Patents Examined by Gilberto Barrón
  • Patent number: 8713695
    Abstract: A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the data request by adding the encrypted profile information to the data request, and sending the augmented data request to the target server. A data transfer method that is performed at an information server includes receiving a data request from a proxy server, extracting profile information added to the data request by the proxy server, using the extracted profile information to generate a response, and sending the response to the proxy server.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: April 29, 2014
    Assignee: Facebook, Inc.
    Inventors: Larry T. Harada, Mark A. Dolecki, Christopher S Purdum, C. Hudson Hendren, III
  • Patent number: 8713644
    Abstract: A method of operating a host computer having a web-browser with the capability of executing at least one web-browser add-on to provide a web application access to a smart card to protect the smart card from security threats associated with being connected to the Internet. Prior to establishing a connection between a web application executing in the web browser, verifying that the web application has been authorized to connect to a smart care using the web-browser add-on to provide a web application access to a smart card.
    Type: Grant
    Filed: March 5, 2010
    Date of Patent: April 29, 2014
    Assignee: Gemalto SA
    Inventors: Ksheerabdhi Krishna, Kapil Sachdeva, HongQian Karen Lu
  • Patent number: 8713654
    Abstract: In the presently preferred embodiment of the invention, every time a user submits a form the client software tries to match the submitted information with the stored profile of that user. If a match is discovered, the program tags the field of the recognized data with a corresponding type. The resulting profile can be used after that to help all subsequent users to fill the same form.
    Type: Grant
    Filed: August 23, 2012
    Date of Patent: April 29, 2014
    Assignee: Facebook, Inc.
    Inventors: Ognian Z. Topalov, Eric Hohenstein
  • Patent number: 8713636
    Abstract: A computer network is disclosed in which a group of computers co-operate to perform a distributed application. In order to ensure that only members of that group of computers are able to carry out certain operations, messages sent in the performance of the distributed application are checked by the recipient for the presence of a group membership token. The inclusion of a group membership token is controlled by one or more group membership handlers which intercept messages from local components and only include a group membership token with the message if they list the sending local component as being entitled to include the group membership token in the message. Furthermore, by operating the group membership token on a separate machine, or preferably a separate virtual machine from the local component, security is further improved. In the most preferred embodiments, the group token handler and/or the local component are hosted on virtual machines which provide virtualised cryptographic functionality.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: April 29, 2014
    Assignee: BRITISH TELECOMMUNICATIONS public limited company
    Inventors: Theo Dimitrakos, Ivan Djordjevic, Srijith K Nair
  • Patent number: 8712054
    Abstract: The present invention discloses a method and system for establishing an enhanced key when a terminal moves from an EUTRAN to an enhanced UTRAN, so as to ensure that the terminal can carry out normal communication safely in the enhanced UTRAN. The method includes: when the terminal moves from the EUTRAN to the enhanced UTRAN, a target enhanced serving GPRS support node (SGSN+) in the enhanced UTRAN deducing an intermediate key used in the UTRAN according to a mapped traditional key obtained from a source mobile management entity; and the terminal, after deducing the mapped traditional key, further deduces the intermediate key used in the enhanced UTRAN by using an algorithm which is the same as that of the target SGSN+ according to the mapped traditional key.
    Type: Grant
    Filed: April 2, 2011
    Date of Patent: April 29, 2014
    Assignee: ZTE Corporation
    Inventors: Chengyan Feng, Xintai Wang
  • Patent number: 8713690
    Abstract: A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the data request by adding the encrypted profile information to the data request, and sending the augmented data request to the target server. A data transfer method that is performed at an information server includes receiving a data request from a proxy server, extracting profile information added to the data request by the proxy server, using the extracted profile information to generate a response, and sending the response to the proxy server.
    Type: Grant
    Filed: February 18, 2011
    Date of Patent: April 29, 2014
    Assignee: Facebook, Inc.
    Inventors: Larry T. Harada, Mark A. Dolecki, Christopher S. Purdum, C. Hudson Hendren, III
  • Patent number: 8713310
    Abstract: The invention relates to a method for transmitting user data, particularly user data realizing real-time applications, between at least one first communication device and at least one second communication device, the user data being transmitted as data packets during a communication connection, wherein during the communication connection at least from the first communication device at least one packet enabling an authentication of the first communication device is embedded in at least one of the data packets transmitting the user data and directed at the second communication device. The invention furthermore relates to an arrangement for carrying out the method.
