Patents Examined by Gary Gracia
  • Patent number: 8745400
    Abstract: With the help of a key management protocol, the transmitted key information is authenticated by at least one certificate signed by the terminals, and at least one fingerprint of the public keys or certificate, which were used for authenticating the key information, is added to the useful part of an SIP message. The identity information present in the header of an SIP message is additionally copied into a region of the header or the useful part, and a signature is produced by way of the fingerprint, the datum information presented in the header of an SIP message, the copied identity information, and optionally the certificate reference information, and is inserted into a further region of the header of the SIP message. The additional signature that is produced and inserted can remain uninfluenced during a transmission across several networks of different network operators.
    Type: Grant
    Filed: January 7, 2008
    Date of Patent: June 3, 2014
    Assignee: Siemens Enterprise Communications GmbH & Co. KG
    Inventors: John Elwell, Kai Fischer
  • Patent number: 8744082
    Abstract: A system and method for securing wireless communications are provided. A method for secure communications by a first user includes estimating a channel between the first user and a second user based on a pilot signal transmitted by the second user, determining a first threshold and a second threshold based on the estimate of channel, selecting a first subset of channel estimates, signaling the first subset of channel estimates to the second user, receiving a second subset of channel estimates from the second user, for each channel estimate in the second subset of channel estimates, quantizing the channel estimate based on a relationship between a gain of the channel estimate and the first threshold and the second threshold, generating a first secret key based on quantized channel estimates, verifying that the first secret key matches a second secret key generated by the second user, and transmitting information to the second user.
    Type: Grant
    Filed: November 3, 2010
    Date of Patent: June 3, 2014
    Assignee: Futurewei Technologies, Inc.
    Inventors: Hung D. Ly, Yufei Blankenship, Tie Liu
  • Patent number: 8719585
    Abstract: Techniques for securely updating a boot image without knowledge of a secure key used to encrypt the boot image.
    Type: Grant
    Filed: February 11, 2008
    Date of Patent: May 6, 2014
    Assignee: Nvidia Corporation
    Inventors: Gordon Grigor, Phillip Norman Smith
  • Patent number: 8712039
    Abstract: An efficient implementation of SHA-512, and similarly SHA-384, on an ARM processor. The implementation maximizes reuse of the register values between iterations so as to minimize the need to load these values from memory. This is achieved by categorizing the iterations into even and odd ones such that the sequence of computation in the even iteration is reversed in the odd iteration and the register values at the end of one iteration are consumed at the beginning of the following one.
    Type: Grant
    Filed: April 5, 2012
    Date of Patent: April 29, 2014
    Assignee: Certicom Corp.
    Inventors: Nevine Maurice Nassif Ebeid, Robert John Lambert
  • Patent number: 8712216
    Abstract: Videos are received and indexed based on fingerprints generated for the videos, using lookup keys which correspond to sub portions of the reference fingerprints. Specifically, a set of lookup keys is selected such that the number of reference fingerprints such that the clumping associated with the associated each of the lookup keys is minimized. Clumping occurs when a number of reference identifiers associated with a lookup key exceeds a maximum value.
    Type: Grant
    Filed: May 21, 2012
    Date of Patent: April 29, 2014
  • Patent number: 8667300
    Abstract: Encrypted video data is decrypted as first image data. If a first image processing module includes an output processing to an outside of a first secure memory which an access from an outside of an apparatus is restricted, the first image processing module is converted to a second image processing module including the output processing invalidated. The first image data is processed using the second image processing module, by accessing the first secure memory, and second image data is generated. If a first rendering module includes an output processing to an outside of a second secure memory which an access from the outside of the apparatus is restricted, the first rendering module is converted to a second rendering module including the output processing invalidated. The second image data is rendered using the second rendering module, by accessing the second secure memory.
    Type: Grant
    Filed: January 20, 2010
    Date of Patent: March 4, 2014
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Isao Mihara, Yasunobu Yamauchi, Masahiro Sekine, Yasukazu Higuchi, Norihiro Nakamura
  • Patent number: 8639942
    Abstract: An information processing apparatus, a software update method, and an image processing apparatus capable of encrypting and decrypting information using values uniquely calculated from booted primary modules or booted backup modules with less effort are disclosed. The information processing apparatus includes primary modules and the same kinds of backup modules, and includes a value storage unit storing values calculated from the modules, an encryption information storage unit storing information unique to the modules, an information decryption unit decrypting the information unique to the modules using the values in the value storage unit, and an encryption information update unit, when the module is updated, encrypting the information unique to the modules based on a value calculated from the each kind of the primary modules or the backup modules after the update.
