Patents Examined by Bryan Wright
  • Patent number: 8356169
    Abstract: If the communication partner of a client node (A1a) is an encryption communication target node (C1), a DNS Proxy unit (A12a) in the client node rewrites a response to a name resolution request for the communication partner node of an application from the actual IP address of the communication partner node to a loopback address that changes depending on the communication partner. On the basis of the destination loopback address of a data packet transmitted from the application, a communication encryption module (A13a) in the client node identifies the communication partner and the encryption communication path to be used for communication with the communication partner. Hence, encryption communication can simultaneously be executed directly with a plurality of communication partner nodes by using the communication encryption module that operates as an independent process.
    Type: Grant
    Filed: January 12, 2005
    Date of Patent: January 15, 2013
    Assignee: NEC Corporation
    Inventors: Yuichi Ishikawa, Norihito Fujita, Akio Iijima, Atsushi Iwata
  • Patent number: 8353026
    Abstract: A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot.
    Type: Grant
    Filed: October 23, 2008
    Date of Patent: January 8, 2013
    Assignee: Dell Products L.P.
    Inventors: Muhammed K. Jaber, Mukund P. Khatri, Kevin T. Marks, Don Charles McCall
  • Patent number: 8352374
    Abstract: Methods and systems for controlling the distribution of digital content are provided. A license holder acquires protected content and an original digital license to the protected content from a content provider system. The license holder in turn delegates all or part of the grants in that original license to other qualified devices or clients. The content remains in its original, protected or encrypted form while it is delivered from the license holder to the client along with a digital sublicense that the client receives from the original license holder, whereupon the content can then be rendered. The original digital license defines or governs the conditions under which such delegation occurs, and includes terms under which such delegation is permitted to continue in order to enforce the intent of the content provider.
    Type: Grant
    Filed: August 30, 2010
    Date of Patent: January 8, 2013
    Assignees: Sony Corporation, Sony Electronics Inc.
    Inventors: Eric John Swenson, Ryuji Ishiguro, Motohiko Nagano, Pierre Chavanne
  • Patent number: 8352598
    Abstract: Disclosed is a method of providing a completely automated public turing test to tell a computer and a human apart (CAPTCHA) based on image. The method comprises the steps of: storing a plurality of randomly-selected images by session when a request for a web page is received from a user client; providing the web page and a session ID to the user client; generating a test image by mixing the plurality of images when a request for a test image corresponding to the session ID is received from the user client; transmitting the generated test image to the user client; receiving at least one of first identification information inputted by the user about the test image from the user client; and comparing the first identification information with second identification information included in Meta information of the test image.
    Type: Grant
    Filed: December 23, 2007
    Date of Patent: January 8, 2013
    Assignee: Inha-Industry Partnership Institute
    Inventors: DeaHun Nyang, Jeonil Kang
  • Patent number: 8347375
    Abstract: The intrusion detection function monitors for and reports detected intrusion signatures. The dynamic intrusion signatures function determines whether reported intrusion signatures exist in a library of signatures associated with a particular intrusion detection function. If the reported signature does not exist in the library, the library is updated. Detected intrusion signatures are reported to similarly enabled devices for library analysis and updating, if necessary. The related method includes the steps of monitoring for intrusion signatures or other triggering events, analyzing the events and updating IDS signature libraries as necessary.
    Type: Grant
    Filed: October 1, 2004
    Date of Patent: January 1, 2013
    Assignee: Enterasys Networks, Inc.
    Inventors: Richard W. Graham, John J. Roese
  • Patent number: 8347090
    Abstract: A method and apparatus including units configured to send a request from a first network entity to a user equipment for an identifier and receive a message indicating that a public key is required from the user equipment by the first network entity. The method and apparatus also includes units configured to send, by the first network entity, the public key to the user equipment and receive an encrypted identifier by the first network entity, wherein upon authenticating the public key, the user equipment encrypts at least part of the identifier using the public key, thereby enabling further processing between the network entity and the user equipment.
    Type: Grant
    Filed: September 21, 2007
    Date of Patent: January 1, 2013
    Assignee: Nokia Corporation
    Inventors: Silke Holtmanns, Dan Forsberg
  • Patent number: 8346952
    Abstract: An embodiment of a network manager permits a resource group administrator (with resource group level permissions but without global permissions) to add a global object to his/her resource group as a managed object, without requiring the administrator to have a global permission, as discussed further below. An embodiment of the network manager permits a resource group administrator to also edit the configuration settings that are attached to his/her resource group without requiring the administrator to have a global permission.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: January 1, 2013
    Assignee: NetApp, Inc.
