Patents Examined by Devin Almeida
  • Patent number: 8713654
    Abstract: In the presently preferred embodiment of the invention, every time a user submits a form the client software tries to match the submitted information with the stored profile of that user. If a match is discovered, the program tags the field of the recognized data with a corresponding type. The resulting profile can be used after that to help all subsequent users to fill the same form.
    Type: Grant
    Filed: August 23, 2012
    Date of Patent: April 29, 2014
    Assignee: Facebook, Inc.
    Inventors: Ognian Z. Topalov, Eric Hohenstein
  • Patent number: 8712054
    Abstract: The present invention discloses a method and system for establishing an enhanced key when a terminal moves from an EUTRAN to an enhanced UTRAN, so as to ensure that the terminal can carry out normal communication safely in the enhanced UTRAN. The method includes: when the terminal moves from the EUTRAN to the enhanced UTRAN, a target enhanced serving GPRS support node (SGSN+) in the enhanced UTRAN deducing an intermediate key used in the UTRAN according to a mapped traditional key obtained from a source mobile management entity; and the terminal, after deducing the mapped traditional key, further deduces the intermediate key used in the enhanced UTRAN by using an algorithm which is the same as that of the target SGSN+ according to the mapped traditional key.
    Type: Grant
    Filed: April 2, 2011
    Date of Patent: April 29, 2014
    Assignee: ZTE Corporation
    Inventors: Chengyan Feng, Xintai Wang
  • Patent number: 8707427
    Abstract: Systems and methods for detecting malware in a selected computer that is part of a network of computers. The approach includes inspecting a predetermined set of operational attributes of the selected computer to detect a change in a state of the selected computer. In response to a detected change in state, the selected computer is scanned to create a snapshot of the overall state of the selected computer. The snapshot is transmitted to an analytic system wherein it is compared with an aggregated collection of snapshots previously respectively received from a plurality of computers in the computer network. Based on the comparison, anomalous state of the selected computer can be identified. In turn, a probe of the selected computer is launched to gather additional information related to the anomalous state of the selected computer so that a remediation action for the anomalous state of the selected computer can be generated.
    Type: Grant
    Filed: April 6, 2010
    Date of Patent: April 22, 2014
    Assignee: Triumfant, Inc.
    Inventors: David E. Hooks, Mitchell N. Quinn
  • Patent number: 8707059
    Abstract: An intrusion detection module includes an enclosure and a sensor to detect a predetermined type of intrusion. The module further includes a tamper sensor to detect a tampering attempt. An encryption mechanism is coupled to receive signals from the sensor and tamper sensor and encrypt such signals for transmission to a control panel.
    Type: Grant
    Filed: January 7, 2011
    Date of Patent: April 22, 2014
    Assignee: Cinch Systems, Inc.
    Inventors: Joel Curtis Christianson, Gregory Brett Olson
  • Patent number: 8683609
    Abstract: A system, method and program product for controlling access to a restricted item. A method is provided that includes: receiving a request for access to a restricted item at a computer system associated with a provider, said request originating from a client system; determining an IP address of the client system; determining a mobile phone number of a mobile phone associated with the requester; transmitting to a third party service provider the IP address and mobile phone number; and receiving back from the third party service provider a confirmation message indicating whether or not the IP address and mobile phone are located within an acceptable range of each other.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: March 25, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jose F. Bravo, Jeffery L. Crume
  • Patent number: 8683203
    Abstract: Systems and methods are disclosed for enhancing anti-terrorism public safety measures, by more securely determining whether explosives or other contraband have been inserted into notebook computer batteries or other large, replaceable subsystems of electronic devices. Because notebook computers typically require large, heavy batteries, they present attractive containers for smugglers and terrorists attempting to bring explosives onto an airplane. The disclosed security testing system provides more reliable results than many current tests, and does not require that the device under test be powered on. The systems and methods disclosed use out-of-band authentication for added security.
    Type: Grant
    Filed: December 27, 2012
    Date of Patent: March 25, 2014
    Inventors: Kelce S Wilson, Jeff A. Hughes
  • Patent number: 8683595
    Abstract: A computer-implemented method for detecting potentially malicious content within NFC messages may include identifying an NFC message received by a mobile device via wireless transmission from an NFC device located in proximity of the mobile device. The method may also include determining that the NFC message is formatted in a suspicious format type capable of importing potentially malicious content into the mobile device and then scanning the NFC message for potentially malicious content in response to the determination. The method may further include detecting at least one instance of potentially malicious content while scanning the NFC message. In addition, the method may include performing at least one security action on the mobile device in response to the detection of the instance of potentially malicious content within the NFC message. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 13, 2012
    Date of Patent: March 25, 2014
    Assignee: Symantec Corporation
    Inventor: Clifton Barker
  • Patent number: 8683564
    Abstract: Systems and methods for One-Time Password (OTP) authentication with infinite nested hash chains are described. In one aspect, a methodology includes a client device that provides a one-time password (OTP) authentication server with certain registration information. The client device generates, via the OTP authentication server, an authenticated OTP with infinite nested hash chains, These generating operations use a first hash function (hA (?)) for updating a seed chain, a second hash function (hB (•)) for OTP production, an OTP seed number stOTP for a tth authentication, and two authentication seeds of numbers s2t?1Auth and s2tAuth, for the tth authentication.