    Type: Grant
    Filed: September 6, 2007
    Date of Patent: April 29, 2014
    Assignee: Siemens Enterprise Communications GmbH & Co. KG
    Inventors: Bruno Bozionek, Karl Klaghofer, Holger Prange, Werner Schneider, Michael Tietsch
  • Patent number: 8713694
    Abstract: A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the data request by adding the encrypted profile information to the data request, and sending the augmented data request to the target server. A data transfer method that is performed at an information server includes receiving a data request from a proxy server, extracting profile information added to the data request by the proxy server, using the extracted profile information to generate a response, and sending the response to the proxy server.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: April 29, 2014
    Assignee: Facebook, Inc.
    Inventors: Larry T. Harada, Mark A. Dolecki, Christopher S Purdum, C. Hudson Hendren, III
  • Patent number: 8713697
    Abstract: An apparatus for storing event information relating to operation of an HVAC system includes: (a) at least one memory controller coupled with the HVAC system for receiving the event information; and (b) at least one memory unit coupled with the at least one memory controller. A first memory unit of the at least one memory unit is configured for receiving first selected information of the event information for accessing by at least one of a first party and a second party. A second memory unit of the at least one memory unit is configured for receiving second selected information of the event information for accessing by the second party.
    Type: Grant
    Filed: July 9, 2008
    Date of Patent: April 29, 2014
    Assignee: Lennox Manufacturing, Inc.
    Inventors: Michael Courtney, Wojciech Grohman, Peter Hrejsa
  • Patent number: 8712046
    Abstract: A cryptographic key split combiner includes a plurality of key split generators adapted to generate cryptographic key splits, a key split randomizer adapted to randomize the cryptographic key splits to produce a cryptographic key, and a digital signature generator. Each of the key split generators is adapted to generate key splits from seed data. The digital signature generator is adapted to generate a digital signature based on the cryptographic key. The digital signature generator can also be adapted to generate the digital signature based on a credential value. A process for forming cryptographic keys includes generating a plurality of cryptographic key splits from seed data. The cryptographic key splits are randomized to produce a cryptographic key. A digital signature is generated based on the cryptographic key. Generating a digital signature based on the cryptographic key can include generating the digital signature based on a credential value.
    Type: Grant
    Filed: July 9, 2012
    Date of Patent: April 29, 2014
    Assignee: TecSec Inc.
    Inventors: Edward M. Scheidt, C. Jay Wack
  • Patent number: 8713660
    Abstract: An authentication platform comprises an authentication unit configured to authenticate the user based on received input data, and a control unit configured to enable communication between a client device and an authentication host as a consequence of successful authentication of the user by the authentication unit.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: April 29, 2014
    Assignee: TEC Solutions, Inc.
    Inventor: Todd Alan Carper
  • Patent number: 8705744
    Abstract: When installing and maintaining a wireless sensor network in a medical or factory environment, distribution of keying material to sensor nodes (18) is performed by a key material box (KMB) (12), such as a smartcard or the like. The KMB (12) has a random seed stored to it during manufacture, and upon activation performs an authentication protocol with a sensor node (18) to be updated or installed. The KMB (12) receives node identification information, which is used in conjunction with the random seed to generate keying material for the node (18). The KMB (12) then encrypts the keying material for transmission to the node (18), and transmits over a wired or wireless communication link in a secure manner. The node (18) sends an acknowledgement message back the KMB (12), which then updates the nodes status in look-up tables stored in the KMB (12).
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: April 22, 2014
    Assignee: Koninklijke Philips N.V.
    Inventors: Axel G. Huebner, Heribert Baldus, Oscar Garcia
  • Patent number: 8707058
    Abstract: Systems and methods for cryptographically masking private data are described. The apparatus may include a masking engine to hash private data and a masking values table to provide a masked value using a lookup value derived from the hashed private data. The method my include receiving private data, transforming the private data into a set of masked data items and providing the set of masked data items.
    Type: Grant
    Filed: June 26, 2012
    Date of Patent: April 22, 2014
    Assignee: United Services Automobile Association (USAA)
    Inventor: Frank L. Bain
  • Patent number: 8707059
    Abstract: An intrusion detection module includes an enclosure and a sensor to detect a predetermined type of intrusion. The module further includes a tamper sensor to detect a tampering attempt. An encryption mechanism is coupled to receive signals from the sensor and tamper sensor and encrypt such signals for transmission to a control panel.