    Inventors: Kartik Kumar, James Hartwell Holl, II, Anshu Surana, Ravindra Kumar
  • Patent number: 8345993
    Abstract: A multi-level data encoding system is provided that is operable on a computer. The encoding system includes a data input device adapted to input a data set and store the data set in a database. The system further includes an encoder adapted to encode the data set and separate the encoded data set into two files, wherein each character of the data set comprises a unique electronic footprint. Additionally, the system includes a data field adapted to organize the encoded data set for proper decoding, a master file comprising one file of the encoded data set and an overlay file comprising the other file of the encoded data set. The system also includes a decoder adapted to align the overlay file onto the master file to decode the encoded data set.
    Type: Grant
    Filed: October 22, 2008
    Date of Patent: January 1, 2013
    Inventor: Glenn E Weeks
  • Patent number: 8346924
    Abstract: Systems and methods for pre-configuring a media device or other information handling system so as to be authorized to gain access to one or more destination networks. Pre-configuring the device includes determining what admission requirements the destination network providers require for access and then generating and providing to the media device a network admission coupon that includes the required information. In some embodiments this may be accomplished by a service center, which removes the need for additional authentication steps to be performed by the media device or the destination network providers.
    Type: Grant
    Filed: December 2, 2008
    Date of Patent: January 1, 2013
    Assignee: Dell Products L.P.
    Inventors: Timothy Bucher, Mark Andrew Ross, Arthur Anthonie van Hoff
  • Patent number: 8341728
    Abstract: An authentication device and method of a semiconductor chip which sends and receives authentication information, performs a login process for permitting an input to the semiconductor chip and an output from the semiconductor chip, controls acquisition of the authentication information and controls installation or uninstallation of a loadable program, assignment of a session to the loadable program unit, and use of the loadable program unit based on the session.
    Type: Grant
    Filed: October 23, 2008
    Date of Patent: December 25, 2012
    Assignee: Fujitsu Semiconductor Limited
    Inventors: Seigo Kaihoko, Ai Yodokawa, Nobuo Takahashi
  • Patent number: 8341389
    Abstract: A device for the secured start-up of a computer installation comprising a first connection interface to the computer installation and a second connection interface to an external data medium unit separate from the computer installation and which contains data and executable codes for a start-up program of the computer installation. The device also includes means for securing the use of data and executable codes and for transmitting data and executable codes of the start-up program from the external data medium unit via the second connection interface to the computer installation via the first connection interface, and after executing the means of security, to start-up the computer installation using transmitted executable codes and data.
    Type: Grant
    Filed: January 7, 2009
    Date of Patent: December 25, 2012
    Inventors: Alain Filee, René Martin
  • Patent number: 8335926
    Abstract: A computer system for identifying an individual using a biometric characteristic of the individual includes a biometric sensor for generating a first code, and a controller including a memory for storing the first code and a dynamic binary code conversion algorithm. When the controller receives a sensor code from the biometric sensor, it compares the sensor code with the first code stored in the memory, and if the identity between the sensor code and the first code is verified, the controller generates a first binary code by means of the dynamic binary code conversion algorithm and outputs the first binary code from which the computer system generates a second binary code by means of the dynamic binary code conversion algorithm. The computer system then verifies the identity of the individual if the second binary code matches the first binary code.
    Type: Grant
    Filed: March 15, 2004
    Date of Patent: December 18, 2012
    Assignee: Quard Technology APS
    Inventors: Uffe Clemmensen, Søren H. Jensen, Leif Serup
  • Patent number: 8333317
    Abstract: Access to secured services may be controlled based on the proximity of a wireless token to a computing device through which access to the secured services is obtained. An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of the computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip.
    Type: Grant
    Filed: September 30, 2004
    Date of Patent: December 18, 2012
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank, Nambi Seshadri
  • Patent number: 8321352
    Abstract: Various techniques for software license inventory and asset management are disclosed. A fingerprint may be generated and associated with various copies of software applications installed on a software licensee's computer systems. Upon generation, each fingerprint may be stored in a license information database system along with relevant license information for that copy of the software application. A software inventory tool may then be used to collect fingerprints on installed copies of software applications and provide these fingerprints to the license information database system to obtain the corresponding license information. The output of the software inventory tool may be used by a licensee to comply with software license agreements and/or efficiently allocate information technology resources. Methods and systems that provide and process secured, dynamic and persistent tagging of software deployments and usage are also disclosed.
