Patents Examined by Dereena Cattungal
  • Patent number: 9569638
    Abstract: A trusted computing device (TCD) includes an isolated environment, host interface, secure interface, and program instructions. The environment includes an isolated environment processor (IEP), memory (secure and non-secure partition), and an auxiliary processor (AP). Memory and AP are connected for data communication with the IEP, and communicate with a host only through the IEP. The host interface and each secure interface are connected for data communication with the IEP.
    Type: Grant
    Filed: December 31, 2014
    Date of Patent: February 14, 2017
    Assignee: GOOGLE INC.
    Inventors: Peiter Charles Zatko, Dominic Rizzo
  • Patent number: 9563769
    Abstract: A system and method for securely loading data in a cache memory associated with at least one secure processor that performs data processing by using at least one untrusted external memory storing data to be processed, at least one secure internal cache memory to load or store data, and at least one secure cache translator operating as a memory management unit. The secure cache translator stores, into a secure cache digest table, parameters arranged on persistent and variable data pages. The parameters comprise at least a root digest based on node digests calculated on at least one persistent data page according to a Merkle tree structure. The integrity of the data pages is verified during transfers between the secure internal cache memory and the external memory by comparing a calculated root digest with the root digest stored in the secure cache digest table.
    Type: Grant
    Filed: June 10, 2015
    Date of Patent: February 7, 2017
    Assignee: NAGRAVISION S.A.
    Inventors: Didier Hunacek, Marco Macchetti, Patrick Servet
  • Patent number: 9560063
    Abstract: An apparatus and method for detecting a malicious domain cluster. The apparatus for detecting a malicious domain cluster includes a domain name server (DNS) data collection unit and a malicious domain cluster detection unit. The DNS data collection unit collects DNS traffic over a network, and stores the DNS traffic in a database. The malicious domain cluster detection unit generates a domain cluster based on the DNS data, learns the characteristics of normal and malicious clusters in the domain cluster, and detects whether the domain cluster is malicious based on the result of the learning.
    Type: Grant
    Filed: June 10, 2015
    Date of Patent: January 31, 2017
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Changho Choi, Brent ByungHoon Kang, Sungryoul Lee, JungMin Kang
  • Patent number: 9509499
    Abstract: A method for registering a first electronic key, which is capable of controlling a communication subject, to a controller of the communication subject, the method including: performing an initial production process including storing identification information unique to the communication subject in the controller, and storing an encryption key generation code unique to the first electronic key and an encryption key that is used to verify the first electronic key in the first electronic key; and performing an initial registration process including writing the identification information stored in the controller to the first electronic key, obtaining the encryption key generation code from the first electronic key, generating the encryption key with an encryption key generation logic that uses the encryption key generation code, storing the encryption key in the controller, and storing encryption key information related to the encryption key in a database in association with the identification information.
    Type: Grant
    Filed: January 18, 2013
    Date of Patent: November 29, 2016
    Assignee: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHO
    Inventors: Daisuke Kawamura, Hideki Kawai, Tetsuya Egawa, Hiroaki Iwashita, Toshihiro Nagae, Masaki Hayashi
  • Patent number: 9438423
    Abstract: An encryption server receives encrypted data which is encrypted by using a public key of a first user and which is added with auxiliary information calculated using a combination of a secret key and the public key of the first user and data to be encrypted. Then, the encryption server generates re-encrypted data obtained by re-encrypting the encrypted data using the auxiliary information added to the encrypted data, a public key of a second user, and encrypted information related to the secret key of the first user which is encrypted with the public key of the second user.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: September 6, 2016
    Assignee: FUJITSU LIMITED
    Inventors: Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
  • Patent number: 9349007
    Abstract: Apparatus and method for transforming Web resources into safe versions such that malicious code on the resources cannot attack the client viewing the resources. The invention separates the processing of insecure code from the processing of benign code. For Web pages, the benign code is displayed immediately to the client while insecure code is processed on a separate machine. Once insecure code is processed, benign outputs of that code are passed to the client for display. The invention safeguards the client against known and zero day exploits without requiring a catalog of malware/virus signatures, heavyweight code checkers, complete page re-writing or highly restrictive access policies. The invention provides the client with complete malware blocking while retaining most of the original functionality of the Web resource.
    Type: Grant
    Filed: May 29, 2014
    Date of Patent: May 24, 2016
    Assignee: The United States of America as represented by the Secretary of the Air Force
    Inventor: Frank H. Born