Patents Examined by Dant Shaifer-Harriman
  • Patent number: 9350732
    Abstract: A system for protecting the integrity of a memory system maintains an age counter and an opportunity counter for each of multiple memory blocks; maintains an epoch counter for the memory system; writes data in a selected memory block; increases the local sequence number of the selected memory block; updates the opportunity counter for the selected memory block if the local sequence number of the selected memory block rolls over; computes a message authentication code (MAC) in the selected memory block based on a global sequence number and the local sequence number; updates the age counter and the opportunity counter for any non-selected memory blocks if the opportunity counter for the non-selected memory blocks does not match the LSB of the epoch counter for the non-selected memory blocks; and computes a new MAC for any memory block for which the updating is performed.
    Type: Grant
    Filed: November 7, 2014
    Date of Patent: May 24, 2016
    Inventor: Michael Kenneth Bowler
  • Patent number: 9342690
    Abstract: A method and system for providing a security threat scoring service to identify and prioritize potential security threats to an online service. The method and system include determining security threat patterns, comparing traffic to the online system with the security threat patterns, and identifying portions of the traffic as a potential security threat. The method and system include assigning a threat score to the potential security threat, and providing the threat score to the online service to enable the online service to secure against the potential security threat.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: May 17, 2016
    Assignee: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera
  • Patent number: 9342675
    Abstract: A computer-implemented method includes prompting a user to provide an authentication typing sample by entering an authentication phrase on a keyboard, in order to authenticate the user submitting coursework in an online education course. The method involves determining whether the authentication typing sample matches an enrollment typing sample captured earlier. In the event the authentication typing sample matches the enrollment typing sample, the method involves authenticating the user's identity and accordingly determining whether the coursework is successfully submitted and signed by the user.
    Type: Grant
    Filed: August 11, 2014
    Date of Patent: May 17, 2016
    Assignee: Coursera, Inc.
    Inventors: Bipin Suresh, Christopher B. Heather, Jiquan Ngiam, Minjeong Kim, Pamela S. Fox, Andrew Yan-Tak Ng
  • Patent number: 9336384
    Abstract: A computer-implemented method for replacing application methods at runtime may include identifying an application at runtime that includes a target method to replace at runtime with a source method, locating a target address of a target method data structure (that includes a target code pointer to method code of the target method) within memory at runtime that is referenced by a target class, determining a source address of a source method data structure (that includes a source code pointer to method code of the source method) within memory at runtime that describes the source method, and modifying the application at runtime to have the target class reference the source method instead of the target method by copying the source method data structure from the source address to the target address and, thereby, replacing the target code pointer with the source code pointer. Various other methods and systems are also disclosed.
    Type: Grant
    Filed: April 24, 2013
    Date of Patent: May 10, 2016
    Assignee: Symantec Corporation
    Inventor: Vadim Nekhoroshev
  • Patent number: 9323935
    Abstract: Attribute data of an endpoint computing device is collected that describes attributes of the endpoint computing device. The attribute data is communicated to a security score generator and security score data is received for the endpoint computing device. A graphical dashboard interface is caused to be presented on a display device, the dashboard interface presenting a plurality of security ratings based on the security score data, each security rating representing an amount of risk determined to be associated with a corresponding user activity on the endpoint device in a plurality of user activities.
    Type: Grant
    Filed: December 18, 2012
    Date of Patent: April 26, 2016
    Assignee: McAfee, Inc.
    Inventors: Michael Condry, Sven Schrecker
  • Patent number: 9306950
    Abstract: An object of embodiments of the present invention is to establish a secure connection from a device to a private network, to which the device belongs, when the device may be located remotely from the private network. This is achieved by locating a server in the private network while reusing existing authorization mechanisms in the network. A target resource is in this private network and a device located outside the private network can access the target resource by using the server and a proxy agent which intermediates a request from the device by using a one time session URL.
    Type: Grant
    Filed: May 13, 2011
    Date of Patent: April 5, 2016
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventors: Kenta Yasukawa, Stefan Avesand, Johan Hjelm, Takeshi Matsumura, Shingo Murakami, Toshikane Oda
  • Patent number: 9298902
    Abstract: A system, method and program product for recording the creation of a cancelable biometric reference template in a biometric event journal record. The method includes providing a base biometric reference template having a unique base reference template identifier that uniquely identifies base biometric data collected for an individual, applying a data transform function having a first function key value to the base biometric reference template to create one cancelable biometric reference template and recording the one cancelable biometric reference template in a biometric event journal record. The method further includes creating additional cancelable biometric reference templates using different function key values of the data transform function. The method further includes encrypting the data transform function and the function key value applied to the base biometric reference template.
