Patents Examined by David Pearson
  • Patent number: 9369459
    Abstract: A method of establishing secure groups of trusted contacts with access rights in a secure communication system. The method includes establishing secure groups of trusted contacts in the secure communication system; storing information corresponding to the trusted contacts of a secure group as a secure group in a database; and determining access rights of the secure group and storing the access rights in the database with the stored information corresponding to the secure group.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: June 14, 2016
    Assignee: CELLCRYPT GROUP LIMITED
    Inventor: Paul Anthony Galwas
  • Patent number: 9366718
    Abstract: A multi-die chip assembly is described, the multi-die chip assembly including at least one detection apparatus which detects manipulations of the multi-die chip assembly, the detection apparatus including a distributed circuit including a circuit whose elements are distributed among those dies which include the elements of a local reference circuit, the distributed circuit including a free running clock, at least one local reference circuit disposed in at least one die of the multi-die chip assembly, each of the local reference circuits including a free running clock, and at least one non-volatile memory, in which is stored during manufacture of the multi-die chip assembly, an allowed range of a result of a function having at least two arguments for each reference circuit a value of the frequency of the local reference circuit as manufactured, and a value of the frequency of the distributed circuit as manufactured, at least one element of the plurality of memories being disposed in each die including the elem
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: June 14, 2016
    Assignee: Cisco Technology Inc.
    Inventors: Chaim D. Shen-Orr, Lior Amarilio, Uri Bear
  • Patent number: 9363244
    Abstract: A method of authorization in a cryptographic system that provides separate authorization for a plurality of different input message groups using a single cryptographic key, including: receiving, by the cryptographic system, a first input message from a first input message group; performing, by the cryptographic system, a keyed cryptographic operation mapping the first input message into a first output message, wherein the keyed cryptographic operation produces a correct output message when the cryptographic system is authorized for the first input message group, wherein the keyed cryptographic operation does not produce a correct output when the cryptographic system is not authorized for the first input message group, and wherein each of the plurality of input message groups has an associated set of input messages wherein the sets of input messages do not overlap.
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: June 7, 2016
    Assignee: NXP B.V.
    Inventors: Wil Michiels, Jan Hoogerbrugge
  • Patent number: 9363266
    Abstract: Methods, systems, and apparatus for communicatively pairing and securing an electronic device to a vehicle based electronic system. The pairing can enable the electronic device to seamlessly communicate with the electronic device and can provide infotainment to users of the vehicle.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: June 7, 2016
    Assignee: Intel Corporation
    Inventors: Vijay Sarathi Kesavan, Victor B. Lortz, Anand P. Rangarajan, Xingang Guo, Somya Rathi, Ranjit Narjala
  • Patent number: 9357014
    Abstract: A service-based networking capability is presented. The service-based networking capability replaces traditional networking connections between endpoints with service connections between endpoints. The service-based networking capability supports establishment and use of a service connection between endpoints, where the service connection between endpoints may be provided below the application layer and above the transport layer. The establishment and use of a service connection between endpoints may be provided using a connected services stack, which may include a connected services layer that is configured to operate below the application layer and above the transport layer.
    Type: Grant
    Filed: April 29, 2014
    Date of Patent: May 31, 2016
    Assignee: Alcatel Lucent
    Inventors: John Shamilian, Sape Jurrien Mullender
  • Patent number: 9348768
    Abstract: A method for implemented encryption in a memory card, and a decryption method and device, and the method includes: receiving an input encryption key; requesting a subscriber identity card for authenticating the encryption key; after the authentication is successful, using the encryption key to encrypt plaintext data selected in the memory card the to generate encrypted data; generating encryption status information, wherein the encryption status information describes non-confidential information of the encrypted data. By using the encryption key in the subscriber identity card to encrypt data in the memory card, a user can freely select the data to be encrypted in the memory card, thereby enhancing data security in the memory card, facilitating the user operation, and enhancing the user experience.
    Type: Grant
    Filed: July 22, 2013
    Date of Patent: May 24, 2016
    Assignee: ZTE Corporation
    Inventor: Xipeng Li
  • Patent number: 9342668
    Abstract: An apparatus comprising a memory, a processor coupled to the memory and configured to obtain a protection description for media content comprising a plurality of content items, wherein the protection description comprises data signaling at least two protection mechanisms for at least two content items in a media content, wherein each of the at least two content items is protected by one or more of the at least two protection mechanisms, and wherein the protection mechanisms for the at least two content items are different, determine the protection mechanisms for the at least two content items from the data, and process the at least two content items according to their associated protection mechanisms.
