Patents Examined by Arya Golriz
  • Patent number: 9177143
    Abstract: A disclosed method includes determining modifications have been made to a program and deriving data flow seeds that are affected by the modifications. The method includes selecting one of the data flow seeds that are affected by the modifications or data flow seeds that are not affected by the modifications but that are part of flows that are affected by the modifications and performing a security analysis on the program. The security analysis includes tracking flows emanating from the selected data flow seeds to sinks terminating the flows. The method includes outputting results of the security analysis. The results comprise one or more indications of security status for one or more of the flows emanating from the selected data flow seeds. At least the deriving, selecting, and performing are performed using a static analysis of the program. Apparatus and program products are also disclosed.
    Type: Grant
    Filed: May 17, 2013
    Date of Patent: November 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Omer Tripp, Marco Pistoia, Salvatore A. Guarnieri
  • Patent number: 9166959
    Abstract: Systems and methods may provide for implementing a secure communication using physical proximity. In one example, the method may include transmitting an encrypted first communication including a sensitive information file, decrypting the encrypted first communication to generate a decrypted first communication including the sensitive information file, displaying the decrypted first communication, capturing a version of the decrypted first communication displayed on the intermediary device, and extracting the sensitive information file at a user device.
    Type: Grant
    Filed: March 31, 2012
    Date of Patent: October 20, 2015
    Assignee: Intel Corporation
    Inventor: Jasmeet Chhabra
  • Patent number: 9160744
    Abstract: Methods, apparatus and articles of manufacture for increasing entropy for password and key generation on a mobile device are provided herein. A method includes establishing a pre-determined set of cryptographic information, wherein said pre-determined set of cryptographic information comprises one or more input elements and one or more interface input behavior metrics associated with the one or more input elements; generating a prompt via a computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against the pre-determined set of cryptographic information; and resolving the authentication request based on said processing.
    Type: Grant
    Filed: September 25, 2013
    Date of Patent: October 13, 2015
    Assignee: EMC Corporation
    Inventor: Salah Machani
  • Patent number: 9154459
    Abstract: A network access manager controls access to a network interface according to a set of access control instructions specifying permissible and impermissible addresses and domains on a network. The network access manager establishes a graylist of addresses based on a domain request that is associated with a whitelisted domain that is accessed via a blacklisted address. When a request to establish a connection is received directed to a graylisted address, the connection is permitted to establish and the connection is added to a session graylist. When a session data transfer packet is received, if the session corresponds to a session on the session graylist, the session data transfer packet is examined to determine if it matches a whitelisted domain, in which case the session is associated with a session whitelist and permitted access to the network. The access control instructions may be automatically updated from a trusted access control management system.
    Type: Grant
    Filed: September 25, 2013
    Date of Patent: October 6, 2015
    Assignee: Malwarebytes Corporation
    Inventors: Douglas Stuart Swanson, Daniel Young, John Moore
  • Patent number: 9143476
    Abstract: A classification system has a classification server that receives data for an email and determines if the email message is suspicious, legitimate but failing authentication, forwarded or fully authenticated and legitimate when the domains are owned, or not owned, by the domain owner. Email messages are categorized and presented in a report that enables the email sender to identify and fix a network, malicious traffic, and legitimate messages that have failed authentication beyond control. It also highlights where everything is going well.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 22, 2015
    Assignee: Return Path, Inc.
    Inventors: Bryan P. Dreller, Gregory J. Colburn, George M. Bilbrey
  • Patent number: 9135441
    Abstract: A disclosed method includes determining modifications have been made to a program and deriving data flow seeds that are affected by the modifications. The method includes selecting one of the data flow seeds that are affected by the modifications or data flow seeds that are not affected by the modifications but that are part of flows that are affected by the modifications and performing a security analysis on the program. The security analysis includes tracking flows emanating from the selected data flow seeds to sinks terminating the flows. The method includes outputting results of the security analysis. The results comprise one or more indications of security status for one or more of the flows emanating from the selected data flow seeds. At least the deriving, selecting, and performing are performed using a static analysis of the program. Apparatus and program products are also disclosed.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: September 15, 2015
    Assignee: International Business Machines Corporation
    Inventors: Omer Tripp, Marco Pistoia, Salvatore A. Guarnieri
  • Patent number: 9125049
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 1, 2015
    Assignee: Oplink Communications, Inc.
