Patents Examined by Arya Golriz
-
Patent number: 9177143Abstract: A disclosed method includes determining modifications have been made to a program and deriving data flow seeds that are affected by the modifications. The method includes selecting one of the data flow seeds that are affected by the modifications or data flow seeds that are not affected by the modifications but that are part of flows that are affected by the modifications and performing a security analysis on the program. The security analysis includes tracking flows emanating from the selected data flow seeds to sinks terminating the flows. The method includes outputting results of the security analysis. The results comprise one or more indications of security status for one or more of the flows emanating from the selected data flow seeds. At least the deriving, selecting, and performing are performed using a static analysis of the program. Apparatus and program products are also disclosed.Type: GrantFiled: May 17, 2013Date of Patent: November 3, 2015Assignee: International Business Machines CorporationInventors: Omer Tripp, Marco Pistoia, Salvatore A. Guarnieri
-
Patent number: 9166959Abstract: Systems and methods may provide for implementing a secure communication using physical proximity. In one example, the method may include transmitting an encrypted first communication including a sensitive information file, decrypting the encrypted first communication to generate a decrypted first communication including the sensitive information file, displaying the decrypted first communication, capturing a version of the decrypted first communication displayed on the intermediary device, and extracting the sensitive information file at a user device.Type: GrantFiled: March 31, 2012Date of Patent: October 20, 2015Assignee: Intel CorporationInventor: Jasmeet Chhabra
-
Patent number: 9160744Abstract: Methods, apparatus and articles of manufacture for increasing entropy for password and key generation on a mobile device are provided herein. A method includes establishing a pre-determined set of cryptographic information, wherein said pre-determined set of cryptographic information comprises one or more input elements and one or more interface input behavior metrics associated with the one or more input elements; generating a prompt via a computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against the pre-determined set of cryptographic information; and resolving the authentication request based on said processing.Type: GrantFiled: September 25, 2013Date of Patent: October 13, 2015Assignee: EMC CorporationInventor: Salah Machani
-
Patent number: 9154459Abstract: A network access manager controls access to a network interface according to a set of access control instructions specifying permissible and impermissible addresses and domains on a network. The network access manager establishes a graylist of addresses based on a domain request that is associated with a whitelisted domain that is accessed via a blacklisted address. When a request to establish a connection is received directed to a graylisted address, the connection is permitted to establish and the connection is added to a session graylist. When a session data transfer packet is received, if the session corresponds to a session on the session graylist, the session data transfer packet is examined to determine if it matches a whitelisted domain, in which case the session is associated with a session whitelist and permitted access to the network. The access control instructions may be automatically updated from a trusted access control management system.Type: GrantFiled: September 25, 2013Date of Patent: October 6, 2015Assignee: Malwarebytes CorporationInventors: Douglas Stuart Swanson, Daniel Young, John Moore
-
Patent number: 9143476Abstract: A classification system has a classification server that receives data for an email and determines if the email message is suspicious, legitimate but failing authentication, forwarded or fully authenticated and legitimate when the domains are owned, or not owned, by the domain owner. Email messages are categorized and presented in a report that enables the email sender to identify and fix a network, malicious traffic, and legitimate messages that have failed authentication beyond control. It also highlights where everything is going well.Type: GrantFiled: March 15, 2013Date of Patent: September 22, 2015Assignee: Return Path, Inc.Inventors: Bryan P. Dreller, Gregory J. Colburn, George M. Bilbrey
-
Patent number: 9135441Abstract: A disclosed method includes determining modifications have been made to a program and deriving data flow seeds that are affected by the modifications. The method includes selecting one of the data flow seeds that are affected by the modifications or data flow seeds that are not affected by the modifications but that are part of flows that are affected by the modifications and performing a security analysis on the program. The security analysis includes tracking flows emanating from the selected data flow seeds to sinks terminating the flows. The method includes outputting results of the security analysis. The results comprise one or more indications of security status for one or more of the flows emanating from the selected data flow seeds. At least the deriving, selecting, and performing are performed using a static analysis of the program. Apparatus and program products are also disclosed.Type: GrantFiled: September 12, 2013Date of Patent: September 15, 2015Assignee: International Business Machines CorporationInventors: Omer Tripp, Marco Pistoia, Salvatore A. Guarnieri