    Type: Grant
    Filed: July 12, 2013
    Date of Patent: May 17, 2016
    Assignee: Futurewei Technologies, Inc.
    Inventors: Xin Wang, Shaobo Zhang, Alexander Giladi, Yongliang Liu
  • Patent number: 9338145
    Abstract: A method of patching a cryptographic implementation without changing a key in a cryptographic system, including: sending a message from a first message set to the cryptographic implementation, wherein the first message uses a first portion of the cryptographic implementation; deciding to patch the cryptographic implementation; sending a second message from a second message set to the cryptographic implementation after deciding to patch the cryptographic implementation, wherein the second message use a second portion of the cryptographic implementation that is not used for any messages in the first message set.
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: May 10, 2016
    Assignee: NXP B.V.
    Inventors: Wil Michiels, Jan Hoogerbrugge
  • Patent number: 9331856
    Abstract: A computer-implemented method for validating digital signatures may include (1) receiving, through a camera of smart glasses, an image of an object, (2) decrypting, using a processor of the smart glasses, a digital signature on the object to obtain a decrypted digital signature, (3) attempting, using the processor of the smart glasses, to validate the object by comparing content of the object with the decrypted digital signature, and (4) outputting a result of the attempt to validate the object from an output component of the smart glasses. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 10, 2014
    Date of Patent: May 3, 2016
    Assignee: Symantec Corporation
    Inventor: Qu Bo Song
  • Patent number: 9325682
    Abstract: An interactive streaming media and application service provider system can securely stream high resolution, multiple formats of video and data. Different data sets can be included in a single stream. A rights management system controls matrix manipulation and other aspects of user control of the data, including one or more of rendering in various different 2D, 3D, or other media formats, reconstruction and modeling, zooming, frame grab, print frame, parental controls, picture in picture, preventing unauthorized copying, adapting to different data transmission formats, adapting to different resolutions and screen sizes, and actively control functionality contained in embedded data, encryption/decryption. Control can be exerted by an external entity through a user-side virtual machine. Control codes can optionally be embedded in the media, embedded in the user's device, and/or sent separately to the device.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: April 26, 2016
    Assignee: TailStream Technologies, LLC
    Inventor: Kelley Wise
  • Patent number: 9317718
    Abstract: A system includes programmable systolic cryptographic modules for security processing of packets from a data source. A first programmable input/output interface routes each incoming packet to one of the systolic cryptographic modules for encryption processing. A second programmable input/output interface routes the encrypted packets from the one systolic cryptographic module to a common data storage. In one embodiment, the first programmable input/output interface is coupled to an interchangeable physical interface that receives the incoming packets from the data source. In another embodiment, each cryptographic module includes a programmable systolic packet input engine, a programmable cryptographic engine, and a programmable systolic packet output engine, each configured as a systolic array (e.g., using FPGAs) for data processing.
    Type: Grant
    Filed: February 11, 2014
    Date of Patent: April 19, 2016
    Assignee: Secturion Systems, Inc.
    Inventor: Richard J. Takahashi
  • Patent number: 9312926
    Abstract: A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted data and unencrypted data from the mobile device in which the encrypted data includes a second identifier. The reader device may evaluate whether the first identifier and the second identifier correspond to one another.
    Type: Grant
    Filed: February 7, 2014
    Date of Patent: April 12, 2016
    Assignee: Schlage Lock Company LLC
    Inventors: Jeffrey Scott Neafsey, Michael William Malone, Hamid Abouhashem
  • Patent number: 9313206
    Abstract: A method, comprising: storing, at a server device, an electronic resource; receiving, at the server device and from a client device associated with a first user, a request on behalf of the first user to access the electronic resource; responsive to receiving the request on behalf of the first user to access the electronic resource, enabling the client device associated with the first user to access the electronic resource; while the client device associated with the first user is accessing the electronic resource, receiving, at the server device and from the client device associated with the first user, a request to validate a representation of a credential purported to represent another user received by the client device; validating the received representation of the credential as representing a second user; and responsive to validating the received representation of the credential, enabling the first user to electronically sign the electronic resource.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: April 12, 2016
    Assignee: MicroStrategy Incorporated
    Inventors: Michael J. Saylor, Hector Vazquez, Peng Xiao, Andrew T. Foy
  • Patent number: 9307403
    Abstract: A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted data and unencrypted data from the mobile device in which the encrypted data includes a second identifier. The reader device may evaluate whether the first identifier and the second identifier correspond to one another.
