Patents Examined by Aubrey Wyszynski
  • Patent number: 9715601
    Abstract: Systems, methods and computer-readable mediums are disclosed for providing secure access in a microcontroller system. In some implementations, a microcontroller system comprises a system bus and a secure central processing unit (CPU) coupled to the system bus. The secure CPU is configured to provide secure access to the system bus. A non-secure CPU is also coupled to the system bus and is configured to provide non-secure access to the system bus. A non-secure memory is coupled to the system bus and is configured to allow the secure CPU and the non-secure CPU to exchange data and communicate with each other. A peripheral access controller (PAC) is coupled to the system bus and configured to enable secure access to a peripheral by the secure CPU while disabling non-secure access to the peripheral based upon a non-secure state of the non-secure CPU.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: July 25, 2017
    Assignee: Atmel Corporation
    Inventor: Frode Milch Pedersen
  • Patent number: 9705900
    Abstract: The present disclosure relates to methods and devices for mitigating the impact from Internet attacks in a Radio Access Network, RAN, using Internet transport. This object is obtained by a method performed in network node in a RAN, using Internet transport. The method comprises obtaining intrusion detection information informing the network node that the RAN is under attack. The method further comprises selecting, based on the intrusion detection information, a mitigation action, the mitigation action mitigating the impact of the attack on the RAN service. Further the method comprises performing the selected mitigation action to mitigate the impact on the RAN service level.
    Type: Grant
    Filed: February 9, 2015
    Date of Patent: July 11, 2017
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Tomas Thyni, Mats Forsman, Mats Ullerstig
  • Patent number: 9705930
    Abstract: A method and system for securing a VXLAN environment, including configuring a default network policy, associated with interfaces of the network device, for dropping all VXLAN frames including a VXLAN attribute; obtaining, by the network device, registered VTEP identifiers; determining, using the registered VTEP identifiers, that an interface of the network device is operatively connected to a registered VTEP associated with a registered VTEP identifier; disassociating the default network policy from the interface based on the determination; receiving, at the interface, a frame; performing a first verification that the frame is a VXLAN frame by examining the frame to determine that the frame includes the VXLAN attribute; performing a second verification to determine that the VXLAN frame includes a registered VTEP identifier; allowing, based on the first verification and the second verification, the network device to process the VXLAN frame; and processing the VXLAN frame.
    Type: Grant
    Filed: May 16, 2016
    Date of Patent: July 11, 2017
    Assignee: Arista Networks, Inc.
    Inventors: Douglas Alan Gourlay, Kenneth James Duda
  • Patent number: 9686249
    Abstract: For multi-node encryption, a method communicates communication data from a first upstream node to a first downstream node in response to the first upstream node initiating secure communication with the first downstream node. The method further generates a downstream node nonce from communication data exchanged with the first downstream node. The method generates a first downstream message transformation as a function of the downstream node nonce. The method receives a request encrypted with the first downstream message transformation through the first downstream node. The method communicates the upstream message transformation encrypted with the first downstream message transformation through the first downstream node to the destination node in response to the request. In addition, the method generates a tunnel transformation at the destination node as a function of one or more upstream message transformations and the first downstream message transformation.
    Type: Grant
    Filed: June 15, 2016
    Date of Patent: June 20, 2017
    Assignee: Utah State University
    Inventors: Robert F. Houghton, Jeffrey J. Johnson
  • Patent number: 9667655
    Abstract: A method includes performing operations as follows on a processor: receiving a request for a content item from a mobile device, determining that the content item is protected by a security policy, the security policy comprising an environmental factor associated with the use of the mobile device, ghosting a portion of the content item based on the security policy, and sending the content item and the security policy to the mobile device.
    Type: Grant
    Filed: February 12, 2015
    Date of Patent: May 30, 2017
    Assignee: CA, INC.
    Inventors: Neil Boyette, Jameel Ahmed Kaladgi, Vikas Krishna
  • Patent number: 9667419
    Abstract: A method for determining a cryptographic key for a MEMS device includes identifying physical properties for the device. A feature vector having a plurality of values is determined. Each of the values correspond to different physical properties. The cryptographic key is determined from the feature vector. The cryptographic key can be determined using a fuzzy extractor. The cryptographic key can be determined using different feature vectors corresponding to different channels in a device or different MEMS structures in the device.