-
Patent number: 9125049Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client.Type: GrantFiled: March 15, 2013Date of Patent: September 1, 2015Assignee: Oplink Communications, Inc.Inventors: Longgang Huang, Keqin Gu, Tsungyen Chen, Yan Qi
-
Patent number: 9118718Abstract: Techniques for managing network connections are described. An apparatus may comprise a communications component operative to manage a connection for a client, the connection routed over a network and a traffic analysis component operative to determine one or more characteristics of the routing of the connection. Other embodiments are described and claimed.Type: GrantFiled: April 10, 2012Date of Patent: August 25, 2015Assignee: INTEL CORPORATIONInventors: Scott A. Krig, Madan Venugopal, Vishwa Hassan
-
Patent number: 9117067Abstract: A mobile information terminal includes a mode acquisition section adapted to acquire the mode of the mobile information terminal; a sample filling section adapted to, when the number of gripping feature samples acquired in a mode is insufficient, fill in lacking gripping feature samples with gripping feature samples acquired in another mode; a gripping-feature sample acquisition section adapted to acquire gripping feature samples; a switch adapted to switch the mobile information terminal between a learning state and an authentication state; a template learning section adapted to learn an authentication template in each mode using the gripping feature samples when the mobile information terminal is in the learning state; an authentication section adapted to compare the learned authentication template with gripping feature samples in each mode to perform authentication; and a locking section adapted to lock some or all of functions of the mobile information terminal when the authentication fails.Type: GrantFiled: January 27, 2012Date of Patent: August 25, 2015Assignee: NTT DOCOMO, INCInventors: Manabu Ota, Masakatsu Tsukamoto, Yasuo Morinaga, Takeshi Higuchi
-
Patent number: 9092644Abstract: A method and system to provide an effective, scalable and yet low-cost solution for Confidentiality, Integrity and Replay protection for sensitive information stored in a memory and prevent an attacker from observing and/or modifying the state of the system. In one embodiment of the invention, the system has strong hardware protection for its memory contents via XTS-tweak mode of encryption where the tweak is derived based on “Global and Local Counters”. This scheme offers to enable die-area efficient Replay protection for any sized memory by allowing multiple counter levels and facilitates using small counter-sizes to derive the “tweak” used in the XTS encryption without sacrificing cryptographic strength.Type: GrantFiled: December 28, 2011Date of Patent: July 28, 2015Assignee: Intel CorporationInventors: Alpa T. Narendra Trivedi, David M. Durham, Men Long, Siddhartha Chhabra, Uday R. Savagaonkar, Carlos V. Rozas
-
Patent number: 9081947Abstract: A password-less method for authenticating a user includes capturing one or more images of a face of the user and comparing the one or more images with a previously collected face template. Randomly selected colored light and randomized blinking patterns are used to capture the images of the user. Such captured images are compared to previously collected face templates, thereby thwarting spoof attacks. A secret image, known only to the user and the device, is moved from one area of the display to another randomly selected area, using the movements of the user's head or face, thereby providing a Turing based challenge. Protected audio video path (PAVP) enabled devices and components are used to protect the challenge from malware attacks.Type: GrantFiled: December 27, 2011Date of Patent: July 14, 2015Assignee: Intel CorporationInventors: Prashant Dewan, David M. Durham, Ling Huang, Karanvir S. Grewal, Xiaozhu Kang
-
Patent number: 9083489Abstract: In accordance with an embodiment, the logical exclusive operation on the random number RAND and the OPc value are performed several times, the logical operation and encryption processing using a random number RAND and logical operation and encryption processing using a random number S are done in any order, which brings an increase of an attack complexity as to whether to calculate the correlation coefficient from the power consumption waveform at any point when analyzing the correlation power, whereby it is possible to defend the CPA attack effectively.Type: GrantFiled: July 16, 2013Date of Patent: July 14, 2015Assignee: Electronics and Telecommunications Research InstituteInventors: Seung Kwang Lee, Doo Ho Choi, Taesung Kim, Yong-Je Choi, Kyunghee Oh, Ju Han Kim
-
Patent number: 9065635Abstract: There is provided an information processing apparatus including an encrypted-ID generation section which encrypts a unique ID to generate an encrypted ID, the unique ID being set as an ID unique to the information processing apparatus, a communication section which sends the encrypted ID as ID information to be sent to another apparatus, an individualization code holding section which holds, in advance, an individualization code capable of being generated by decrypting the ID information in the other apparatus, and an access key generation section which generates an access key used for authentication with the other apparatus based on the individualization code held by the individualization code holding section.Type: GrantFiled: May 17, 2013Date of Patent: June 23, 2015Assignee: SONY CORPORATIONInventors: Hideo Yoshimi, Katsuya Shimoji