Patents Examined by Carlos M De Jesus Lassaia
  • Patent number: 9298910
    Abstract: A method is provided in one example embodiment that includes receiving in an external handler an event notification associated with an event in a virtual partition. A thread in the process in the virtual partition that caused the event can be parked. Other threads and processes may be allowed to resume while a security handler evaluates the event for potential threats. A helper agent within the virtual partition may be instructed to execute a task, such as collecting and assembling event context within the virtual partition, and results based on the task can be returned to the external handler. A policy action can be taken based on the results returned by the helper agent, which may include, for example, instructing the helper agent to terminate the process that caused the event.
    Type: Grant
    Filed: June 8, 2011
    Date of Patent: March 29, 2016
    Assignee: McAfee, Inc.
    Inventors: Gregory W. Dalcher, Jonathan L. Edwards
  • Patent number: 9251317
    Abstract: Embodiments related to network video messaging are disclosed. One disclosed embodiment provides a method that comprises receiving a video message from a client application of a source client; associating a navigation link with the video message; transmitting a notification message to the recipient client including the navigation link; receiving a retrieval request from the recipient client to access the video content via the navigation link; and transmitting the video content to the recipient client responsive to receiving the retrieval request by providing a persistent download of the video content from the storage server if the download condition indicates that a persistent download of the video content is permissible; and providing a transient download of the video content to the recipient client while prohibiting a persistent download of the video content if the download condition indicates that a persistent download of the video content is not permissible.
    Type: Grant
    Filed: March 23, 2009
    Date of Patent: February 2, 2016
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Zhangwei Xu, Martin Hall, Mark McNulty, Guruprakash Rao, Xiaofeng Gao, Fei Chen, Ricardo Lopez-Barquilla, Martin Holladay
  • Patent number: 9185093
    Abstract: A method is provided in one example embodiment and includes receiving information for network traffic in a wireless network; correlating the information with a subscriber of a plurality of subscribers; and generating a behavior profile for the subscriber based on the information over a period of time.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: November 10, 2015
    Assignee: McAfee, Inc.
    Inventors: Bikram Kumar Gupta, Sudarshan Swamy, Srikant Vissamsetti
  • Patent number: 9130758
    Abstract: A method and system for renewal of expired certificates is described. In one embodiment, a method, implemented by a computing system programmed to perform operations, includes receiving, at a certificate manager of a computing system from a requester, a certificate renewal request for an original digital certificate that has already expired, and renewing the expired certificate as a renewed certificate by the certificate manager when the certificate renewal request is approved. The renewed certificate comprises the same key pair as the original certificate, but includes a new expiration date, and wherein the renewed certificate is functionally identical to the original certificate.
    Type: Grant
    Filed: November 10, 2009
    Date of Patent: September 8, 2015
    Assignee: Red Hat, Inc.
    Inventors: Christina Fu, Ade Lee
  • Patent number: 9124636
    Abstract: In one example, a network device may store health status information specifying a current security status for each of a plurality of authenticated endpoint devices in accordance with an authorization data model. The network device may update the current security status of each of at least two of the plurality of authenticated endpoint devices connected to an enterprise network to indicate that each of the at least two of the plurality of authenticated endpoint devices has a compromised security status, and identify a characteristic common to both of the authenticated endpoint devices having the compromised security status. The network device may interface with one or more policy enforcement devices to quarantine a set of endpoint devices associated with the identified characteristic. The current security status of at least one of the quarantined endpoint devices may indicate that the quarantined endpoint device does not have a compromised security status.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: September 1, 2015
    Assignee: Pulse Secure, LLC
    Inventor: Hirendra Rathor
  • Patent number: 9094379
    Abstract: In one embodiment, a system and associated processes for transparent client-side cryptography are provided. In this system, some or all of a user's private data can be encrypted at a client device operated by the user. The client can transmit the encrypted user data to a content site that hosts a network application, such as a social networking application, financial application, or the like. The content site can store the private data in its encrypted form instead of the actual private data. When the content site receives a request for the private data from the user or optionally from other users (such as social networking friends), the server can send the encrypted user data to a client associated with the requesting user. This client, if operated by an authorized user, can decrypt the private data and present it to the authorized user.
    Type: Grant
    Filed: December 29, 2010
    Date of Patent: July 28, 2015
    Assignee: Amazon Technologies, Inc.