    Inventors: Longgang Huang, Keqin Gu, Tsungyen Chen, Yan Qi
  • Patent number: 9118718
    Abstract: Techniques for managing network connections are described. An apparatus may comprise a communications component operative to manage a connection for a client, the connection routed over a network and a traffic analysis component operative to determine one or more characteristics of the routing of the connection. Other embodiments are described and claimed.
    Type: Grant
    Filed: April 10, 2012
    Date of Patent: August 25, 2015
    Assignee: INTEL CORPORATION
    Inventors: Scott A. Krig, Madan Venugopal, Vishwa Hassan
  • Patent number: 9117067
    Abstract: A mobile information terminal includes a mode acquisition section adapted to acquire the mode of the mobile information terminal; a sample filling section adapted to, when the number of gripping feature samples acquired in a mode is insufficient, fill in lacking gripping feature samples with gripping feature samples acquired in another mode; a gripping-feature sample acquisition section adapted to acquire gripping feature samples; a switch adapted to switch the mobile information terminal between a learning state and an authentication state; a template learning section adapted to learn an authentication template in each mode using the gripping feature samples when the mobile information terminal is in the learning state; an authentication section adapted to compare the learned authentication template with gripping feature samples in each mode to perform authentication; and a locking section adapted to lock some or all of functions of the mobile information terminal when the authentication fails.
    Type: Grant
    Filed: January 27, 2012
    Date of Patent: August 25, 2015
    Assignee: NTT DOCOMO, INC
    Inventors: Manabu Ota, Masakatsu Tsukamoto, Yasuo Morinaga, Takeshi Higuchi
  • Patent number: 9092644
    Abstract: A method and system to provide an effective, scalable and yet low-cost solution for Confidentiality, Integrity and Replay protection for sensitive information stored in a memory and prevent an attacker from observing and/or modifying the state of the system. In one embodiment of the invention, the system has strong hardware protection for its memory contents via XTS-tweak mode of encryption where the tweak is derived based on “Global and Local Counters”. This scheme offers to enable die-area efficient Replay protection for any sized memory by allowing multiple counter levels and facilitates using small counter-sizes to derive the “tweak” used in the XTS encryption without sacrificing cryptographic strength.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: July 28, 2015
    Assignee: Intel Corporation
    Inventors: Alpa T. Narendra Trivedi, David M. Durham, Men Long, Siddhartha Chhabra, Uday R. Savagaonkar, Carlos V. Rozas
  • Patent number: 9081947
    Abstract: A password-less method for authenticating a user includes capturing one or more images of a face of the user and comparing the one or more images with a previously collected face template. Randomly selected colored light and randomized blinking patterns are used to capture the images of the user. Such captured images are compared to previously collected face templates, thereby thwarting spoof attacks. A secret image, known only to the user and the device, is moved from one area of the display to another randomly selected area, using the movements of the user's head or face, thereby providing a Turing based challenge. Protected audio video path (PAVP) enabled devices and components are used to protect the challenge from malware attacks.
    Type: Grant
    Filed: December 27, 2011
    Date of Patent: July 14, 2015
    Assignee: Intel Corporation
    Inventors: Prashant Dewan, David M. Durham, Ling Huang, Karanvir S. Grewal, Xiaozhu Kang
  • Patent number: 9083489
    Abstract: In accordance with an embodiment, the logical exclusive operation on the random number RAND and the OPc value are performed several times, the logical operation and encryption processing using a random number RAND and logical operation and encryption processing using a random number S are done in any order, which brings an increase of an attack complexity as to whether to calculate the correlation coefficient from the power consumption waveform at any point when analyzing the correlation power, whereby it is possible to defend the CPA attack effectively.
    Type: Grant
    Filed: July 16, 2013
    Date of Patent: July 14, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Seung Kwang Lee, Doo Ho Choi, Taesung Kim, Yong-Je Choi, Kyunghee Oh, Ju Han Kim
  • Patent number: 9065635
    Abstract: There is provided an information processing apparatus including an encrypted-ID generation section which encrypts a unique ID to generate an encrypted ID, the unique ID being set as an ID unique to the information processing apparatus, a communication section which sends the encrypted ID as ID information to be sent to another apparatus, an individualization code holding section which holds, in advance, an individualization code capable of being generated by decrypting the ID information in the other apparatus, and an access key generation section which generates an access key used for authentication with the other apparatus based on the individualization code held by the individualization code holding section.
    Type: Grant
    Filed: May 17, 2013
    Date of Patent: June 23, 2015
    Assignee: SONY CORPORATION
    Inventors: Hideo Yoshimi, Katsuya Shimoji