Patents Examined by Brandon Bludau
  • Patent number: 7266687
    Abstract: A method of key distribution includes generating, by a first system device (101), key material and forwarding the key material from the first system device (101) to a second system device (107). It is determined whether a mobile station (401), for which the key material is directed, is active on the system. When the mobile station is active, the key material is forwarded to a base station (115) where the mobile station (401) is active, and the base station (115) forwards the key material to the mobile station (401).
    Type: Grant
    Filed: February 16, 2001
    Date of Patent: September 4, 2007
    Assignee: Motorola, Inc.
    Inventors: Hans Christopher Sowa, Daniel J. McDonald, David J. Chater-Lea, Scott J. Pappas, Jason J. Johur, Dennis Newkirk, Randy Kremske, Walter F. Anderson, Glenn Brian Walton
  • Patent number: 7251823
    Abstract: The present invention provides a solution in which a script containing general security parameters and access policies in a file is placed on an appropriate internal server. The location of the script may then be stored on an external server. When an end-user within the organization decides to purchase a wireless network device, he may attach it to his existing computer. The computer then may retrieve the security file location from the external server, retrieve the security file from the internal server using the security file location, and program the security file into the wireless device.
    Type: Grant
    Filed: December 17, 2002
    Date of Patent: July 31, 2007
    Assignee: Sierra Wireless, Inc.
    Inventor: Joseph Peter Robert Tosey
  • Patent number: 7239707
    Abstract: A transmitter employing a cryptographic algorithm and key generates and transmits a staggered pulse signal that includes a plurality of high-power pulses that are part of a pseudonoise (PN) code. The high-power pulses are separated by a group of low-power chips and the time interval between the high-power pulses is varied according to the cryptographic algorithm and key. A receiver, employing a corresponding cryptographic algorithm and key receives the signal and correlates it with a locally generated code that is modified according to the cryptographic algorithm and key to detect the phase of the received PN code. The receiver also can include a matched filter configured according to the cryptographic algorithm and key to detect the sequence of high-power pulses in the received signal.
    Type: Grant
    Filed: November 28, 2001
    Date of Patent: July 3, 2007
    Assignee: ITT Manufacturing Enterprises, Inc.
    Inventors: Gene L. Cangiani, Peter M. Brodie, James M. Clark, Dennis McCrady
  • Patent number: 7114185
    Abstract: A computer file may be scanned for suspicious words 18 occurring within suspicious contexts 20. Thus, messages embedded by malware authors within their malware may be detected. The detection of such embedded messages may be used to identify otherwise unknown items of malware or as a pre-filtering technique for controlling the use of further scanning techniques.
    Type: Grant
    Filed: December 26, 2001
    Date of Patent: September 26, 2006
    Assignee: McAfee, Inc.
    Inventors: Robert Edward Moore, Fraser Peter Howard, Lee Codel Lawson Tarbotton
  • Patent number: 6990582
    Abstract: A sending server that sends an agent and a receiving server that receives the agent share a common key. The sending server double-encrypts an agent processing module and transfers to the receiving server an agent storage container that contains the agent processing module, an agent processing module decryption processing program, a receiving server authentication processing program, authentication object information, and a public key. The agent and the receiving server authenticate each other in the receiving server.
    Type: Grant
    Filed: March 29, 2002
    Date of Patent: January 24, 2006
    Assignee: Victor Company of Japan, Limited
    Inventor: Toshihiro Maruyama