    Inventor: Kevin Miller
  • Patent number: 9075991
    Abstract: Security of sensitive information stored on a computing system is protected by monitoring a set of performance indicators of the computing system and executing remedial measures to protect the sensitive information when the set of performance indicators indicates a likelihood of malicious activity. A particular technique involves limiting the amount of sensitive information looted during a malicious attack on a computing system. The technique includes monitoring a set of performance indicators of the computing system. The set of performance indicators provides a measure of sensitive information being accessed on the computing system. The technique further includes testing whether the monitored set of performance indicators indicates a likelihood of looting, and temporarily reducing access to the sensitive information on the computing system in response to the act of testing indicating a likelihood of looting.
    Type: Grant
    Filed: June 8, 2011
    Date of Patent: July 7, 2015
    Assignee: EMC Corporation
    Inventor: Todd Leetham
  • Patent number: 9038184
    Abstract: A security server renders a plurality of web pages. The security server logs script operations of the plurality of web pages that are performed when the web pages are rendered. Sequences of script data values that result from the script operations are determined. The sequences of script data values are tagged as either malicious or non-malicious based on whether the script operations associated with the sequence of script data values resulted in abnormal behavior in the computer. A statistical analysis is performed on the malicious and non-malicious script data values to determine likelihoods that identified sequences of script data values represent malicious behavior. The security server generates security data based on the statistical analysis. The security data are provided to clients. The clients monitor script operations of web pages accessed by the clients, and use the security data to identify malicious script operations.
    Type: Grant
    Filed: February 17, 2010
    Date of Patent: May 19, 2015
    Assignee: Symantec Corporation
    Inventor: Uriel Mann
  • Patent number: 9015822
    Abstract: A system and method for providing DTN services to legacy applications is provided. According to one example, a method for providing delay tolerant networking (DTN) services to legacy applications includes acts of intercepting a packet addressed to a software application, the packet including a payload, the software application being resident on a first computer, determining suitability of the packet for DTN processing and encoding the payload into a DTN bundle. According to another example, a system for providing delay tolerant networking (DTN) services to legacy applications includes a network interface, a memory and a controller coupled to the network interface and the memory. In this example, the controller is configured to intercept a packet addressed to a software application, the packet including a payload, the software application being resident on a computer, determine suitability of the packet for DTN processing and encode the payload into a DTN bundle.
    Type: Grant
    Filed: November 12, 2009
    Date of Patent: April 21, 2015
    Assignee: Raytheon Company
    Inventor: Erwin W. Bathrick
  • Patent number: 8995651
    Abstract: A system includes an interface module, an addressing module, and a multiplier module. The interface module is configured to (i) receive operands and configuration data for a Rivest-Shamir-Adleman (RSA) operation or an Elliptic Curve Cryptography (ECC) operation, and (ii) control access to a random access memory (RAM). The addressing module is configured to allocate memory space within the RAM for storage of the operands. The multiplier module includes a Montgomery multiplier configured to perform Montgomery multiplication operation for both the RSA operation and the ECC operation.
    Type: Grant
    Filed: June 9, 2011
    Date of Patent: March 31, 2015
    Assignee: Marvell International Ltd.
    Inventors: Sean Lee, Chang Shu, Fei Sun
  • Patent number: 8943605
    Abstract: A method, system, and medium are provided for sharing content among network devices. The system includes at least one base station and network devices that are part of a wireless network. The base station is configured to receive a request for content from a network device. The content may be available on a second network device proximate to the first network device. The base station may generate a temporary key that allows the first network device to access the content available on the second network device while proximity between the first network device and the second network device is maintained. The base station, in turn, transmits the temporary key to the first network device.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: January 27, 2015
    Assignee: Sprint Communications Company L.P.
    Inventors: Geoffrey Scott Martin, Michael Philip Dougan
  • Patent number: 8898740
    Abstract: A computing system includes a processor; and a memory communicatively coupled to the processor. The processor is configured to: generate a challenge response test image comprising a plurality of well-formed construct elements forming a well-formed construct and a plurality of random construct elements; and provide a plurality of masks to be placed over the image, one of the number of masks configured to reveal the well-formed construct elements when placed over the image.
    Type: Grant
    Filed: June 8, 2011
    Date of Patent: November 25, 2014
    Assignee: International Business Machines Corporation
    Inventors: Stephen Paul Kruger, Olgierd Stanislaw Pieczul
  • Patent number: 8869246
    Abstract: A method for providing a challenge response test associated with a computer resource performed by a physical computing system includes, with the physical computing system, generating a challenge response test image comprising a plurality of well-formed construct elements forming a well-formed construct and a plurality of random construct elements, and providing a number of masks to be placed over the image, one of the number of masks configured to reveal the well-formed construct elements when placed over the image.
