Patents Examined by Aravind Moorthy
-
Patent number: 9021547Abstract: This disclosure is directed toward an integrated switching and routing security device that provides zone-based security directly between layer two (L2) interfaces of L2 bridge domains and/or layer three (L3) interfaces of L3 routing instances within the security device. The integrated switching and routing security device supports both switching and routing functionalities for packets on L2 and L3 interfaces, and supports security within and between L2 bridge domains and L3 routing instances. The integrated switching and routing security device configures L2 security zones for one or more L2 interfaces and configures L3 security zones for one or more L3 interfaces. The integrated switching and routing security device then applies security policies to incoming packets according to the L2 security zones and/or the L3 security zones associated with the incoming interface and an outgoing interface for the packets to provide end-to-end security within the security device.Type: GrantFiled: December 21, 2011Date of Patent: April 28, 2015Assignee: Juniper Networks, Inc.Inventors: Tsai-Zong Lin, Chih-Wei Chao, Jin Shang, Dongyi Jiang, Anchung Chung
-
Patent number: 9015791Abstract: A method of managing policy information in a mobile terminal by requesting an external policy management server for information about whether a change has been made to policy information and updating the policy information in a smart card web server of the mobile terminal to control access to resources based on the updated policy information.Type: GrantFiled: December 21, 2011Date of Patent: April 21, 2015Assignee: KT CorporationInventors: Hae Young Kim, Chae Un Kang, Young Min Lee, Un Hae Chun
-
Patent number: 9015844Abstract: Techniques for web application vulnerability scanning are disclosed. In one particular embodiment, the techniques may be realized as a method for web application vulnerability scanning comprising crawling a web application for content associated with the web application, generating a client security policy based on the content associated with the web application, and scanning the web application for vulnerabilities based on the client security policy.Type: GrantFiled: June 25, 2012Date of Patent: April 21, 2015Assignee: Symantec CorporationInventors: Jason Franklin, Yin Liu
-
Patent number: 9009793Abstract: The present invention provides cost efficient two way authentication method in which the authentication module can be provided as a Plug and Play (PnP) architecture enabling dual layer security with reduced cost where the actions are initiated by a server and user input is received through an audio session for added security. The second level authentication can be carried out with mobile as client device making it cost efficient. The invention can be hosted as an independent service or can be integrated with existing authentication mechanisms, making it elegant for usage.Type: GrantFiled: July 11, 2011Date of Patent: April 14, 2015Assignee: Infosys LimitedInventors: Sachin Prakash Sancheti, Sidharth Subhash Ghag
-
Patent number: 9009802Abstract: A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password.Type: GrantFiled: December 27, 2012Date of Patent: April 14, 2015Assignee: Ebay Inc.Inventor: Bjorn Markus Jakobsson
-
Patent number: 9002004Abstract: Embodiments of the present invention provide a test and measurement instrument that displays acquired data on a logarithmic scale without intensity banding. The test and measurement instrument processes the acquired data before it is displayed by appending pseudo-random sub-LSB (least significant bit) values to it. When the processed acquired data is displayed on a logarithmic scale, the pseudo-random sub-LSB values fill in the gaps between discrete power levels, thereby eliminating intensity banding and providing a smooth, visually pleasing display.Type: GrantFiled: April 13, 2011Date of Patent: April 7, 2015Assignee: Tektronix, Inc.Inventor: David Eby
-
Patent number: 9003529Abstract: An apparatus for identifying related code variants may include processing circuitry configured to execute instructions for receiving query binary code, processing the query binary code to generate one or more query code fingerprints comprising compressed representations of respective functional components of the query binary code, comparing the one or more query code fingerprints to at least some reference code fingerprints stored in a database to determine a similarity measure between the one or more query code fingerprints and at least some of the reference code fingerprints, and preparing at least one report based on the similarity measure.Type: GrantFiled: March 4, 2013Date of Patent: April 7, 2015Assignee: The Johns Hopkins UniversityInventors: Margaret F. Lospinuso, David M. Patrone, David P. Silberberg, Jonathan D. Cohen, Ryan W. Gardner, Laura J. Glendenning, Sakunthala Harshavardhana, Robert T. Hider, C. Durward McDonell, III, Dennis S. Patrone, Nathan S. Reller, Benjamin R. Salazar
-
