Patents Examined by C. Wang
-
Patent number: 9531754Abstract: Disclosed are methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers. A server operating system may include or be otherwise functionally associated with a firewall application, which firewall application may regulate IP port access to resources on the server. A port-tending agent or application (PorTender) running on the server, or on a functionally associated computing platform, may monitor and regulate server port status (e.g. opened, closed, and conditionally opened). The PorTender may initiate and engage in communication sessions with a policy server, from which policy server the PorTender may receive port, user and security policies and/or settings.Type: GrantFiled: May 12, 2011Date of Patent: December 27, 2016Assignee: DOME 9 SECURITY LTD.Inventors: Zohar Alon, Roy Feintuch
-
Patent number: 9524144Abstract: Data processing method and related devices for determining the result of a first type of operation involving an operand in an electronic entity comprising a non-volatile storage unit, includes the following steps: converting a data, derived from at least one key portion designed to be used with the operand in the first type of operation, into a key data adapted to be used with the operand in a second type of operation; storing the key data in the non-volatile storage unit; reading in the non-volatile storage unit the key data; performing the second type of operation with the read key data and the operand.Type: GrantFiled: December 16, 2005Date of Patent: December 20, 2016Assignee: OBERTHUR TECHNOLOGIESInventors: Arnaud Boscher, Robert Naciri
-
Patent number: 9519509Abstract: A system and method can support transaction processing in a middleware environment. A processor, such as a remote method invocation stub in the middleware environment, can be associated with a transaction, wherein the transaction is from a first cluster. Then, the processor can handle a transactional request that is associated with the transaction, wherein the transactional request is to be sent to the first cluster. Furthermore, the processor can route the transactional request to a said cluster member in the first cluster, which is an existing participant of the transaction.Type: GrantFiled: October 21, 2014Date of Patent: December 13, 2016Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Alexander Somogyi, Sindhu Subramanyam, Stephen Felts
-
Patent number: 9516023Abstract: A system for collecting and transferring electronic information includes one or more servers, having one or more centralized databases for storing or retrieving the data, connected to a network, one or more computing devices connected to the servers via the network for retrieving the data from the centralized databases, and a plurality of biometric devices connected to the servers via the network, located at different locations. Each biometric device comprises a system for identifying users based on biometric data of the users, a system for storing the biometric data and activity information of the users, and a system for sending the biometric data and activity information to the servers, in communication with the servers in real time via the network.Type: GrantFiled: December 4, 2014Date of Patent: December 6, 2016Assignee: INFOSTANDARD SDN. BHD.Inventors: Hon Seng Teh, Kah Heng Chong, Yuan Yew Choo
-
Patent number: 9515829Abstract: [Objective] When installing software into an in-vehicle terminal from a server, it is required to prevent the software from being installed into an unsuitable terminal, and to reduce time and efforts for data input and download, thereby improving the convenience of the user. [Solution] In an information distribution system, terminal identification information and a terminal unique key for an in-vehicle terminal are stored in a server as well as in itself. The in-vehicle terminal transmits the terminal identification information to the server for terminal authentication via a communication terminal after encrypting with the terminal unique key, and then the server transmits encrypted software to the communication terminal. The communication terminal transmits the encrypted software to the in-vehicle terminal, which in turn obtains a software unique key encrypted with the terminal unique key from the server and decrypts the encrypted software for installation using the software unique key.Type: GrantFiled: December 21, 2012Date of Patent: December 6, 2016Assignee: Clarion Co., Ltd.Inventors: Takashi Matsumoto, Atsushi Shimizu, Katsuyuki Umezawa, Tatsuaki Osafune, Koichi Mitsui, Hiroyoshi Endo
-
Patent number: 9501382Abstract: Embodiments of the present invention provide a system and methods for detecting power bugs. In one embodiment, a computer-implemented method for analyzing a computer code includes generating a control flow graph for at least a portion of the computer code at a processor. The method further includes identifying power bugs by traversing the control flow graph if the control flow graph exits without performing a function call to deactivate power to any component of a device configured to execute computer executable instructions based on the computer code after performing a function call to activate power.Type: GrantFiled: June 24, 2014Date of Patent: November 22, 2016Assignee: PURDUE RESEARCH FOUNDATIONInventors: Yu Charlie Hu, Abhilash Jindal, Samuel Midkiff, Abhinav Pathak
-
Patent number: 9501637Abstract: Technologies for shadow stack support for legacy guests include a computing device having a processor with shadow stack support. During execution of a call instruction, the processor determines whether a legacy stack pointer is within bounds and generates a virtual machine exit if the legacy stack pointer is out-of-bounds. If not out-of-bounds, the processor pushes a return address onto the legacy stack and onto a shadow stack protected by a hypervisor. During execution of a return instruction, the processor determines whether top return addresses of the legacy stack and the shadow stack match, and generates a virtual machine exit if the return addresses do not match. If the return addresses match, the processor pops the return addresses off of the legacy stack and off of the shadow stack. The stack out-of-bounds and the stack mismatch virtual machine exits may be handled by the hypervisor. Other embodiments are described and claimed.Type: GrantFiled: September 26, 2014Date of Patent: November 22, 2016Assignee: Intel CorporationInventors: Michael LeMay, Barry E. Huntley