    Type: Grant
    Filed: January 9, 2015
    Date of Patent: May 30, 2017
    Assignee: Robert Bosch GmbH
    Inventors: Jorge Guajardo Merchan, Heiko Stahl, Matthew Lewis, Andreas Mueller, Ralf Schellin
  • Patent number: 9667608
    Abstract: A novel method for out-of-band key verification that improves on both the usability and the security of the numeric-code method is provided. The method use portions of the generated keys as inputs to perform procedural image generation to produce a visualization at each of the two devices that the user can visually compare and confirm. This visualization can be a static image or a motion animation. The method can uses more of the key data to generate visualizations with more features to reduce the likelihood of false matches. The method can also use less key data to allow for quicker comparison and confirmation.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: May 30, 2017
    Assignee: APPLE INC.
    Inventor: Noah A. Witherspoon
  • Patent number: 9658854
    Abstract: Instructions and logic provide SIMD SM3 cryptographic hashing functionality. Some embodiments include a processor comprising: a decoder to decode instructions for a SIMD SM3 message expansion, specifying first and second source data operand sets, and an expansion extent. Processor execution units, responsive to the instruction, perform a number of SM3 message expansions, from the first and second source data operand sets, determined by the specified expansion extent and store the result into a SIMD destination register. Some embodiments also execute instructions for a SIMD SM3 hash round-slice portion of the hashing algorithm, from an intermediate hash value input, a source data set, and a round constant set. Processor execution units perform a set of SM3 hashing round iterations upon the source data set, applying the intermediate hash value input and the round constant set, and store a new hash value result in a SIMD destination register.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: May 23, 2017
    Assignee: Intel Corporation
    Inventors: Gilbert M. Wolrich, Vinodh Gopal, Sean M. Gulley, Kirk S. Yap, Wajdi K. Feghali
  • Patent number: 9661015
    Abstract: A device may include countermeasure circuitry that provides a countermeasure check that protects device logic. The device may also include enforcement circuitry that non-deterministically enforces the countermeasure check on the device logic so that the device logic is not always protected by a countermeasure action within the countermeasure check. The device may non-deterministically enforce the countermeasure check according to an enforcement rate, and the device may adjust the enforcement rate depending on a priority of the device logic or device logic portion protected by a particular countermeasure check.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: May 23, 2017
    Assignee: NXP B.V.
    Inventors: Jayanth Anandampillai Mandayam, Mark Buer
  • Patent number: 9661005
    Abstract: According to one embodiment, a system includes a processor and logic integrated with and/or executable by the processor, the logic being configured to identify a security issue affecting a first peer in one or more secure transmission control protocol/user datagram protocol (TCR/UDP) sessions, inform a second peer about the security issue using the first peer of the one or more TCP/UDP sessions, and perform at least one action in response to identifying and/or being informed about the security issue. In another embodiment, a method for providing a secure TCP/UDP session includes identifying a security issue affecting a first peer in one or more TCP/UDP sessions, informing a second peer about the security issue using the first peer of the one or more TCP/UDP sessions, and performing at least one action in response to identifying and/or being informed about the security issue.
    Type: Grant
    Filed: January 9, 2014
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corporation
    Inventors: Keshav G. Kamble, Vijoy A. Pandey, Vaishali V. Pandya
  • Patent number: 9660997
    Abstract: A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for obtaining continuously updated information regarding at least one of access permissions and actual usage of said network objects, and entitlement review by owner functionality operative to present to at least one owner of at least one network object a visually sensible indication of authorization status including a specific indication of users which were not yet authorized by said at least one owner of said at least one network object.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: May 23, 2017
    Assignee: VARONIS SYSTEMS, INC.