    Type: Grant
    Filed: March 11, 2008
    Date of Patent: January 28, 2014
    Assignee: Ricoh Company, Ltd.
    Inventor: Kiwamu Okabe
  • Patent number: 8640197
    Abstract: A method and system for acquiring an Internet user's consent to be geographically located via at least two independent sources of geographical information while at least one independent source of geographical information is the wireless location of said Internet user's communication voice device. The method does not require any user intervention other than the user's interaction with an Internet site via the Internet user's Internet browser.
    Type: Grant
    Filed: March 28, 2011
    Date of Patent: January 28, 2014
    Inventor: Guy Heffez
  • Patent number: 8635662
    Abstract: A system that that dynamically authenticates one or more users is described. During operation, the computer system determines a trust level for a user, where the trust level is a function of elapsed time since the user previously provided authentication information. Next, the computer system calculates a transaction risk level based on a type of user transaction performed by the user. Then, the computer system requests additional authentication information from the user based on the trust level and the transaction risk level.
    Type: Grant
    Filed: January 31, 2008
    Date of Patent: January 21, 2014
    Assignee: Intuit Inc.
    Inventor: David E. Lang
  • Patent number: 8621238
    Abstract: An apparatus, method and program product are provided for securing a computer system. A digital signature of an application is checked, which is loaded into a memory of the computer system configured to contain memory pages. In response to finding a valid digital signature, memory pages containing instructions of the application are set as executable and memory pages other than those containing instructions of the application are set as non-executable. Instructions in executable memory pages are executed. Instructions in non-executable memory pages are prevented from being executed. A page fault is generated in response to an attempt to execute an instruction in a non-executable memory page. In response to the page fault, an exception list of a sequence of instructions is checked for the attempted instruction in the non-executable memory page and if on the list, the page is set to executable and the attempted instruction executed.
    Type: Grant
    Filed: July 26, 2011
    Date of Patent: December 31, 2013
    Assignee: The United States of America as represented by the Secretary of the Air Force
    Inventor: William B Kimball
  • Patent number: 8619977
    Abstract: An elliptic curve cryptographic system where point coordinates are transformed from a first coordinate system to a second coordinate system. The transformed coordinates are processed by field operations, which have been modified for operating on the transformed point coordinates. In some implementations, the point coordinates are transformed from an affine coordinate system to a projective coordinate system using a non-random value for the projective coordinate. In some implementations, the transformed projective representation of the point can be changed from a first representation of the point in projective coordinates to a second representation of the point in projective coordinates, where the projective coordinate used in the representation change is a random value.
    Type: Grant
    Filed: February 8, 2008
    Date of Patent: December 31, 2013
    Assignee: Inside Secure
    Inventors: Michel Douguet, Vincent Dupaquis
  • Patent number: 8615666
    Abstract: Information is prevented from being retrieved by an unauthorized person when an information processing apparatus is stolen or lost. There is provided an information processing apparatus including: a storage; dividing logic/utility that divides data stored on the storage into a predetermined first number of pieces of partial data; transmitting logic/utility that transmits one or more of the first number of pieces of divided partial data to one or more different information processing apparatuses, and deletes the one or more of the first number of pieces of partial data from the storage; retrieving logic/utility that retrieves the one or more pieces of partial data from the one or more different information processing apparatuses, and stores the retrieved pieces of partial data onto the storage; and restoring logic/utility that restores the data from the minimum number of pieces of partial data.
    Type: Grant
    Filed: December 3, 2008
    Date of Patent: December 24, 2013
    Assignee: International Business Machines Corporation
    Inventors: Tomoari Yasuda, Koji Saruwatari, Kiyotaka Nakayama
  • Patent number: 8555059
    Abstract: This document describes tools that enable a computing device to receive an update to content management software. The tools also enable the computing device to generate new public and private keys without the use of a key server.
    Type: Grant
    Filed: April 16, 2010
    Date of Patent: October 8, 2013
    Assignee: Microsoft Corporation
    Inventors: Alexander McKelvey, Clifford P. Strom, Quintin S. Burns
  • Patent number: 8533779
    Abstract: A method for preventing IP address from unexpected dispersion when using point-to-point protocol is disclosed. The method comprises the steps: starting and initializing a PPP session; performing a PPP LCP negotiation, in which times of the successful PPP LCP negotiation is limited; performing a PPP authentication, in which an authentication request to AAA client is sent only once; performing a PPP IPCP negotiation, in which an accounting-start request is sent only once and times of the successful PPP IPCP negotiation is limited; and terminating the PPP session and releasing the IP address. The method of the invention for preventing IP address from unexpected dispersion when using point-to-point protocol effectively avoid excessive oscillation of a LCP state machine and a IPCP state machine by limiting times of the successful PPP LCP negotiation during the period of PPP LCP negotiation and times of the successful PPP IPCP negotiation.
