Patents Examined by C. Wang
  • Patent number: 9531754
    Abstract: Disclosed are methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers. A server operating system may include or be otherwise functionally associated with a firewall application, which firewall application may regulate IP port access to resources on the server. A port-tending agent or application (PorTender) running on the server, or on a functionally associated computing platform, may monitor and regulate server port status (e.g. opened, closed, and conditionally opened). The PorTender may initiate and engage in communication sessions with a policy server, from which policy server the PorTender may receive port, user and security policies and/or settings.
    Type: Grant
    Filed: May 12, 2011
    Date of Patent: December 27, 2016
    Assignee: DOME 9 SECURITY LTD.
    Inventors: Zohar Alon, Roy Feintuch
  • Patent number: 9524144
    Abstract: Data processing method and related devices for determining the result of a first type of operation involving an operand in an electronic entity comprising a non-volatile storage unit, includes the following steps: converting a data, derived from at least one key portion designed to be used with the operand in the first type of operation, into a key data adapted to be used with the operand in a second type of operation; storing the key data in the non-volatile storage unit; reading in the non-volatile storage unit the key data; performing the second type of operation with the read key data and the operand.
    Type: Grant
    Filed: December 16, 2005
    Date of Patent: December 20, 2016
    Assignee: OBERTHUR TECHNOLOGIES
    Inventors: Arnaud Boscher, Robert Naciri
  • Patent number: 9519509
    Abstract: A system and method can support transaction processing in a middleware environment. A processor, such as a remote method invocation stub in the middleware environment, can be associated with a transaction, wherein the transaction is from a first cluster. Then, the processor can handle a transactional request that is associated with the transaction, wherein the transactional request is to be sent to the first cluster. Furthermore, the processor can route the transactional request to a said cluster member in the first cluster, which is an existing participant of the transaction.
    Type: Grant
    Filed: October 21, 2014
    Date of Patent: December 13, 2016
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Alexander Somogyi, Sindhu Subramanyam, Stephen Felts
  • Patent number: 9516023
    Abstract: A system for collecting and transferring electronic information includes one or more servers, having one or more centralized databases for storing or retrieving the data, connected to a network, one or more computing devices connected to the servers via the network for retrieving the data from the centralized databases, and a plurality of biometric devices connected to the servers via the network, located at different locations. Each biometric device comprises a system for identifying users based on biometric data of the users, a system for storing the biometric data and activity information of the users, and a system for sending the biometric data and activity information to the servers, in communication with the servers in real time via the network.
    Type: Grant
    Filed: December 4, 2014
    Date of Patent: December 6, 2016
    Assignee: INFOSTANDARD SDN. BHD.
    Inventors: Hon Seng Teh, Kah Heng Chong, Yuan Yew Choo
  • Patent number: 9515829
    Abstract: [Objective] When installing software into an in-vehicle terminal from a server, it is required to prevent the software from being installed into an unsuitable terminal, and to reduce time and efforts for data input and download, thereby improving the convenience of the user. [Solution] In an information distribution system, terminal identification information and a terminal unique key for an in-vehicle terminal are stored in a server as well as in itself. The in-vehicle terminal transmits the terminal identification information to the server for terminal authentication via a communication terminal after encrypting with the terminal unique key, and then the server transmits encrypted software to the communication terminal. The communication terminal transmits the encrypted software to the in-vehicle terminal, which in turn obtains a software unique key encrypted with the terminal unique key from the server and decrypts the encrypted software for installation using the software unique key.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: December 6, 2016
    Assignee: Clarion Co., Ltd.