    Inventors: Yakov Faitelson, Ohad Korkus, Ophir Kretzer-Katzir, David Bass
  • Patent number: 9654480
    Abstract: Systems and methods are provided for providing generating and managing profiles. Such systems and methods may be implemented to control access to a function of a web server or site based on a level of trust associated with a user or device profile. According to one exemplary method, session information associated with a request to access a function of a web server is identified. At least one processor determines whether the request is associated with a trusted device profile based on the at least the session information. Access to the requested function is provided when the request is associated with a trusted device profile.
    Type: Grant
    Filed: June 20, 2016
    Date of Patent: May 16, 2017
    Assignee: AOL Inc.
    Inventors: Scott Dorfman, Richard Rodriguez-Val
  • Patent number: 9641330
    Abstract: A cryptographic system includes a memory device and a processor. The memory device has at least two sections, including a first section and a second section. The processor is configured to determine a mode of operation, receive a signal, and selectively zeroize at least one section of the memory device based at least in part on the received signal and the determined mode of operation.
    Type: Grant
    Filed: February 8, 2016
    Date of Patent: May 2, 2017
    Assignee: Cyber Solutions International, LLC
    Inventor: Richard J. Takahashi
  • Patent number: 9635317
    Abstract: A camera includes logic to capture images and video (collectively, ‘media’) and to store the captured media internally to the camera in an encrypted format; the encrypted format including multiple regions encrypted with different keys, each key corresponding to a human subject or object identified in the media.
    Type: Grant
    Filed: May 8, 2014
    Date of Patent: April 25, 2017
    Assignee: Surround.IO
    Inventors: John Ludwig, Richard Tong
  • Patent number: 9621592
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: April 11, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Anthony Ashley, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
  • Patent number: 9609023
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Grant
    Filed: February 10, 2015
    Date of Patent: March 28, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Paul Anthony Ashley, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
  • Patent number: 9588664
    Abstract: An approach is provided for displaying moving graphic objects on the display screen of the information handling system that are selected by a user while the objects are moving. The system is unlocked in response to the set of graphic objects selected by the user and the selection order matching an expected set of graphic objects and an expected selection order. Unlocking of the system allows the user to interact with one or more applications of the information handling system and to access data stored on the information handling system.
    Type: Grant
    Filed: August 12, 2015
    Date of Patent: March 7, 2017
    Assignee: International Business Machines Corporation
    Inventors: Faraz Ahmad, Adekunle Bello, Gregory J. Boss, Anto A. John
  • Patent number: 9582380
    Abstract: A network device and method may provide secure fallback operations. The device includes a port allowing the device to communicate with a network and a processor to generate a security credential, provide the security credential to a call manager during initialization, and provide the security credential to a secondary device during fallback operations. The network device may include a memory to store the security credential and routing information for fallback operations.
    Type: Grant
    Filed: May 4, 2015
    Date of Patent: February 28, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: James Wei, Yosef Rizal Tamsil, Suresh Ganjigunta Padmanabhan, Subbiah Kandasamy
  • Patent number: 9584487
    Abstract: Associating a network packet with biometric information for a user includes identifying biometric identification information for a user of a network device, including an identifier of the biometric identification information in at least one of a header and a trailer of a network packet without including biometric identification information in a payload of the network packet, and sending the packet via a network, wherein the identifier identifies the network packet as having originated from the user.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: February 28, 2017
    Assignee: Scenera Mobile Technologies, LLC
    Inventors: Jeffrey Scott Bardsley, Richard M. Horner
  • Patent number: 9578052
    Abstract: Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an application associated with the process and an endpoint reputation score of the application. Embodiments are configured to request a threat intelligence reputation score based on the hash of the application, to determine an action to be taken by the end host based, at least in part, on one or more policies and at least one of the threat intelligence reputation score and the endpoint reputation score, and to send a response indicating the action to be taken by the end host. Further embodiments request another threat intelligence reputation score based on another hash of a dynamic link library module loaded by the process on the end host, and the action is determined based, at least in part, on the other threat intelligence score.
    Type: Grant
    Filed: October 24, 2013
    Date of Patent: February 21, 2017
    Assignee: McAfee, Inc.
    Inventors: Chandan CP, Srinivasan Narasimhan