    Type: Grant
    Filed: July 5, 2005
    Date of Patent: September 10, 2013
    Assignee: ZTE Corporation
    Inventor: Wenli Cao
  • Patent number: 8527756
    Abstract: A method and system of securing content is described, the method including establishing communication between a secure module source and a content rendering device, loading a dynamically generated pseudo-unique secure module to the content rendering device from the secure module source, establishing communication between the secure module source and the dynamically generated pseudo-unique secure module, and transferring a decryption key from the secure module source to the dynamically generated pseudo-unique secure module, thereby enabling decryption of encrypted content, the encrypted content being encrypted according to the decryption key. Related methods and apparatus are also described.
    Type: Grant
    Filed: September 27, 2006
    Date of Patent: September 3, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Leonid Sandler, Yaron Sella, Erez Waisbard
  • Patent number: 8528078
    Abstract: The authenticity of a website is determined using a unique string of characters known only to the user and the website on each page of the website that is displayed to the user, with a false site being incapable of displaying this unique string of characters, thereby putting the user on notice that the current site is not the authentic one the user desires to access. Voice methods for conveying one-time pass codes to users and for permitting customer institutions to select authentication rules are also disclosed.
    Type: Grant
    Filed: July 2, 2007
    Date of Patent: September 3, 2013
    Assignee: Anakam, Inc.
    Inventors: Allan Camaisa, Jonas Samuelsson
  • Patent number: 8498415
    Abstract: A method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment. The method allows peers using their own personal agents to obtain reputation information of each other through a pair of trustworthy mediator proxies. A mediator proxy is considered trustworthy if even when it is compromised it can guarantee three conditions: (1) the anonymity of the identity of the responders and the target being inquired; (2) the privacy of the content in an inquiry and a response; and (3) the boundary limit of the reputation summary with no possibility of combining the response of multiple inquiries to reverse engineer the reputation rating of an individual responder.
    Type: Grant
    Filed: November 28, 2008
    Date of Patent: July 30, 2013
    Inventor: Bon K. Sy
  • Patent number: 8495360
    Abstract: A method and an arrangement are provided wherein a newly added mesh node does not require a link to the AAA server for the purpose of authentication. Authentication is carried out using a node which is already present in the mesh network and which has a link to the AAA server.
    Type: Grant
    Filed: August 1, 2007
    Date of Patent: July 23, 2013
    Assignee: Siemens Enterprise Communications GmbH & Co. KG
    Inventors: Rainer Falk, Florian Kohlmayer
  • Patent number: 8477935
    Abstract: Safeguarding communication channels is required in particular in wireless networks. The use of encryption mechanisms in the form of software is limited by the required calculation and energy capacities of mobile terminals. Costs are of significance when using hardware solutions for cryptographic operations. The present invention provides an approach which simultaneously tackles all those points. It concerns a hardware accelerator for polynomial multiplication in extended Galois fields (GF), wherein the per se known Karatsuba method is iteratively applied in accordance with the invention. When using the invention the area requirement can be reduced for example from 6.2 mm2 to 2.1 mm2. The solution according to the invention also reduces the energy consumption in comparison with solutions in accordance with the state of the art by 30%.
    Type: Grant
    Filed: March 6, 2006
    Date of Patent: July 2, 2013
    Assignee: IHP GmbH
    Inventors: Peter Langendoerfer, Zoya Dyka, Peter Steffen
  • Patent number: 8462949
    Abstract: Methods and apparatus for displaying visual content on a display such that the content is comprehensible only to an authorized user for a visual display system such as a computer, a television, a video player, a public display system (including but not limited to a movie theater), a mobile phone, an automated teller machine (ATM), voting booths, kiosks, security screening workstations, tactical displays and other systems where information is displayed for viewing.
    Type: Grant
    Filed: November 29, 2008
    Date of Patent: June 11, 2013
    Assignee: Oculis Labs, Inc.
    Inventors: William R. Anderson, Steven E. Turner, Steve Pujia, George L. Heron