    Inventors: Takashi Matsumoto, Atsushi Shimizu, Katsuyuki Umezawa, Tatsuaki Osafune, Koichi Mitsui, Hiroyoshi Endo
  • Patent number: 9501382
    Abstract: Embodiments of the present invention provide a system and methods for detecting power bugs. In one embodiment, a computer-implemented method for analyzing a computer code includes generating a control flow graph for at least a portion of the computer code at a processor. The method further includes identifying power bugs by traversing the control flow graph if the control flow graph exits without performing a function call to deactivate power to any component of a device configured to execute computer executable instructions based on the computer code after performing a function call to activate power.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: November 22, 2016
    Assignee: PURDUE RESEARCH FOUNDATION
    Inventors: Yu Charlie Hu, Abhilash Jindal, Samuel Midkiff, Abhinav Pathak
  • Patent number: 9501637
    Abstract: Technologies for shadow stack support for legacy guests include a computing device having a processor with shadow stack support. During execution of a call instruction, the processor determines whether a legacy stack pointer is within bounds and generates a virtual machine exit if the legacy stack pointer is out-of-bounds. If not out-of-bounds, the processor pushes a return address onto the legacy stack and onto a shadow stack protected by a hypervisor. During execution of a return instruction, the processor determines whether top return addresses of the legacy stack and the shadow stack match, and generates a virtual machine exit if the return addresses do not match. If the return addresses match, the processor pops the return addresses off of the legacy stack and off of the shadow stack. The stack out-of-bounds and the stack mismatch virtual machine exits may be handled by the hypervisor. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: November 22, 2016
    Assignee: Intel Corporation
    Inventors: Michael LeMay, Barry E. Huntley
  • Patent number: 9501307
    Abstract: Methods and systems for providing a communication path are disclosed. Information can be received via a first communication session based on a first messaging protocol. The first communication session can be terminated at a virtual machine of a group of virtual machines. A dynamically bound communication path to a resource can be selected based on a dynamically reconfigurable routing table for the group of virtual machines. A second communication session can be initiated, at the virtual machine, via the selected dynamically bound communication path. The information can be transmitted to the resource via the second communication session based on a second messaging protocol.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: November 22, 2016
    Assignee: Comcast Cable Communications, LLC
    Inventors: Sudhir Borra, Douglas Makofka
  • Patent number: 9495188
    Abstract: Techniques for synchronizing a honey network configuration to reflect a target network environment are disclosed. In some embodiments, a system for synchronizing a honey network configuration to reflect a target network environment includes a device profile data store that includes a plurality of attributes of each of a plurality of devices in the target network environment; a virtual machine (VM) image library that includes one or more VM images; and a virtual clone manager executed on a processor that instantiates a virtual clone of one or more devices in the target enterprise network using a VM image selected from the VM image library that is customized based on one or more attributes for a target device in the device profile data store.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: November 15, 2016
    Assignee: Palo Alto Networks, Inc.
    Inventors: Taylor Ettema, Huagang Xie
  • Patent number: 9495536
    Abstract: A method and apparatus for determining an input are provided. The method includes authenticating an external device, when the external device approaches in a predetermined range; determining an area approached by the external device and determining whether the determined area is valid; and outputting a predetermined indication to a predetermined area related to the area approached by the external device.
    Type: Grant
    Filed: August 21, 2012
    Date of Patent: November 15, 2016
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Ju-il Eom, Tae-young Kang, Yong-gook Park
  • Patent number: 9485087
    Abstract: A method of performing a cryptographic operation including: receiving a plurality of binary input values; splitting the binary input values into a plurality of non-binary digits of base r, where r is an integer greater than 2 and not equal to a power of 2; and performing, by a cryptographic block on each of the plurality of non-binary digits, a different modulo r operation to generate at least one output digit) of base r.
    Type: Grant
    Filed: May 1, 2012
    Date of Patent: November 1, 2016
    Assignees: Proton World International N.V., STMicroelectronics S.r.l.
    Inventors: Gilles Van Assche, Joan Daemen, Guido Bertoni
  • Patent number: 9471288
    Abstract: Compiler based obfuscation is described. To protect portions of a code project with obfuscations, the code is modified within a compiler to produce one or more modifications that obfuscate the code as part of a compilation process. A compiled version of the code is generated having the modifications that are produced within the compiler. In one approach, the compiler is configured to consume an obfuscation description that indicates portions of the code to protect and specifies the modifications to make to the indicated portions. Various different modifications of code may be performed during the compilation process to implement corresponding obfuscation features. For example, the modifications made within a compiler may include, but are not limited to, modifications designed to enable tamper detection, anti-debugging, and/or encryption of the code.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: October 18, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Olaf Alexander Miller, Ten Tzen, Hakki T. Bostanci, Michael T. Pashniak, Kalpesh S. Patel
  • Patent number: 9467290
    Abstract: The disclosure provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one variation, the disclosure describes retaining compatibility with conventional Secure Sockets Layer (SSL) and SOCKS protocols, such that secure UDP datagrams can be transmitted between a proxy server and a client computer in a manner analogous to conventional SOCKS processing. Further, the disclosure describes a network arrangement that employs a cache having copies distributed among a plurality of different locations. SSL/TLS session information for a session with each of the proxy servers is stored in the cache so that it is accessible to at least one other proxy server. Using this arrangement, cached SSL/TLS communication session information may be retrieved and used by a second proxy server to accept a session with the client device when the client device switches proxy servers.
    Type: Grant
    Filed: August 19, 2013
    Date of Patent: October 11, 2016
    Assignee: AVENTAIL LLC
    Inventors: Marc D. VanHeyningen, Rodger D. Erickson
  • Patent number: 9465921
    Abstract: A computer-implemented method for selectively authenticating a request based on an authentication policy is described. A request is received from a client. A determination is made as to which authentication threshold is applied to the request based on an authentication policy. The request is authenticated if the authentication threshold is satisfied. The authentication threshold is modified if the request is not successfully authenticated.
