Patents Examined by Christopher Ruprecht
-
Patent number: 9906529Abstract: A relay apparatus includes a memory that stores right information indicating a right to access a service providing apparatus, a first retrieval unit that retrieves, from a client apparatus, identification information of a user registered in the service providing apparatus that is a target of an access request from the client apparatus, and an access unit that accesses the service providing apparatus as the target using the identification information retrieved by the first retrieval unit instead of the right information stored on the memory if the right information to access the service providing apparatus as the target is not valid.Type: GrantFiled: July 9, 2014Date of Patent: February 27, 2018Assignee: FUJI XEROX CO., LTD.Inventor: Kazumoto Shinoda
-
Patent number: 9716723Abstract: Methods of detecting anomalous behaviors associated with a fabric are presented. A network fabric can comprise many fungible networking nodes, preferably hybrid-fabric apparatus capable of routing general purpose packet data and executing distributed applications. A nominal behavior can be established for the fabric and represented by a baseline vector of behavior metrics. Anomaly detection criteria can be derived as a function of a variation from the baseline vector based on measured vectors of behavior metrics. Nodes in the fabric can provide a status for one or more anomaly criterion, which can be aggregated to determine if an anomalous behavior has occurred, is occurring, or is about to occur.Type: GrantFiled: October 20, 2015Date of Patent: July 25, 2017Assignee: Nant Holdings IP, LLCInventor: Thomas Wittenschlaeger
-
Patent number: 9646153Abstract: A method and system is provided for securing content from malicious shaders. The method includes determining the content the shader is to execute. A signature of the shader is verified in response to the shader attempting to execute on protected content. In response to the shader being verified, it is verified that the shader has not been modified. The shader is executed in response to not being modified.Type: GrantFiled: August 8, 2012Date of Patent: May 9, 2017Assignee: Intel CorporationInventors: Scott Janus, Brian Scully, Sanjay S. Nair, Gaurav Kumar
-
Patent number: 9614815Abstract: Methods, apparatus, and systems for securing the interactions of a user with an application using a Bluetooth enabled authentication device are disclosed.Type: GrantFiled: December 16, 2014Date of Patent: April 4, 2017Assignee: VASCO DATA SECURITY, INC.Inventors: Benoit Grange, Johan Verrept, Mathias Claes
-
Patent number: 9589134Abstract: Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, and where each of the transitions participates in any of a plurality of data flows in a set of security-sensitive data flows within the computer software application, applying a downgrader specification to the set of candidate downgrader placement locations, and determining that the downgrader specification provides full coverage of the set of security-sensitive data flows within the computer software application if at least one candidate downgrader placement location within each of the security-sensitive data flows is a member of the set of candidate downgrader placement locations.Type: GrantFiled: March 17, 2016Date of Patent: March 7, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Omer Tripp
-
Patent number: 9578030Abstract: There are provided a rule-set analyzer and a method of analyzing an ordered security rule-set comprising a plurality of rules and characterized by at least one extrinsic field. The method comprises: upon specifying atomic elements constituting an extrinsic space corresponding to the at least one extrinsic field, partitioning, by a processor, the extrinsic space into two or more equivalence classes, wherein each atomic element in the extrinsic space belongs to one and only one equivalence class; mapping, by the processor, said equivalence classes over the rule-set; and analyzing, by the processor, the security rule-set using the results of mapping said equivalence classes over the rule-set.Type: GrantFiled: July 10, 2014Date of Patent: February 21, 2017Assignee: TUFIN SOFTWARE TECHNOLOGIES LTD.Inventor: Yoni Lavi
-
Patent number: 9552492Abstract: A proxy server creates an index of keywords, receives an encrypted record, decrypts the received encrypted record as decrypted data and, when a keyword in the index is encountered in the decrypted data, associates in the index an encrypted record location identifier with the encountered keyword. The proxy server receives a search query and uses the keyword index to retrieve encrypted records from the server. The encrypted records are decrypted and sent as search results in response to the search query.Type: GrantFiled: December 9, 2013Date of Patent: January 24, 2017Assignee: Bitglass, Inc.Inventors: Anurag Kahol, Anoop Kumar Bhattacharjya, Balas Natarajan Kausik
-
Patent number: 9548861Abstract: A service provider device includes key generation means, which generates a service public key for encrypting data and a secret key, and proxy key generation means, which inputs the service public key and the secret key and generates a proxy key. A data registration device includes encrypted data generation means, which generates encrypted data upon input of the service public key and data, and stores the generated encrypted data in a database. Proxy devices each includes encrypted portion statistical data generation means, which generates encrypted portion statistical data upon input of the proxy key with respect to the encrypted data stored in the database. An integrated data generation device includes encrypted statistical data generation means, which inputs the encrypted portion statistical data from each of the proxy devices, generates encrypted statistical data, and stores the generated encrypted statistical data in an integrated data storage device.Type: GrantFiled: May 30, 2012Date of Patent: January 17, 2017Assignee: NEC CorporationInventor: Toshiyuki Isshiki