Patent number: 9003517Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: GrantFiled: October 28, 2009Date of Patent: April 7, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C. LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Patent number: 9003493Abstract: Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein the task specifies a development tool and a user, and automatically authorizing, using a centralized data processing system, the user to access the development tool.Type: GrantFiled: June 26, 2012Date of Patent: April 7, 2015Assignee: International Business Machines CorporationInventors: Matthew G. Marum, Samuel G. Padgett, Steven K. Speicher, Michael J. Tabb
-
Patent number: 9003494Abstract: Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein the task specifies a development tool and a user, and automatically authorizing, using a centralized data processing system, the user to access the development tool.Type: GrantFiled: June 27, 2012Date of Patent: April 7, 2015Assignee: International Business Machines CorporationInventors: Matthew G. Marum, Samuel G. Padgett, Steven K. Speicher, Michael J. Tabb
-
Patent number: 8997192Abstract: A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM maintains one-time-password data and performs the one-time-password algorithm within a secure boundary associated with the TPM. In some embodiments the TPM generates one-time-password data structures and associated parent keys and manages the parent keys in the same manner it manages standard TPM keys.Type: GrantFiled: May 17, 2013Date of Patent: March 31, 2015Assignee: Broadcom CorporationInventors: Mark Buer, Douglas Allen
-
Patent number: 8997233Abstract: The subject disclosure is directed towards running script through a malware detection system including an emulator environment to detect any malware within the script. Statistics are collected as part of processing the script, with parameterized heuristic analysis used to determine whether to run the emulation. The processing through the malware detection system may be iterative, to de-obfuscate layers of obfuscated malware. The emulator may be updated via signatures.Type: GrantFiled: April 13, 2011Date of Patent: March 31, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Jonathon Patrick Green, Anjali Doulatram Chandnani, Simon David Christensen
-
Patent number: 8990567Abstract: A digital signature of a message originator of a message is validated by a processor on message retrieval by a message recipient as a first-tier validation of the message. In response to a successful first-tier validation of the digital signature of the message originator, a transaction token and a message originator identifier are extracted from a message payload of the message. Communication is initiated with a verification service within a secure messaging environment of the message originator as a second-tier validation of the message using the extracted transaction token and the extracted message originator identifier to confirm whether the secure messaging environment of the message originator generated the transaction token and inserted the transaction token into the message payload. Results of the second-tier validation of the message with the verification service within the secure messaging environment of the message originator are determined.Type: GrantFiled: June 7, 2013Date of Patent: March 24, 2015Assignee: International Business Machines CorporationInventors: Bret W. Dixon, Scot W. Dixon
-
Patent number: 8990562Abstract: An invention is described for securely deploying a provable identity for virtual machines (VMs) in a dynamic environment. In an embodiment, a fabric controller instructs a VM host to create a VM and sends that VM a secret. The fabric controller sends that same secret (or a second secret, such as the private key of a public/private key pair) to the security token service along with an instruction to make an account for the VM. The VM presents proof that it possesses the secret to the security token service and in return receives a full token. When a client connects to the deployment, it receives the public key from the security token service, which it trusts, and the full token from the VM. It validates the full token with the public key to determine that the VM has the identity that it purports to have.Type: GrantFiled: October 8, 2010Date of Patent: March 24, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Ian Jirka, Kahren Tevosyan, Corey Sanders, George M. Moore, Mohit Srivastava, Mark Eugene Russinovich
-
Patent number: 8984652Abstract: A device including a communication interface and processing logic is provided. The communication interface may receive digital rights management security information and content from a source device, the digital rights management information having been deactivated in the source device. The processing logic may reactivate the digital rights management security information and may render the content according to the digital rights management security information.Type: GrantFiled: January 29, 2007Date of Patent: March 17, 2015Assignees: Sony Corporation, Sony Mobile Comunications ABInventors: Peter Ljung, Stefan Andersson
