless the non-secure executable instructions are recorded in a permitted instruction record, and prohibiting execution of non-secure executable instructions if the non-secure executable instructions are recorded in a prohibited instruction record.
    Type: Grant
    Filed: February 21, 2013
    Date of Patent: March 24, 2015
    Assignee: Atheer, Inc.
    Inventor: Sleiman Itani
  • Patent number: 8984600
    Abstract: A method for associating a web event with a member of a group of users is implemented at a first computing device. The method includes: receiving a data access request from a second computing device; determining whether the user has previously provided personal information and authorization to the first computing device through the second computing device; if the user's personal information and authorization are found: generating a record for the data access request; if the user's personal information is found but the user's authorization is not found: generating a record for the data access request; and if neither of the user's personal information and authorization is found: identifying one or more user identifiers that are associated with the second computing device; and returning personal information associated with the one or more user identifiers to the second computing device.
    Type: Grant
    Filed: October 25, 2012
    Date of Patent: March 17, 2015
    Assignee: Google Inc.
    Inventor: Simon Michael Rowe
  • Patent number: 8984587
    Abstract: A system and method for managing communication. The system and method applying to but not limited to settop boxes (STBs) and other devices used to interface services. The management including any number of features and processes associated with achieving Quality of Service (QoS) across different domains and according to network limitations associated with the same.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: March 17, 2015
    Assignee: Comcast Cable Holdings, LLC
    Inventor: Mark D. Francisco
  • Patent number: 8954751
    Abstract: Techniques and apparatus for utilizing bits in a translation look aside buffer (TLB) table to identify and access security parameters to be used in securely accessing data are provided. Any type of bits in the TLB may be used, such as excess bits in a translated address, excess attribute bits, or special purpose bits added specifically for security purposes. In some cases, the security parameters may include an index into a key table for use in retrieving a set of one or more keys to use for encryption and/or decryption.
    Type: Grant
    Filed: November 4, 2004
    Date of Patent: February 10, 2015
    Assignee: International Business Machines Corporation
    Inventor: William E. Hall
  • Patent number: 8949985
    Abstract: A method, computer program product, and computer system for sending, by a first computing device, a payload from a plurality of payloads to a second computing device. A response from the second computing device responding to the payload is received at the first computing device. It is determined whether the payload has successfully attacked an application executing at the second computing device based upon, at least in part, the response. If not, at least a portion of the plurality of payloads that shares a structural overlap with the first payload is identified. At least a second payload of the portion is prevented from being sent to the second computing device in response to identifying that the second payload shares the structural overlap with the first payload.
    Type: Grant
    Filed: October 8, 2013
    Date of Patent: February 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Yair Amit, Adi Cohen, Lotem Guy, Alexander Landau, Omer Tripp, Avishai Vana, Omri Weisman
  • Patent number: 8943332
    Abstract: A method of establishing the integrity of an audit record set is described. The method comprises receiving a set of audit records and generating a first set of random values wherein each audit record in the set corresponds to at least one value of the first set. The method further comprises generating a second set of values based on an audit record and a corresponding value of the first set for each audit record in the set and generating a summary value based on the second set of values. The method further comprises certifying the summary value to generate an integrity certificate enabling verification of the integrity of the audit record set and storing the audit record set and at least one of the first set of values and the generated digital signature.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: January 27, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: William Horne, Stuart Haber, Tomas Sander
  • Patent number: 8943600
    Abstract: A method, computer program product, and system for transforming unit tests is described. A unit test associated with one or more software units is identified. A graphical representation of a portion of a computer program is built, wherein the graphical representation includes a control flow edge. A potentially vulnerable data flow associated with the control flow edge is identified. A control flow weight is assigned to the control flow edge, based upon, at least in part, identifying the potentially vulnerable data flow. A security analysis is applied to the portion of the computer program based upon, at least in part, the control flow weight.
    Type: Grant
    Filed: October 26, 2012
    Date of Patent: January 27, 2015
    Assignee: International Business Machines Corporation
    Inventor: Omer Tripp