    Type: Grant
    Filed: November 17, 2010
    Date of Patent: March 25, 2014
    Assignee: King Saud University
    Inventors: Muhammad Khurram Khan, Mohamed Hamdy Khalil Eldefrawy, Khaled Soliman Alghathbar
  • Patent number: 8677477
    Abstract: Provided is an application program launching method and system for improving security of an embedded Linux kernel by distributing superuser privileges. The method includes: searching security set information on an application program selected by a user; changing a user account for a processor of the application program to a user ID associated with the application program in the security set information; setting a capability for the processor according to setting information for the capability in the security set information; changing a basic directory for the processor according to a basic directory in the security set information; and launching the application program.
    Type: Grant
    Filed: December 4, 2007
    Date of Patent: March 18, 2014
    Assignees: Samsung Electronics Co., Ltd., Electronics and Telecommunications Research Institute
    Inventors: Kang-Hee Kim, Dong-Hyouk Lim, Yong-Bon Koo, Yung-Joon Jung, Yong-Gwan Lim, Jae-Myoung Kim
  • Patent number: 8650629
    Abstract: In one embodiment, the present invention includes a system-on-a-chip (SoC) with first and second cores, interface logic coupled to the cores, chipset logic coupled to the interface logic, and a virtual firewall logic coupled between the chipset logic and the second core. The interface logic may include a firewall logic, a bus logic, and a test logic, and the chipset logic may include a memory controller to provide for communication with a memory coupled to the SoC. In some system implementations, both during test operations and functional operations, the second core can be disabled during normal operation to provide for a single core SoC, enabling greater flexibility of use of the SoC in many different implementations. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: February 11, 2014
    Assignee: Intel Corporation
    Inventors: Ramana Rachakonda, Lance E. Hacking, Mahesh K. Reddy, Lori R. Borger, Chee Hak Teh, Pawitter P. Bhatia, John P. Lee
  • Patent number: 8640208
    Abstract: The present description refers in particular to a computer-implemented method, a computer system, and a computer program product. The method may comprise providing authentication enforcement at resource level by specifying at design time at least one authentication key for at least one data storage unit of a resource. A request may be received at a server from a requester through a client to access the resource. Authentication of the requester may be enforced through the at least one authentication key at the at least one data storage unit of the resource.
    Type: Grant
    Filed: November 28, 2007
    Date of Patent: January 28, 2014
    Assignee: SAP AG
    Inventors: Azzedine Benameur, Paul El Khoury, Cedric S. P. Ulmer
  • Patent number: 8635694
    Abstract: Disclosed are systems, methods and computer program products for detection, classification and reporting of malicious software. A method comprises loading software code into a computer system memory and emulating the software code. The software code and its activity log are then analyzed for presence of a malware. If a malware is detected, an execution flow graph is created from the activity log. The execution flow graph is then parsed using heuristic analysis to identify one or more malicious behavior patterns therein. Then, similarity indexes between the identified malicious behavior patterns and one or more malicious behavior patterns associated with known classes of malware are computed. The emulated software code is then classified into one or more classes of malware based on the computed similarity indexes. Finally, a comprehensive malware report of the emulated software code is generated based on the execution flow graph and malware classification information.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: January 21, 2014
    Assignee: Kaspersky Lab ZAO
    Inventors: Alexey Malyshev, Timur Biyachuev, Dmitry Ilin
  • Patent number: 8595512
    Abstract: The present application relates to the field of technology of cloud storage data security, and in particular, relates to a data control method of cloud storage. The method comprises: converting the original data by a preset method into irreversible data blocks to form a physical part of the original data, and storing it in the cloud storage data center; outputting information necessary for data restoration of the process of converting the original data to the physical part, as a logical part of the original data, and storing the logical part of the original data in an original data owner controlled storage media. In this invention, the original data to be stored is converted into the physical part, which is then stored in a cloud storage data center. The logical part of the original data required for restoring the physical part to the original data is controlled by owners of the original data.