-
Patent number: 9501307Abstract: Methods and systems for providing a communication path are disclosed. Information can be received via a first communication session based on a first messaging protocol. The first communication session can be terminated at a virtual machine of a group of virtual machines. A dynamically bound communication path to a resource can be selected based on a dynamically reconfigurable routing table for the group of virtual machines. A second communication session can be initiated, at the virtual machine, via the selected dynamically bound communication path. The information can be transmitted to the resource via the second communication session based on a second messaging protocol.Type: GrantFiled: September 26, 2014Date of Patent: November 22, 2016Assignee: Comcast Cable Communications, LLCInventors: Sudhir Borra, Douglas Makofka
-
Patent number: 9495188Abstract: Techniques for synchronizing a honey network configuration to reflect a target network environment are disclosed. In some embodiments, a system for synchronizing a honey network configuration to reflect a target network environment includes a device profile data store that includes a plurality of attributes of each of a plurality of devices in the target network environment; a virtual machine (VM) image library that includes one or more VM images; and a virtual clone manager executed on a processor that instantiates a virtual clone of one or more devices in the target enterprise network using a VM image selected from the VM image library that is customized based on one or more attributes for a target device in the device profile data store.Type: GrantFiled: September 30, 2014Date of Patent: November 15, 2016Assignee: Palo Alto Networks, Inc.Inventors: Taylor Ettema, Huagang Xie
-
Patent number: 9495536Abstract: A method and apparatus for determining an input are provided. The method includes authenticating an external device, when the external device approaches in a predetermined range; determining an area approached by the external device and determining whether the determined area is valid; and outputting a predetermined indication to a predetermined area related to the area approached by the external device.Type: GrantFiled: August 21, 2012Date of Patent: November 15, 2016Assignee: Samsung Electronics Co., LtdInventors: Ju-il Eom, Tae-young Kang, Yong-gook Park
-
Patent number: 9485087Abstract: A method of performing a cryptographic operation including: receiving a plurality of binary input values; splitting the binary input values into a plurality of non-binary digits of base r, where r is an integer greater than 2 and not equal to a power of 2; and performing, by a cryptographic block on each of the plurality of non-binary digits, a different modulo r operation to generate at least one output digit) of base r.Type: GrantFiled: May 1, 2012Date of Patent: November 1, 2016Assignees: Proton World International N.V., STMicroelectronics S.r.l.Inventors: Gilles Van Assche, Joan Daemen, Guido Bertoni
-
Patent number: 9471288Abstract: Compiler based obfuscation is described. To protect portions of a code project with obfuscations, the code is modified within a compiler to produce one or more modifications that obfuscate the code as part of a compilation process. A compiled version of the code is generated having the modifications that are produced within the compiler. In one approach, the compiler is configured to consume an obfuscation description that indicates portions of the code to protect and specifies the modifications to make to the indicated portions. Various different modifications of code may be performed during the compilation process to implement corresponding obfuscation features. For example, the modifications made within a compiler may include, but are not limited to, modifications designed to enable tamper detection, anti-debugging, and/or encryption of the code.Type: GrantFiled: August 5, 2015Date of Patent: October 18, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Olaf Alexander Miller, Ten Tzen, Hakki T. Bostanci, Michael T. Pashniak, Kalpesh S. Patel
-
Patent number: 9467290Abstract: The disclosure provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one variation, the disclosure describes retaining compatibility with conventional Secure Sockets Layer (SSL) and SOCKS protocols, such that secure UDP datagrams can be transmitted between a proxy server and a client computer in a manner analogous to conventional SOCKS processing. Further, the disclosure describes a network arrangement that employs a cache having copies distributed among a plurality of different locations. SSL/TLS session information for a session with each of the proxy servers is stored in the cache so that it is accessible to at least one other proxy server. Using this arrangement, cached SSL/TLS communication session information may be retrieved and used by a second proxy server to accept a session with the client device when the client device switches proxy servers.Type: GrantFiled: August 19, 2013Date of Patent: October 11, 2016Assignee: AVENTAIL LLCInventors: Marc D. VanHeyningen, Rodger D. Erickson
-
Patent number: 9465921Abstract: A computer-implemented method for selectively authenticating a request based on an authentication policy is described. A request is received from a client. A determination is made as to which authentication threshold is applied to the request based on an authentication policy. The request is authenticated if the authentication threshold is satisfied. The authentication threshold is modified if the request is not successfully authenticated.Type: GrantFiled: May 6, 2009Date of Patent: October 11, 2016Assignee: Symantec CorporationInventors: Zulfikar Ramzan, Walter Bogorad