    Type: Grant
    Filed: February 7, 2014
    Date of Patent: April 5, 2016
    Assignee: Schlage Lock Company LLC
    Inventors: Jeffrey Scott Neafsey, Michael William Malone, Hamid Abouhashem
  • Patent number: 9294494
    Abstract: Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service is integrated within a network security appliance by automatically configuring access settings for the logging service and providing a basic level of service from the logging service by registering a user account for the security appliance with the logging service. A log is transparently created within the logging service by making use of the automatically configured access settings and treating the logging service as a logging device. A request is received by the security appliance from an administrator to access data associated with the log. Responsive thereto and without requiring separate registration of the administrator with the cloud-based logging service, the data is transparently received by the security appliance from the logging service and is presented via a graphical user interface (GUI) of the security appliance.
    Type: Grant
    Filed: November 11, 2015
    Date of Patent: March 22, 2016
    Assignee: Fortinet, Inc.
    Inventor: Jun Yin
  • Patent number: 9280369
    Abstract: A particular method includes executing a software component on a virtual machine executing at a computing device. The method also includes monitoring kernel level events of an operating system executing on the virtual machine and monitoring application level events of the operating system. The method further includes analyzing effects of executing the software component on the virtual machine based on the kernel level events and the application level events.
    Type: Grant
    Filed: July 12, 2013
    Date of Patent: March 8, 2016
    Assignee: The Boeing Company
    Inventors: Terrance J. Kirk, Matthew S. Bialek, Shaun Kospiah, Timothy M. Lemm, Scott G. Thompson
  • Patent number: 9268944
    Abstract: This disclosure relates to methods and systems for performing software security audit for an executable code, the method comprising: receiving, by a hardware processor, the executable code along with a plurality of life-cycle artifacts associated with the executable code; performing a security assessment on the executable code and the plurality of life-cycle artifacts associated with the executable code to identify one or more potential security issues associated with the executable code; determining a first set of questions based on the identified one or more security issues associated with the executable code; determining a second set of questions based on a requirements specification associated with the executable code; and performing a security audit session with one or more audit participants based on the first set of questions and the second set of questions.
    Type: Grant
    Filed: February 10, 2014
    Date of Patent: February 23, 2016
    Assignee: Wipro Limited
    Inventor: Sourav Sam Bhattacharya
  • Patent number: 9262615
    Abstract: A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: February 16, 2016
    Assignee: DAON HOLDINGS LIMITED
    Inventors: Jason Chris Beloncik, Conor Robert White, Christopher Eric Holland, James Ahern
  • Patent number: 9252944
    Abstract: Embodiments relate to wrapping of a common cryptographic architecture (CCA) key token. An aspect includes wrapping, by an exporting computer, the CCA key token using a key wrapping export function, the CCA key token comprising a CCA key data section and an unencrypted control vector. Another aspect includes splitting the control vector into a first control vector portion and a second control vector portion. Another aspect includes encrypting the CCA key data section and the first control vector portion using an key encrypting key (KEK) to generate a wrapped key block. Another aspect includes binding the second control vector portion to the wrapped key block to form an associated data section, wherein the associated data section is not encrypted, and wherein the wrapped key block and the associated data section comprise a wrapped key token.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: February 2, 2016
    Assignee: International Business Machines Corporation
    Inventors: Todd W. Arnold, Gerald K. Boyter, Elizabeth A. Dames, Richard V. Kisley, Eric B. Smith
  • Patent number: 9237012
    Abstract: Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device, biological data; utilizing the biological data, at the implantable medical device, to generate a public cryptographic key; and utilizing the public cryptographic key, at the implantable medical device, to generate a private cryptographic key.
    Type: Grant
    Filed: April 1, 2015
    Date of Patent: January 12, 2016
    Assignee: NeuroPace, Inc.
    Inventor: Dean P Andersen