-
Patent number: 8984286Abstract: A digital signature of a message originator of a message is validated by a processor on message retrieval by a message recipient as a first-tier validation of the message. In response to a successful first-tier validation of the digital signature of the message originator, a transaction token and a message originator identifier are extracted from a message payload of the message. Communication is initiated with a verification service within a secure messaging environment of the message originator as a second-tier validation of the message using the extracted transaction token and the extracted message originator identifier to confirm whether the secure messaging environment of the message originator generated the transaction token and inserted the transaction token into the message payload. Results of the second-tier validation of the message with the verification service within the secure messaging environment of the message originator are determined.Type: GrantFiled: June 28, 2012Date of Patent: March 17, 2015Assignee: International Business Machines CorporationInventors: Bret W. Dixon, Scot W. Dixon
-
Patent number: 8984287Abstract: A wireless personal area network access method based on the primitive, includes: a coordinator broadcasts a beacon frame to the device which requests connecting to the wireless personal area network (WPAN), the beacon frame includes the authentication request information for the device and the authentication and a key management tool supported by the coordinator; the device authenticates the authentication request information, when the coordinator has an authentication request to the device, the coordinator and the device execute the authentication based on the primitive and obtains the conversation key.Type: GrantFiled: January 14, 2009Date of Patent: March 17, 2015Assignee: China Iwncomm Co., Ltd.Inventors: Yuelei Xiao, Jun Cao, Xiaolong Lai, Zhenhai Huang, Bianling Zhang, Zhiqiang Qin, Qizhu Song
-
Patent number: 8984641Abstract: A method of tamper attempt reporting includes receiving a write attempt to configuration data stored within a field device in an industrial plant configured to run a process involving a plurality of physical process parameters including a network server, a plurality of processing units, and a plurality of field devices. The plurality of field devices include (i) a sensor for measuring at least one of the plurality of physical process parameters or (ii) an instrument for performing control output actions for at least one of the plurality of processing units. The plurality of field devices are in communication with at least one remote host system or device. The write attempt is automatically detected. An alert of the write attempt is automatically sent to at least the remote host system or device.Type: GrantFiled: October 10, 2012Date of Patent: March 17, 2015Assignee: Honeywell International Inc.Inventors: Vibhor Tandon, Joseph Pane
-
Patent number: 8983061Abstract: A method and apparatus cryptographically process data including a plurality of data segments. The cryptographic process includes (a) receiving a plurality of data segments, (b) selecting, for each data segment, a set of encryption information based on data contained in a predetermined portion of the data segment to be encrypted, and (c) encrypting each data segment using the set of encryption information selected for the data segment. At least one of an encryption algorithm, an encryption key, and an encryption parameter may be changed for each data segment based on the data contained in the predetermined portion. The predetermined portion may include a first predetermined portion for selecting a first set of encryption information, and a second predetermined portion for selecting a second set of encryption information, the encryption information including an encryption algorithm, an encryption key, and optionally an encryption parameter.Type: GrantFiled: February 13, 2004Date of Patent: March 17, 2015Assignee: IVI Holdings Ltd.Inventor: Masashi Watanabe
-
Patent number: RE45473Abstract: Based on the detailed reproduction control information defining the reproduction control state of data to be transmitted, the CPU 12 of the data transmission apparatus creates a simplified reproduction control information roughly defining the reproduction control state of the data, stores the simplified reproduction control information of the data in the packet header of a data packet carrying the data, stores the detailed reproduction control information in the data, and transmits the simplified reproduction control information and the detailed reproduction control information as well as the data to the data receiving apparatus 20 through the transmission channel 30 from the input-output interface 16.Type: GrantFiled: August 6, 2010Date of Patent: April 14, 2015Assignee: Sony CorporationInventors: Tomoyuki Asano, Yoshitomo Osawa, Teruyoshi Komuro, Ichiro Hamada