    Type: Grant
    Filed: February 12, 2009
    Date of Patent: March 29, 2016
    Assignee: International Business Machines Corporation
    Inventor: Phillip H. Griffin
  • Patent number: 9288188
    Abstract: A computer communication system including a client computer with an installed virtual private network (VPN) client and located in a public network, a server computer located in a corporate network, a web server remote from the client computer, a gateway computer located in the corporate network, and a VPN server computer located in the corporate network. The computer communication system is adapted to run following steps of providing a safe VPN communication connection between the client and the server computers: the client computer, using a WEB browser, downloads an application from the VPN server computer, and the downloaded application automatically configures the VPN client installed on the client computer and establishes a tunnelled connection from the client computer to the corporate network. All packets generated by the installed VPN client are forwarded through the tunnelled connection via the gateway computer to the VPN server in the corporate network.
    Type: Grant
    Filed: July 30, 2014
    Date of Patent: March 15, 2016
    Assignee: HOB GMBH & CO. KG
    Inventor: Klaus Brandstatter
  • Patent number: 9276963
    Abstract: Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: March 1, 2016
    Assignee: Intel Corporation
    Inventors: Tarun Viswanathan, Uri Kahana, Alan Ross, Eran Birk
  • Patent number: 9270594
    Abstract: Methods and apparatus are disclosed for applying network policy to communications originating at operating system virtual interfaces. In an example embodiment, a network device is networked with a switch. The network device may include a first operating system interface, a virtualization adapter, and an input output port. In an example embodiment, the virtualization adapter receives a first frame from the first operating system interface. The virtualization adapter may tag the first frame to indicate an association between the first frame and the first operating system interface. The first frame may then be transmitted with a second frame being associated with a second operating system interface, to the switch via the input output port. In an example embodiment, the switch is configured to receive the frame, examine a tag and then to enforce a network policy upon the first frame, based on the tag.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: February 23, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: James Paul Rivers, Chaitanya Kodeboyina, Ravi Kumar Gadde
  • Patent number: 9256731
    Abstract: A system includes a secure module structured to prevent information stored therein from being externally referenced; and an information processing apparatus configured to enable communication with the secure module. The information processing apparatus includes a first computer configured to execute a first verification process of verifying whether an application under execution by the information processing apparatus is in a secure state. The secure module includes a second computer, and a storage unit configured to store at least any one among a first feature amount obtained by extracting a feature of execution code of the first verification process, and execution code of an authentication process of authenticating the first verification process. The second computer is configured to execute a second verification process of verifying whether the first verification process under execution by the first computer is in a secure state, based on stored contents of the storage unit.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: February 9, 2016
    Assignee: SOCIONEXT INC.
    Inventors: Tetsuya Sasao, Masakazu Takakusu
  • Patent number: 9258793
    Abstract: Methods and systems for providing light weight client sessions. Connections are immediately decoupled from sessions when released by a user and made available to the same or other users. Re-authentication of the user to re-use a connection can be streamlined by maintaining client login data in a client login record cache.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: February 9, 2016
    Assignee: EMC Corporation
    Inventors: Roger W. Kilday, Shreyas Satyanand Kaushik, Siddaram Siddanna Bali, Xiaofeng Ma, Shu-Shang Sam Wei
  • Patent number: 9251376
    Abstract: A method and system to warn the user in the event of potential confidential document security violations. The method includes using a computer, electronically embedding a digital marker in an electronic document to create a marked document; storing the document on a non-removable non-transitory computer readable medium of the computer; upon a request for transmission of the marked document from the computer or for copying the marked document to a removable non-transitory computer readable medium, determining that the marked document contains the digital marker and displaying a warning on a display unit of the computer of the request based on the marked document containing the digital marker; and allowing the transmission or the copying only upon approval of release of the marked document by a human user of the computer.
    Type: Grant
    Filed: November 15, 2013
    Date of Patent: February 2, 2016
    Assignee: International Business Machines Corporation
    Inventors: Felice Mansi, Michele Paradiso, Valerio Summo
  • Patent number: 9250932
    Abstract: In one embodiment, a programmable multimedia controller that is capable of interfacing with and controlling audio, video, telephony or heating ventilation, and air conditioning (HVAC) devices. A first mobile device and a second mobile device of a same type are configured to communicate with the programmable multimedia controller. The first mobile device obtains a first copy of a sharable device configuration including data for rendering a user interface usable to control the programmable multimedia controller. It stores the first copy of the sharable device configuration and thereby is considered a master device with respect to other devices of the same type. The second mobile device obtains a second copy of the sharable device configuration for use on the second mobile device from the master device.