    Type: Grant
    Filed: March 21, 2012
    Date of Patent: October 21, 2014
    Assignee: International Business Machines Corporation
    Inventors: Stephen Paul Kruger, Olgierd Stanislaw Pieczul
  • Patent number: 8868932
    Abstract: An apparatus includes a storage device, a position comparison processor coupled to the at least one storage device, and a display coupled to the position comparison processor. A plurality of files is stored on the storage device, wherein each file contains at least one item of confidential information and wherein a geographic location of use is associated with the file. The position comparison processor compares a current geographic location with each of the geographic locations of use associated with the plurality of files and the display displays contents of a selected file, wherein the geographic location of use associated with the selected file matches the current geographic location.
    Type: Grant
    Filed: September 10, 2012
    Date of Patent: October 21, 2014
    Assignee: Keeper Security, Inc.
    Inventors: Craig B. Lurey, Darren S. Guccione
  • Patent number: 8850554
    Abstract: An approach is provided for providing separation of authentication protocols and/or authentication contexts for client-server and server-server communication in network communication. A proxy server receives a request to initiate a service session. The request includes a first authentication context. The proxy server request verification of the first authentication context from an authentication server and validates the first authentication context based, at least in part, on the verification. The proxy server implements a second authentication context based, at least in part, on the verification of the first authentication context to initiate the service session.
    Type: Grant
    Filed: February 17, 2010
    Date of Patent: September 30, 2014
    Assignee: Nokia Corporation
    Inventors: Jari Otranen, Lauri Tarkkala, Deepali Khushraj
  • Patent number: 8798265
    Abstract: A handheld communications device and method for transmitting an encryption key are provided. The method comprises: generating an encryption key via the data processor, the encryption key comprising a bit sequence; and varying an output of the display device over a period of time to transmit the encryption key from the handheld communications device by varying at least one of a sequence at least one of colour rendered on the display device or a sequence of brightness levels output by the display device.
    Type: Grant
    Filed: August 3, 2012
    Date of Patent: August 5, 2014
    Assignee: BlackBerry Limited
    Inventors: Marc Drader, James Robinson, Michael Purdy
  • Patent number: 8800045
    Abstract: A management platform that allows security and compliance users to view risks and vulnerabilities in their environment with the added context of what other mitigating security countermeasures are associated with that vulnerability and that are applicable and/or available within the overall security architecture. Additionally, the platform allows users to take one or more actions from controlling the operation of a security countermeasure for mitigation purposes to documenting the awareness of a security countermeasure that is in place.
    Type: Grant
    Filed: February 11, 2012
    Date of Patent: August 5, 2014
    Assignee: Achilles Guard, Inc.
    Inventors: Michael S. Curtis, Audian H. Paxson, Eva E. Bunker, Nelson W. Bunker, Kevin M. Mitchell
  • Patent number: 8798266
    Abstract: A handheld communications device for transmitting an encryption key is provided. The device comprises a display device, and a data processor. The data processor of the handheld communications device is in communication with the display device. The data processor is configured to generate an encryption key, and to vary a visual output of the display device over time in accordance with a bit sequence of the encryption key. The varying visual output comprises a sequence of colors and/or brightness levels output by the display device.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: August 5, 2014
    Assignee: BlackBerry Limited
    Inventors: Marc A. Drader, James Alexander Robinson, Michael Lorne Purdy
  • Patent number: 8745745
    Abstract: Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or data isolation. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a rootkit defense mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it), inter alia, for detection and/or prevention of malicious code, for example, in a manner/context that is isolated and not able to be corrupted, detected, prevented, bypassed, and/or otherwise affected by the malicious code.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: June 3, 2014
    Assignee: Lynuxworks, Inc.
    Inventors: Edward T. Mooring, Phillip Yankovsky
  • Patent number: 8738934
    Abstract: A method and apparatus are provided for protecting confidential information. The method includes the steps of providing a plurality of files where each file contains at least one item of secret information, such as a password for a private account. Access to the plurality of files is password protected with a master password. To access the plurality of files, the master password must be entered into a master password entry field. The files are deleted upon successive entry of incorrect passwords into the master password entry field a predetermined number of times.
    Type: Grant
    Filed: August 26, 2010
    Date of Patent: May 27, 2014
    Assignee: Keeper Security, Inc.
    Inventors: Craig B. Lurey, Darren S. Guccione