Patents Examined by Ghazal Shehni
-
Patent number: 9223966Abstract: The disclosed computer-implemented method for replicating computing system environments may include (1) identifying each application installed on a plurality of computing systems, (2) creating, within a virtual machine image, virtual containers that store each application installed on the plurality of computing systems, (3) determining that a potentially malicious file is directed to a target computing system within the plurality of computing systems, (4) identifying each application installed on the target computing system, (5) in response to determining that the file is directed to the target computing system, replicating a configuration of the target computing system within the virtual machine image by, for each application installed on the target computing system, activating a virtual container that stores the application, and (6) determining how the file would affect the target computing system by sending the file to the virtual machine image and analyzing how the file impacts the virtual machine image.Type: GrantFiled: May 4, 2014Date of Patent: December 29, 2015Assignee: Symantec CorporationInventors: Sourabh Satish, Abubakar A. Wawda
-
Patent number: 9223972Abstract: According to one embodiment, an apparatus comprises a processor and memory. Communicatively coupled to the processor, the memory comprises one or more detection modules each being software that is configurable to enable, disable or modify capabilities for that corresponding detection module. A first detection module the detection modules, when executed by the processor, conducts a first capability including an analysis of a received object to determine if the received object is associated with a malicious attack. The analysis may be altered upon receipt of a configuration file that is substantially lesser in size than the software forming the first detection module and includes information to alter one or more rules controlling the first capability.Type: GrantFiled: March 31, 2014Date of Patent: December 29, 2015Assignee: FireEye, Inc.Inventors: Michael Vincent, Emmanuel Thioux, Sai Vashisht, Darien Kindlund
-
Patent number: 9209970Abstract: According to a method of generating a key of the present invention, a first device and a second device are first brought into contact with one vibrator. In this state, the vibrator generates vibration. A first acceleration sensor provided in the first device and a second acceleration sensor provided in the second device detect the vibration. Subsequently, the first device notifies the second device of a first feature value based upon the detection result of the first acceleration sensor. The second device notifies the first device of a second feature value based upon the detection result of the second acceleration sensor. Then the first device compares the notified second feature value with the first feature value and generates a key based upon the comparison result. The second device compares the notified first feature value with the second feature value and generates a key based upon the comparison result.Type: GrantFiled: December 27, 2011Date of Patent: December 8, 2015Assignees: NEC CORPORATION, NATIONAL UNIVERSITY CORPORATION NARA INSTITUTE OF SCIENCE AND TECHNOLOGYInventors: Jun Noda, Hiroyuki Seki, Yoshitaka Nakamura
-
Patent number: 9208299Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for secure user authentication with improved OTP verification. The device may include an attribute collection module configured to collect attributes associated with the device; a client trust module configured to identify a user of the device, associate a user ID with the user and transmit the user ID and the collected attributes to a trust broker system; the client trust module further configured to receive a device ID from the trust broker system, the device ID associated with a pairing of the user ID and the attributes; and a client OTP generation module configured to generate an OTP and further configured to transmit the OTP and the device ID to an authentication server.Type: GrantFiled: March 9, 2013Date of Patent: December 8, 2015Assignee: Intel CorporationInventors: Eran Birk, Omer Ben-Shalom
-
Patent number: 9208359Abstract: A platform including an always-available theft protection system is described. In one embodiment, the system comprises a power management logic to selectively power elements of the system, a disarming logic to disarm the platform from an armed mode when a disarming command is received via an interface, the interface powered when the platform is in the armed and suspecting modes to detect the disarming command. The system further comprises, in one embodiment, a risk behavior logic to detect a potential problem via a interface, the interface powered when the platform is in the armed mode to detect the potential problem, and a core logic component to provide logic to analyze the potential problem, and to move the platform to a suspecting mode, when the potential problem indicates a theft suspicion, the core logic powered when the risk behavior logic detects the potential problem.Type: GrantFiled: December 22, 2011Date of Patent: December 8, 2015Assignee: Intel CorporationInventor: Michael Berger
-
Patent number: 9202035Abstract: A technique authenticates a user. The technique involves receiving, by processing circuitry, a handwritten code. The technique further involves performing, by the processing circuitry, a set of assessment operations which includes (i) a handwriting evaluation to analyze a set of biometric handwriting aspects of the handwritten code and (ii) a code evaluation to analyze code accuracy of the handwritten code. The technique further involves providing, by the processing circuitry, an authentication result based on the set of assessment operations. Such a technique strengthens security by including a “who you are” factor (i.e., handwriting biometrics uniquely identify the genuine user).Type: GrantFiled: December 18, 2013Date of Patent: December 1, 2015Assignee: EMC CorporationInventors: Yuri Manusov, Yedidya Dotan, Oleg Freylafert, Anton Khitrenovich
-