-
Patent number: 9465618Abstract: Methods, apparatuses, and systems that allow a microprocessor to optimally select an assist unit (co-processor) to reduce completion times for completing processing requests to execute functions. The methods, apparatuses, and systems include assist unit hardware, assist unit management software, or a combination of the two to optimally select the assist unit for completing a specific processing request. In optimally selecting an assist unit, the methods, apparatuses, and systems calculate estimated times for completing the processing request with conventional means and with assist units. The times are then compared to determine the fastest time for completing a specific processing request.Type: GrantFiled: January 8, 2014Date of Patent: October 11, 2016Assignee: Oracle International CorporationInventors: Spiros Kalogeropulos, Partha Tirumalai
-
Patent number: 9459916Abstract: A system includes a plurality of information processing devices and a management device configured to manage execution of jobs performed by the plurality of information processing devices. The management device detects any one of the plurality of information processing devices which is executing a first job, at a predetermined time, and determines whether a second information processing device different from the first information processing device is able to be allocated to a second job which is scheduled to use the first information processing device being used by the first job after the predetermined time, among the plurality of information processing devices. The management device modifies an execution schedule of the jobs such that the second job is executed using the second information processing device when it is determined that the second information processing device is able to be allocated to the second job.Type: GrantFiled: November 10, 2014Date of Patent: October 4, 2016Assignee: FUJITSU LIMITEDInventor: Hiroki Yokota
-
Patent number: 9454457Abstract: A software test apparatus and a software test method and a computer readable medium thereof are provided. The software test apparatus stores a software testing program, an under-tested code, a plurality of basic test benches and a plurality of candidate test benches. The under-tested code includes a hard-to-detect code and the hard-to-detect code has at least one hard-to-detect section. The software test apparatus runs the software testing program to execute the following operations: parsing the hard-to-detect code to generate a condition-statement tree; based on the basic test benches and the condition-statement tree, using a support vector machine (SVM) to establish a support vector regression (SVR) predictor; and applying the SVR predictor to choose a best candidate test bench from the candidate test benches.Type: GrantFiled: November 23, 2015Date of Patent: September 27, 2016Assignee: Institute For Information IndustryInventor: Kai-Yuan Jan
-
Patent number: 9451452Abstract: A mesh station applying for access to a network includes a list of peer stations in messages of an authenticated key establishment protocol. A mesh key distributor derives a key delivery key and generates a top level key, and then delivers the top level key to the mesh station. Following the key establishment protocol, the mesh key distributor also creates pairwise keys for use between the mesh station and the peer stations listed in its peer list. The list of peers permits the identifier for the peer to be bound into the derived key, which helps ensure that the key used between each pair of peers is unique. Once the mesh key distributor finishes creating a key for one of the stations on the peer list, the mesh key distributor sends a message to the peer to initiate a key push.Type: GrantFiled: June 29, 2009Date of Patent: September 20, 2016Assignee: MOTOROLA SOLUTIONS, INC.Inventors: Stephen P. Emeott, Anthony J. Braskich
-
Patent number: 9443112Abstract: Embodiments of a secure media container and a method of using same are provided. In some embodiments, the secure media container includes a portable power supply; an antenna; a receptacle for receiving removable data storage; and a computer apparatus including a processor and a memory, comprising executable instructions that cause the processor to: determine that a removable data storage device has been input into the receptacle; track a location of the secure media container using the antenna; determine an action associated with the location of the secure media container by: accessing a database comprising a plurality of locations and associated actions; and comparing the location of the secure media container to the plurality of locations and associated actions in the database; and apply the action to the removable storage device based on the location of the secure media container.Type: GrantFiled: May 23, 2014Date of Patent: September 13, 2016Assignee: Bank of America CorporationInventor: Manu Jacob Kurian
-
Patent number: 9442707Abstract: Methods, systems, and computer program products are provided that enable incremental compilation of source code. Attributes of an intermediate language (IL) representation and a compiled representation of a source code are stored. Modified source code that is a revised version of the first source code is received. An IL representation of the modified source code is generated. Attributes of the revised intermediate IL and the stored attributes of the IL representation are compared to determine a first set of functions changed in the modified source code. A second set of functions in the first source code is determined that includes functions affected the determined first set of functions. The first and second sets of functions are compiled to generate a set of compiled functions. Compiled versions of the first and second sets are replaced in the compiled representation of the first source code with the set of compiled functions.Type: GrantFiled: June 25, 2014Date of Patent: September 13, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Patrick W. Sathyanathan, Ten H. Tzen, Wenlei He, Ankit Asthana, Adrian Militaru