    Type: Grant
    Filed: April 7, 2014
    Date of Patent: February 2, 2016
    Assignee: Savant Systems, LLC
    Inventors: Timothy R. Locascio, Robert P. Madonna, David McKinley, Michael C. Silva
  • Patent number: 9251383
    Abstract: A device for preventing logging of computer on-screen keyboard has a pointer device and tandem device. The pointer device comprises a first transmission interface to connect the host computer, and an encryption module to encrypt and transfer data of the pointer device to the first transmission interface. This data contains pointer coordinates. A pointer data module is used to obtain, convert and save the coordinate data of the pointer device. A push-button data module is used to obtain, convert and save the push-button data of the existing pointer device. A physical interface module is used to obtain coordinates of the pointer device and original data of key events. The original data is converted into coordinates or push-button data of the pointer device by the pointer and push-button data modules. Then the encryption module decides if it is necessary to transfer the coordinate or push-button data in the form of encryption.
    Type: Grant
    Filed: November 13, 2013
    Date of Patent: February 2, 2016
    Inventor: Chi-Pei Wang
  • Patent number: 9251377
    Abstract: A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements ai, bi, ei, and fi for a current round (i) of a secure hash algorithm 2 (SHA2) hash algorithm. The instruction indicates a second source of a second packed data. The first packed data has a width in bits that is less than a combined width in bits of eight state data elements ai, bi, ci, di, ei, fi, gi, hi of the SHA2 hash algorithm. The method also includes storing a result in a destination indicated by the instruction in response to the instruction. The result includes updated state data elements ai+, bi+, ei+, and fi+ that have been updated from the corresponding state data elements ai, bi, ei, and fi by at least one round of the SHA2 hash algorithm.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: February 2, 2016
    Assignee: Intel Corporation
    Inventors: Gilbert M. Wolrich, Kirk S. Yap, Vinodh Gopal, James D. Guilford
  • Patent number: 9247311
    Abstract: Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: January 26, 2016
    Assignee: Sonic IP, Inc.
    Inventors: Michael George Kiefer, Eric William Grab, Jason Braness
  • Patent number: 9246894
    Abstract: When a user account is in an alternate (fault) state, communication or sync between an application provider and a device or client application typically is interrupted. When parties do not support rich fault messaging, communication of the reason for the interruption and remediation steps has been impossible. An application server provides rich fault messaging using applications that do not provide explicit error messaging and protocols that do not provide explicit error messaging without changing either the application or the protocol by additional interactions between an identity provider and the application server. The application server uses authentication state information provided by the identity server to generate a notification sync event that appears to the application and the protocol to be a normal sync event. The notification sync event is used to provide the user with information needed to determine what the problem with the account is and how to fix it.
    Type: Grant
    Filed: October 30, 2012
    Date of Patent: January 26, 2016
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.
    Inventors: Ariel N. Gordon, David J. Steeves, Luke T. Abrams, Pui-Yin Wong, Krishna C. Vitaldevara
  • Patent number: 9245153
    Abstract: A semiconductor device in related art has a problem that security on confidential information stored is insufficient. A semiconductor device of the present invention has a unique code which is unique to a device and generates unique code corresponding information from the unique code. The semiconductor device has a memory region in which specific information obtained by encrypting confidential information is stored in a region associated with the unique code corresponding information. The specific information read from the memory region is encrypted with the unique code corresponding information to generate the confidential information.
    Type: Grant
    Filed: June 3, 2014
    Date of Patent: January 26, 2016
    Assignee: Renesas Electronics Corporation
    Inventors: Daisuke Oshida, Masayuki Hirokawa, Akira Yamazaki, Takashi Fujimori, Shigemasa Shiota, Shigeru Furuta
  • Patent number: 9237148
    Abstract: An apparatus and method of displaying a message on a display of a computing device. The message comprises at least a first attachment. At least a portion of the message is displayed to a user. The displayed portion comprises an identifier for the first attachment. In one embodiment, a security encoding indicator is associated with the identifier for the first attachment and displayed to the user. If a security encoding has been applied to the first attachment, the security encoding indicator indicates the security encoding applied to the first attachment.
    Type: Grant
    Filed: August 20, 2007
    Date of Patent: January 12, 2016
    Assignee: BlackBerry Limited
    Inventors: Michael K. Brown, Michael G. Kirkup, Michael S. Brown