Patent number: 9197625Abstract: Device information for each of multiple devices associated with a user account is maintained by a cloud service. The device information can include credential information allowing the device to be accessed by other ones of the multiple devices, remote access information indicating how the device can be accessed by other ones of the multiple devices on other networks, and property information including settings and/or device drivers for the device. The device information for each of the multiple devices is made available to other ones of the multiple devices, and can be used by the multiple devices to access one another and provide a consistent user experience across the multiple devices.Type: GrantFiled: October 30, 2014Date of Patent: November 24, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Narayanan Ganapathy, Esaias E. Greeff
-
Patent number: 9183409Abstract: A security method in an electronic device is provided. The method includes pairing the electronic device with an Access Point (AP), obtaining at least one item of information about the AP, and setting a security level of the electronic device according to the at least one item of information.Type: GrantFiled: March 31, 2014Date of Patent: November 10, 2015Assignee: Samsung Electronics Co., Ltd.Inventor: Dong-Il Son
-
Patent number: 9178873Abstract: Systems and methods for secure password entry are provided. When a user wishes to log in or otherwise authenticate as an authorized user of a system using a password, the system can provide an apparently random sequence of characters to the user. The user can select all of the characters in the sequence of characters that also appear in the user's password. The system can determine whether all of the selected characters are in the password and that all of the characters in the sequence of characters that are also in the password were selected. The user can select the characters in any order and the selected characters can include less than all of the characters in the password. In this way, the system can authenticate the user without the user entering their entire password, thereby increasing both the efficiency and the security of the password entry operation.Type: GrantFiled: December 18, 2013Date of Patent: November 3, 2015Assignee: PAYPAL. INC.Inventors: Grom Dong, Koson Cao
-
Patent number: 9171167Abstract: Methods and systems for use in in analyzing cyber-security threats for an aircraft are described herein. One example method includes generating an interconnection graph for a plurality of interconnected aircraft systems. The interconnection graph includes a plurality of nodes and a plurality of links. The method also includes defining a cost function for a cyber-security threat to traverse each link and defining a requirements function for a cyber-security threat to exploit each node. The method further includes generating a set of threat traversal graphs for each cyber-security threat of a plurality of cyber-security threats.Type: GrantFiled: June 20, 2013Date of Patent: October 27, 2015Assignee: The Boeing CompanyInventors: Arun Ayyagari, Winfeng Li, John Eric Bush, Sudhakar S. Shetty, Brian C. Grubel, Dion S. Reid
-
Patent number: 9171166Abstract: Disclosed is a data processing apparatus providing a predetermined function by executing a program for the data processing apparatus, including a first storage unit that stores encoded execution starting data for starting execution of the program; a first decode key storage unit that stores a first decode key capable of decoding the encoded execution starting data; a start up unit that obtains the first decode key from the first decode key storage unit when turning on the power is accepted and decodes the encoded execution starting data by the first decode key to start executing the program; and an authentication confirmation unit that sends a request for authentication to an external apparatus after the start up unit starts executing the program and starts providing the predetermined function when obtaining an authentication result indicating the apparatus is authenticated from the external apparatus.Type: GrantFiled: December 4, 2013Date of Patent: October 27, 2015Assignee: RICOH COMPANY, LTD.Inventors: Alain Volmat, Shizu Kanauchi, Yoshinaga Kato, Takahiro Asai
-
Patent number: 9167429Abstract: A communication module of a communication terminal is configured not to output to a control module, service information provided from a second server whose server ID is not registered in a first server. The communication module is configured to receive an authentication code from the first server, and to transmit ID information and terminal identification information to the second server. When the terminal identification information received from the communication module matches the terminal identification information received from the first server, the second server is configured to reply the authentication code and the service information to the communication module. When the authentication code received from the first server matches the authentication code received from the second server, the communication module is configured to output the service information to the control module.Type: GrantFiled: February 27, 2014Date of Patent: October 20, 2015Assignee: Panasonic Intellectual Property Management Co., Ltd.Inventors: Shigeaki Yamasaki, Yosuke Kondo, Eiji Shiohama
-
Patent number: 9166784Abstract: According to a method of generating a key of the present invention, a first device and a second device are first brought into contact with one vibrator. In this state, the vibrator generates vibration. A first acceleration sensor provided in the first device and a second acceleration sensor provided in the second device detect the vibration. Subsequently, the first device notifies the second device of a first feature value based upon the detection result of the first acceleration sensor. The second device notifies the first device of a second feature value based upon the detection result of the second acceleration sensor. Then the first device compares the notified second feature value with the first feature value and generates a key based upon the comparison result. The second device compares the notified first feature value with the second feature value and generates a key based upon the comparison result.Type: GrantFiled: December 27, 2011Date of Patent: October 20, 2015Assignees: NEC CORPORATION, NATIONAL UNIVERSITY CORPORATION NARA INSTITUTE OF SCIENCE AND TECHNOLOGYInventors: Jun Noda, Hiroyuki Seki, Yoshitaka Nakamura
-