-
Patent number: 9536059Abstract: One embodiment provides a system that facilitates redistribution of content objects with a different name without requiring re-computation of the original authentication information. During operation, the system determines, by a content producing device, an original manifest which indicates at least an original name associated with a content object, wherein the name is a hierarchically structured variable length identifier (HSVLI) which comprises contiguous name components ordered from a most general level to a most specific level. The system renames the content object with a new name. The system also creates a new manifest which indicates the new name, wherein the new manifest includes original authentication information associated with the original manifest.Type: GrantFiled: December 15, 2014Date of Patent: January 3, 2017Assignee: PALO ALTO RESEARCH CENTER INCORPORATEDInventors: Ignacio Solis, Marc E. Mosko, Ersin Uzun
-
Patent number: 9531534Abstract: According to an embodiment, a generating device includes a first key generator, a second key generator, an output unit, and an update unit. The first key generator is configured to generate a first key that is a sequence of bits according to a first key rule on the basis of a random number. The second key generator is configured to generate multiple second keys that are sequences of bits partially having correlation with one another according to a second key rule on the basis of the first key. The output unit is configured to output the first key and at least one of the second keys. The update unit is configured to generate update information for updating a second key by updating a partial sequence of the second key, the partial sequence having no correlation with the other second keys not to be updated.Type: GrantFiled: July 9, 2014Date of Patent: December 27, 2016Assignee: Kabushiki Kaisha ToshibaInventors: Tsukasa Omino, Yuichi Komano
-
Patent number: 9526024Abstract: Concepts and technologies are disclosed herein for personal virtual core networks. A processor executing a network access service can determine if the user device should be isolated from a core network that provides devices at a location with connectivity. If the processor determines that the user device should be isolated, the processor can identify resources supporting the connectivity. The resources can include network resources and the core network. The processor can create a virtual core network to support the connectivity, and activate the virtual core network.Type: GrantFiled: August 7, 2014Date of Patent: December 20, 2016Assignee: AT&T Intellectual Property I, L.P.Inventor: Andrea Forte
-
Patent number: 9525556Abstract: A method for issuing a certificate signing request (CSR) certificate in a vehicle-to-anything (V2X) communication environment includes: receiving, at a first server, a certificate issuance request message including vehicle identification information transmitted from a communication module of the vehicle; determining, by a second server, whether a CSR certificate corresponding to the vehicle identification information has already been issued with reference to a database; and determining, by the second server, whether to issue the corresponding CSR certificate or whether to generate an error message, based on the determination of whether the corresponding CSR certificate has already been issued.Type: GrantFiled: December 15, 2014Date of Patent: December 20, 2016Assignees: Hyundai Motor Company, Penta Security System Inc.Inventors: Jong Rok Park, Cho Rong Ryu, Dae Sung Hwang, Su Lyun Sung, Dong Gyu Noh, Hahk Rel Noh, Duk Soo Kim, Sang Gyoo Sim, Eun Ho Shin, Jung Bai Kim, Byung Gwan Kim, Seok Woo Lee, You Sik Lee
-
Patent number: 9519780Abstract: A computer-implemented method for identifying malware may include (1) determining, for multiple commands within bytecode associated with a malware program, whether each command constitutes an invocation command, (2) filtering, based on the determination, invocation commands from the bytecode, (3) adding, for each invocation command filtered from the bytecode, an opcode, a format code, and a function prototype to a collection of opcodes, format codes, and function prototypes, (4) generating a digital fingerprint of the collection including the opcode, the format code, and the function prototype for each invocation command filtered from the bytecode, and (5) performing, by a computer security system, a remedial action to protect a user in response to detecting the presence of a variant of the malware program by determining that the digital fingerprint matches a candidate instance of bytecode under evaluation. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 15, 2014Date of Patent: December 13, 2016Assignee: Symantec CorporationInventor: Jiang Dong
-
Patent number: 9521126Abstract: While cloud services can offer processing from personal devices or synthesized data from multiple sources, many users prefer their data to remain private. According to some embodiments, private user data may be processed in the cloud without revealing the user identity to the cloud service provider. Only the user or an authorized agent of the user and the service's hardware platform have access to certain keys. The service application software and operating system only have access to encrypted data.Type: GrantFiled: August 21, 2013Date of Patent: December 13, 2016Assignee: Intel CorporationInventors: Mark D. Yarvis, Joshua Boelter, Sharad K. Garg, Hong Li