    Type: Grant
    Filed: December 1, 2010
    Date of Patent: November 26, 2013
    Assignee: Beijing Z & W Technology Consulting Co., Ltd
    Inventor: Hui Liu
  • Patent number: 8590033
    Abstract: Proper function and security of a complex network for communicating data within a process control system may be manually or automatically “locked-down” with a single command for an entire process control network or portions of the network. A user or application monitors network communication over multiple network devices. Once the network is configured and properly communicates data over the process control network, the application may lock down the network by deactivating or “locking out” access points on the network that are open and unused or have invalid connections. Locking down the network may essentially freeze it in a properly configured and functioning state and restrict future re-configuration of the network devices or harmful communication over an open or unused access point. When locked, is a currently connected device is unplugged and a different device is plugged into the access point, the network device may refuse the connection.
    Type: Grant
    Filed: June 1, 2009
    Date of Patent: November 19, 2013
    Assignee: Fisher-Rosemount Systems, Inc.
    Inventors: Trevor D. Schleiss, Robert K. Huba
  • Patent number: 8582768
    Abstract: A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter value that is incremented independently by each of the transmitter and the receiver. Attempts are made to decrypt the data of a received packet multiple times using different, respective counter values, to produce multiple respective decrypted outputs. A decrypted output in which the data has been decrypted correctly is identified, the counter value is corrected, and the data of the received packet is recovered from the identified decrypted output.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: November 12, 2013
    Assignee: Marvell World Trade Ltd.
    Inventors: Danny Alexander, Amit Wix
  • Patent number: 8561178
    Abstract: In general, in one aspect, an interface chipset includes at least one interface to receive user commands from input devices, filters to monitor the received user commands and to copy the user commands associated with at least a subset of the input devices, and an isolated execution environment. The isolated execution environment is to provide a secure communication link between an on-line application and a remote service provider. The isolated execution environment is also to detect at least some subset of user command modifications, on-line application code modifications, and on-line application process flow modifications. The isolated execution environment is further to notify the remote service provider when a modification is detected via the secure communication link.
    Type: Grant
    Filed: November 30, 2007
    Date of Patent: October 15, 2013
    Assignee: Intel Corporation
    Inventors: Travis T. Schluessler, Stephen D. Goglin, Erik J. Johnson
  • Patent number: 8561146
    Abstract: Methods and systems are provided for decentralizing user data access rights control activities in networked organizations having diverse access control models and file server protocols. A folder management application enables end users of the file system to make requests for access to storage elements, either individually, or by becoming members of a user group having group access privileges. Responsibility for dealing with such requests is distributed to respective group owners and data owners, who may delegate responsibility to authorizers. The application may also consider automatically generated proposals for changes to access privileges. An automatic system continually monitors and analyzes access behavior by users who have been pre-classified into groups having common data access privileges. As the organizational structure changes, these groups are adaptively changed both in composition and in data access rights.
    Type: Grant
    Filed: April 12, 2007
    Date of Patent: October 15, 2013
    Assignee: Varonis Systems, Inc.
    Inventors: Yakov Faitelson, Ohad Korkus
  • Patent number: 8561169
    Abstract: A data processing apparatus and method are provided for managing access to a display buffer. The data processing apparatus has a display buffer for storing an array of display elements for subsequent output to a display controller, with each display element having a security permission indication associated therewith identifying whether that display element is a secure display element or a non-secure display element. At least one processing unit is provided for executing a non-secure process and a secure process, each process issuing access requests when seeking to access display elements in the display buffer, and each access request specifying a location in the display buffer. Interface logic is associated with the display buffer for receiving each access request and is arranged for at least each access request issued by the non-secure process to determine the security permission indication associated with the display element currently stored at the location specified by that access request.
    Type: Grant
    Filed: December 5, 2007
    Date of Patent: October 15, 2013
    Assignee: ARM Limited
    Inventors: Peter William Harris, Peter Brian Wilson, David Paul Martin, Timothy Charles Thornton
  • Patent number: 8561177
    Abstract: Exemplary systems and methods for detecting a communication channel of a bot. In exemplary embodiments, presence of a communication channel between a first network device and a second network device is detected. Data from the communication channel is scanned and used to determine if a suspected bot communication exists. If a bot communication is detected, then a recovery process may be initiated.
    Type: Grant
    Filed: November 30, 2007
    Date of Patent: October 15, 2013
    Assignee: FireEye, Inc.
    Inventors: Ashar Aziz, Wei-Lung Lai, Jayaraman Manni
  • Patent number: 8510569
    Abstract: In one embodiment, a processor includes a microcode storage including processor instructions to create and execute a hidden resource manager (HRM) to execute in a hidden environment that is not visible to system software. The processor may further include an extend register to store security information including a measurement of at least one kernel code module of the hidden environment and a status of a verification of the at least one kernel code module. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: August 13, 2013
    Assignee: Intel Corporation
    Inventors: Ned Smith, Vedvyas Shanbhogue, Arvind Kumar, Purushottam Goel