Patent number: 9158927Abstract: Reliable and efficient storage and reconstruction of secure data files is provided. Encrypted fragments are generated by exclusive-OR (XOR) based erasure-encoding and XOR encryption of data files. At least some of the encrypted fragments, and preferably at least two copies of such encrypted fragments, are stored at two or more locations, such as but not limited to two or more servers in two or more regional storage systems. Fragments are retrieved from one or more of the multiple locations and the original data file is reconstructed, even if different encryption techniques have been used. If not enough valid fragments from that original data file can be identified then hash values, checksums, seeds, and other techniques may be used to distinguish files and to identify related or identical files which may be used to reconstruct the data file.Type: GrantFiled: June 24, 2013Date of Patent: October 13, 2015Assignee: Amazon Technologies, Inc.Inventors: Paul David Franklin, Bryan James Donlan
-
Patent number: 9158916Abstract: An embodiment may include a storage processor that may be comprised, at least in part, in a host. The host may include at least one host central processing unit (CPU) to execute at least one host operating system (OS). The storage processor may execute at least one operation in isolation from interference from and control by the at least one host CPU and the at least one host OS. The at least one operation may facilitate, at least in part: (1) prevention, at least in part, of unauthorized access to storage, (2) prevention, at least in part, of execution by the at least one host CPU of at least one unauthorized instruction, (3) detection, at least in part, of the at least one unauthorized instruction, and/or (4) remediation, at least in part, of at least one condition associated, at least in part, with the at least unauthorized instruction.Type: GrantFiled: October 17, 2012Date of Patent: October 13, 2015Assignee: Intel CorporationInventors: Daniel Nemiroff, Paul J. Thadikaran, Paritosh Saxena, Nicholas D. Triantafillou, Andrew H. Gafken
-
Patent number: 9160769Abstract: Computer-readable storage medium, apparatus and method associated with management of data elements in a cloud computing environment are disclosed herein. In embodiments, one or more computer-readable storage medium may contain instructions which when executed by a computing apparatus may facilitate a user in managing the user's data elements in a cloud computing environment. In embodiments, this may be accomplished through the use of management metadata associated with the user's data elements. Other embodiments may be described and/or claimed.Type: GrantFiled: March 14, 2013Date of Patent: October 13, 2015Assignee: Intel CorporationInventors: Douglas P. Devetter, Jeffrey C. Sedayao, Vishwa Hassan, Christian D. Black, Terry H. Yoshii
-
Patent number: 9152777Abstract: In one embodiment a controller comprises logic configured to receive a document copy, wherein the document copy comprises an identifier which uniquely identifies an electronic device and an authentication algorithm logic, generate, with the authentication algorithm logic, a security key for the document copy based on at least one input from the user, transmit the security key to a remote device, and store the document copy and a computer-readable code which uniquely associates the document with the electronic device in a memory. Other embodiments may be described.Type: GrantFiled: June 23, 2013Date of Patent: October 6, 2015Assignee: Intel CorporationInventor: Arnab Ganguly
-
Patent number: 9143528Abstract: A method and a fingerprinting device for countering fingerprint forgery in a communication system. The fingerprinting device obtains and stores a reference fingerprint for a client device, generates and transmits decoy traffic that appears to originate from the client device, the decoy traffic having different fingerprinting properties than real traffic from the client device, generates a fingerprint for non-decoy traffic purportedly from the client device, and compares the generated fingerprint with a reference fingerprint. A forged fingerprint is detected if there is a mismatch. The decoy traffic preferably comprises frames to which no response is needed. The invention is particularly suited for 802.11 using fingerprints based on duration fields of received frames and the decoy traffic is then preferably probe request frames and null data frames.Type: GrantFiled: June 18, 2013Date of Patent: September 22, 2015Assignee: Thomson LicensingInventors: Christoph Neumann, Olivier Heen, Clementine Maurice, Stephane Onno
-
Patent number: 9143941Abstract: An infusion system to administer fluid is disclosed. The infusion system to administer fluid includes an infusion pump having a pump processor, a pump memory and a pump radio to enable bi-directional communication. The pump radio further includes a configurable attenuator and the pump memory stores a plurality of security modes that configure the attenuator to receive signals of a predetermined strength. The infusion system further includes a controller with a controller processor, a controller memory, and a controller radio to transmit and receive communication from the pump radio. The controller further having a graphical user interface shown on a display, and controls to manipulate the graphical user interface. The controller further being paired with the infusion pump based on pairing data, wherein a security check is performed when the infusion pump receives a suspect signal, the suspect signal not matching the predetermined strength associated with a selected security mode.Type: GrantFiled: December 18, 2013Date of Patent: September 22, 2015Assignee: MEDTRONIC MINIMED, INC.Inventors: Yongbo Wang, Gustavo Quiroga
-
Patent number: 9143512Abstract: A message is divided into multiple message segments, and a network interface is selected from among a plurality of different types of network interfaces included within a communication device for transmitting each message segment. Each network interface is dedicated to a different type of communication protocol using a different encryption technique, and a network interface is selected for transmitting each message segment according to a pattern of the network interfaces. Secure transmission of the multiple message segments is initiated via the network interfaces according to the pattern.Type: GrantFiled: October 4, 2013Date of Patent: September 22, 2015Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventor: Andrea Forte