-
Patent number: 9501664Abstract: Techniques and mechanisms to detect and compensate for drift by a physically uncloneable function (PUF) circuit. In an embodiment, first state information is registered as reference information to be made available for subsequent evaluation of whether drift by PUF circuitry has occurred. The first state information is associated with a first error correction strength. The first state information is generated based on a first PUF value output by the PUF circuitry. In another embodiment, second state information is determined based on a second PUF value that is output by the PUF circuitry. An evaluation of whether drift has occurred is performed based on the first state information and the second state information, the evaluation including determining whether a threshold error correction strength is exceeded concurrent with a magnitude of error being less than the first error correction strength.Type: GrantFiled: December 15, 2014Date of Patent: November 22, 2016Assignee: Sandia CorporationInventor: Jason Hamlet
-
Patent number: 9491198Abstract: A request handler may be configured to receive an enforcement request for enforcement of an obligation required as a condition for a previously-granted first resource access request. n obligation enforcer may be configured to enforce the obligation, based on the enforcement request, and a compliance manager may be configured to obtain certification of execution of the obligation from an obligation certification service, and to provide the certification as a basis for granting a second resource access request.Type: GrantFiled: July 10, 2014Date of Patent: November 8, 2016Assignee: SAP SEInventors: Laurent Gomez, Slim Trabelsi
-
Patent number: 9473558Abstract: A method and system for utilizing target browsers. A client program is executed, which includes: (i) receiving a selection of at least one target browser by a user at a user interface at a first terminal, wherein the user interface displays two or more target browsers for each group of target browsers of two or more groups of target browsers from which the user has selected the at least one target browser; (ii) generating a message that includes the selected at least one target browser; and (iii) sending the message to a server.Type: GrantFiled: April 12, 2016Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventor: Atsushi Noguchi
-
Patent number: 9471790Abstract: Processing a downgrader specification by constructing a set of candidate downgrader placement locations found within a computer software application, where each of the candidate downgrader placement locations corresponds to a transition between a different pair of instructions within the computer software application, and where each of the transitions participates in any of a plurality of data flows in a set of security-sensitive data flows within the computer software application, applying a downgrader specification to the set of candidate downgrader placement locations, and determining that the downgrader specification provides full coverage of the set of security-sensitive data flows within the computer software application if at least one candidate downgrader placement location within each of the security-sensitive data flows is a member of the set of candidate downgrader placement locations.Type: GrantFiled: March 17, 2016Date of Patent: October 18, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Omer Tripp
-
Patent number: 9460283Abstract: Portable information handling systems dynamically allocate resources to anti-malware functions based upon available resources and threat status. Dynamic allocation of resources to anti-malware functions provides a timely and targeted response to specific threats with resources dedicated based upon availability and the impact on other information handling system functions. An adaptive mobile integrity validation system interfaces with plural portable information handling systems to selectively update anti-malware settings as threats emerge.Type: GrantFiled: October 9, 2012Date of Patent: October 4, 2016Assignee: DELL PRODUCTS L.P.Inventors: Nicholas Gnesda, Abhay Salunke
-
Patent number: 9444801Abstract: An example technique is provided for authenticating a first communication session. The technique includes receiving an indication that a first network device has established a first communication session with a user-side device. A second network device authenticates the first communication session by establishing a second communication session via session initiation protocol (SIP) or voice over Internet protocol (VoIP) communication with the user-side device before the user-side device directs a user password to the first network device in the first communication session. Also, private identification information of the user is retrieved from a database and sent to the user-side device in the second communication session. The user-side device compares the private identification information received in the second communication session to locally stored private identification information to determine whether the received private identification information matches.Type: GrantFiled: October 13, 2011Date of Patent: September 13, 2016Assignee: Alcatel LucentInventors: Yutang Luo, Yaoxian Zhang, Margi Rinaldo