    Type: Grant
    Filed: October 23, 2008
    Date of Patent: November 27, 2012
    Assignee: Symantec Corporation
    Inventors: Kannan Rameshkumar, David D. Wright
  • Patent number: 8319990
    Abstract: A printing apparatus includes a data reading unit that reads data from a storage device that can store pieces of data, the data reading unit being connectable to the storage device, an input panel that accepts an input a password used to decrypt encrypted data stored in the storage device, a password storing unit that stores the input password, a data decrypting unit that decrypts the encrypted data by using the stored password, a decrypted data storing unit that temporarily stores the decrypted data, and a re-decrypting unit that decrypts other encrypted data stored in the storage device by using the stored password.
    Type: Grant
    Filed: March 27, 2007
    Date of Patent: November 27, 2012
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventors: Sadaaki Miyazaki, Naoki Hashimoto, Norio Mizutani
  • Patent number: 8312556
    Abstract: An information processing apparatus includes a use restriction unit that restricts use of the information processing apparatus based on identification information stored in an identification information storage unit, and a controller. The controller is operable to update the identification information stored in the identification information storage unit, send the updated identification information to a preset mail address, by an E-mail, receive an E-mail, determine whether the received E-mail is an E-mail replying to the sent E-mail, and control the identification information storage unit to store identification information included in the received E-mail as new identification information if the received E-mail is determined to be the E-mail replying to the sent E-mail.
    Type: Grant
    Filed: September 27, 2007
    Date of Patent: November 13, 2012
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Shingo Itoh
  • Patent number: 8311214
    Abstract: Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve and a public key Q (416) of the receiver. The cipher includes a first element that is the product kP of a random number k (404) with the generator point P and a second element that is the product of m and the x-coordinate of the product kQ. The message m is generated from two mathematically independent representations of the information and, optionally, a random number. The cipher is communicated to the receiver and decoded to recover a message m? (502). A validation token (500) is generated by the receiver and passed to the transmitter, which validates communication of the information to the receiver if the product mkQ is equal to the validation token.
    Type: Grant
    Filed: April 24, 2006
    Date of Patent: November 13, 2012
    Assignee: Motorola Mobility LLC
    Inventors: Ronald F. Buskey, Barbara B. Frosik, Douglas A. Kuhlman
  • Patent number: 8307433
    Abstract: A method of protecting username/password (U/P) credentials operates on a client computer that cooperates with an anti-phishing scheme that generates a client warning at the client computer when a suspected phishing website issues a U/P request. At the client computer, a set of S fake U/P credentials is generated when the client warning is heeded, or a set of (S?1) fake U/P credentials are derived from a client-supplied U/P credential provided after the client warning is ignored. The client computer then transmits to the suspected phishing website one of (i) the set of S fake U/P credentials, and (ii) the client-supplied U/P credential along with the set of (S?1) fake U/P credentials.
    Type: Grant
    Filed: November 20, 2009
    Date of Patent: November 6, 2012
    Assignee: College of William and Mary
    Inventors: Chuan Yue, Haining Wang
  • Patent number: 8291357
    Abstract: Disclosed are embodiments of on-chip identification circuitry. In one embodiment, pairs of conductors (e.g., metal pads, vias, lines) are formed within one or more metallization layers. The distance between the conductors in each pair is predetermined so that, given known across chip line variations, there is a random chance (i.e., an approximately 50/50 chance) of a short. In another embodiment different masks form first conductors (e.g., metal lines separated by varying distances and having different widths) and second conductors (e.g., metal vias separated by varying distances and having equal widths). The first and second conductors alternate across the chip. Due to the different separation distances and widths of the first conductors, the different separation distances of the second conductors and, random mask alignment variations, each first conductor can short to up to two second conductors.
    Type: Grant
    Filed: October 9, 2007
    Date of Patent: October 16, 2012
    Assignee: International Business Machines Corporation
    Inventors: Serafino Bueti, Adam J. Courchesne, Kenneth J. Goodnow, Todd E. Leonard, Peter A. Sandon, Peter A. Twombly, Charles S. Woodruff
  • Patent number: 8290145
    Abstract: In a method for the transition from a first masked representation of a value to be kept secret to a second masked representation of the value, according to a first aspect of the invention at least one previously calculated table with a plurality of entries is used, and the calculation is carried out depending on at least one veiling parameter, in order to prevent the value to be kept secret from being spied out. According to a second aspect of the invention, at least one comparison table is used, which, for each table index, provides the result of a comparison between a value dependent on the table index and a value dependent on at least one masking value. A computer program product and a device have corresponding features. The invention provides a technique for protecting the transition between masked representations of a value from being spied out, wherein the masked representations are based on different masking rules.
    Type: Grant
    Filed: September 3, 2004
    Date of Patent: October 16, 2012
    Assignee: Giesecke & Devrient GmbH
    Inventors: Olaf Neisse, Jürgen Pulkus