    Type: Grant
    Filed: May 6, 2009
    Date of Patent: October 11, 2016
    Assignee: Symantec Corporation
    Inventors: Zulfikar Ramzan, Walter Bogorad
  • Patent number: 9465618
    Abstract: Methods, apparatuses, and systems that allow a microprocessor to optimally select an assist unit (co-processor) to reduce completion times for completing processing requests to execute functions. The methods, apparatuses, and systems include assist unit hardware, assist unit management software, or a combination of the two to optimally select the assist unit for completing a specific processing request. In optimally selecting an assist unit, the methods, apparatuses, and systems calculate estimated times for completing the processing request with conventional means and with assist units. The times are then compared to determine the fastest time for completing a specific processing request.
    Type: Grant
    Filed: January 8, 2014
    Date of Patent: October 11, 2016
    Assignee: Oracle International Corporation
    Inventors: Spiros Kalogeropulos, Partha Tirumalai
  • Patent number: 9459916
    Abstract: A system includes a plurality of information processing devices and a management device configured to manage execution of jobs performed by the plurality of information processing devices. The management device detects any one of the plurality of information processing devices which is executing a first job, at a predetermined time, and determines whether a second information processing device different from the first information processing device is able to be allocated to a second job which is scheduled to use the first information processing device being used by the first job after the predetermined time, among the plurality of information processing devices. The management device modifies an execution schedule of the jobs such that the second job is executed using the second information processing device when it is determined that the second information processing device is able to be allocated to the second job.
    Type: Grant
    Filed: November 10, 2014
    Date of Patent: October 4, 2016
    Assignee: FUJITSU LIMITED
    Inventor: Hiroki Yokota
  • Patent number: 9454457
    Abstract: A software test apparatus and a software test method and a computer readable medium thereof are provided. The software test apparatus stores a software testing program, an under-tested code, a plurality of basic test benches and a plurality of candidate test benches. The under-tested code includes a hard-to-detect code and the hard-to-detect code has at least one hard-to-detect section. The software test apparatus runs the software testing program to execute the following operations: parsing the hard-to-detect code to generate a condition-statement tree; based on the basic test benches and the condition-statement tree, using a support vector machine (SVM) to establish a support vector regression (SVR) predictor; and applying the SVR predictor to choose a best candidate test bench from the candidate test benches.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: September 27, 2016
    Assignee: Institute For Information Industry
    Inventor: Kai-Yuan Jan
  • Patent number: 9451452
    Abstract: A mesh station applying for access to a network includes a list of peer stations in messages of an authenticated key establishment protocol. A mesh key distributor derives a key delivery key and generates a top level key, and then delivers the top level key to the mesh station. Following the key establishment protocol, the mesh key distributor also creates pairwise keys for use between the mesh station and the peer stations listed in its peer list. The list of peers permits the identifier for the peer to be bound into the derived key, which helps ensure that the key used between each pair of peers is unique. Once the mesh key distributor finishes creating a key for one of the stations on the peer list, the mesh key distributor sends a message to the peer to initiate a key push.
    Type: Grant
    Filed: June 29, 2009
    Date of Patent: September 20, 2016
    Assignee: MOTOROLA SOLUTIONS, INC.
    Inventors: Stephen P. Emeott, Anthony J. Braskich
  • Patent number: 9443112
    Abstract: Embodiments of a secure media container and a method of using same are provided. In some embodiments, the secure media container includes a portable power supply; an antenna; a receptacle for receiving removable data storage; and a computer apparatus including a processor and a memory, comprising executable instructions that cause the processor to: determine that a removable data storage device has been input into the receptacle; track a location of the secure media container using the antenna; determine an action associated with the location of the secure media container by: accessing a database comprising a plurality of locations and associated actions; and comparing the location of the secure media container to the plurality of locations and associated actions in the database; and apply the action to the removable storage device based on the location of the secure media container.
    Type: Grant
    Filed: May 23, 2014
    Date of Patent: September 13, 2016
    Assignee: Bank of America Corporation
    Inventor: Manu Jacob Kurian
  • Patent number: 9442707
    Abstract: Methods, systems, and computer program products are provided that enable incremental compilation of source code. Attributes of an intermediate language (IL) representation and a compiled representation of a source code are stored. Modified source code that is a revised version of the first source code is received. An IL representation of the modified source code is generated. Attributes of the revised intermediate IL and the stored attributes of the IL representation are compared to determine a first set of functions changed in the modified source code. A second set of functions in the first source code is determined that includes functions affected the determined first set of functions. The first and second sets of functions are compiled to generate a set of compiled functions. Compiled versions of the first and second sets are replaced in the compiled representation of the first source code with the set of compiled functions.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: September 13, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Patrick W. Sathyanathan, Ten H. Tzen, Wenlei He, Ankit Asthana, Adrian Militaru