    Type: Grant
    Filed: January 7, 2011
    Date of Patent: April 22, 2014
    Assignee: Cinch Systems, Inc.
    Inventors: Joel Curtis Christianson, Gregory Brett Olson
  • Patent number: 8707398
    Abstract: All metadata relevant to user interface functionality needed to provide a specific unit of business functionality can be stored in one of a plurality of autonomous metadata containers retained on at least one data storage device. After a subset of available business functionality to be provided to a user is determined, a set of the plurality of autonomous metadata containers required to provide the subset of available business functions can be identified. A user interface view can be generated to present a view associated with each of the set of the plurality of autonomous metadata containers, and the generated user interface view can be provided for display to the user. Related systems, articles of manufacture, and computer-implemented methods are described.
    Type: Grant
    Filed: December 22, 2010
    Date of Patent: April 22, 2014
    Assignee: SAP AG
    Inventors: Alexander Rauh, Lars Erbe, Thomas Gieselmann, Franz Mueller, Sri A N Vidhya, Nina Tabitha Paul, Stefan Haffner, Vibhor Tomar, Holger Schmidt
  • Patent number: 8707427
    Abstract: Systems and methods for detecting malware in a selected computer that is part of a network of computers. The approach includes inspecting a predetermined set of operational attributes of the selected computer to detect a change in a state of the selected computer. In response to a detected change in state, the selected computer is scanned to create a snapshot of the overall state of the selected computer. The snapshot is transmitted to an analytic system wherein it is compared with an aggregated collection of snapshots previously respectively received from a plurality of computers in the computer network. Based on the comparison, anomalous state of the selected computer can be identified. In turn, a probe of the selected computer is launched to gather additional information related to the anomalous state of the selected computer so that a remediation action for the anomalous state of the selected computer can be generated.
    Type: Grant
    Filed: April 6, 2010
    Date of Patent: April 22, 2014
    Assignee: Triumfant, Inc.
    Inventors: David E. Hooks, Mitchell N. Quinn
  • Patent number: 8700909
    Abstract: A system, method and program product for generating a biometric reference template revocation message on demand. The method includes generating, using a biometric reference template revocation engine, a biometric reference template revocation message and loading the biometric reference template revocation engine onto a secure portable device for generating on demand of the individual the biometric reference template revocation message.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: April 15, 2014
    Assignee: International Business Machines Corporation
    Inventor: Phillip H. Griffin
  • Patent number: 8699576
    Abstract: Provided are a method of and apparatus for estimating a motion vector using the sizes of neighboring partitions, an encoder, a decoder, and a decoding method. The method includes comparing the size of a first neighboring partition located to the left of the current block with the size of a second neighboring partition located above the current block and, if the size of the first neighboring partition and the size of the second neighboring partition are different from each other, estimating a motion vector of the larger one of the first neighboring partition and the second neighboring partition as the motion vector of the current block.
    Type: Grant
    Filed: March 5, 2012
    Date of Patent: April 15, 2014
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Tammy Lee
  • Patent number: 8699711
    Abstract: A wireless transmit receive unit (WTRU) is configured to receive unciphered and ciphered messages. The unciphered messages include identity requests, authentication requests, non-access stratum (NAS) security mode commands and tracking area update responses. The ciphered messages may come from the NAS and a Radio Resource Controller (RRC). The messages are ciphered using security keys.
    Type: Grant
    Filed: July 15, 2008
    Date of Patent: April 15, 2014
    Assignee: Interdigital Technology Corporation
    Inventors: Rajat P. Mukherjee, Peter S. Wang, Mohammed Sammour, Shankar Somasundaram
  • Patent number: 8700906
    Abstract: This document describes techniques and apparatuses for secure computing in multi-tenant data centers. These techniques permit a client to delegate computation of a function to multiple physical computing devices without the client's information being vulnerable to exposure. The techniques prevent discovery of the client's information by a malicious entity even if that entity is a co-tenant on many of the same physical computing devices as the client.
    Type: Grant
    Filed: January 14, 2011
    Date of Patent: April 15, 2014
    Assignee: Microsoft Corporation
    Inventors: Seny Fakaba Kamara, Mariana P. Raykova