Patents Examined by Hee Song
-
Patent number: 9100245Abstract: A user can have media files associated with a user account in a shared resource environment, enabling the user to access those files from multiple devices and locations. Instead of uploading each file, a process can scan the files to determine corresponding copies already stored to the shared resource environment, which can be associated with the user account without uploading another copy. In cases where encryption or other protection prevents the content of a file from being verified, a fingerprint of unencrypted records of the file can be generated and compared against an index of fingerprints for previously encountered files. If the fingerprint matches information stored for a media file, and the fingerprint meets at least one validity criterion, a copy of the media file can be associated with the user account even though the user's copy cannot be read, or potentially even played, by a component of the environment.Type: GrantFiled: May 16, 2012Date of Patent: August 4, 2015Assignee: Amazon Technologies, Inc.Inventors: Colin Andrews, Aleksey Sergeyevich Perfilov
-
Patent number: 9098704Abstract: A system and method for capturing and re-calling an application function. The method of function re-call during anti-virus check includes the following steps: function intercept (capture); anti-virus analysis of the parameters used to call the function; preparing of an application stack for function re-call (when the analysis did not detect any malicious functionality); and calling the function again. The exemplary method can be used with browsers and other applications.Type: GrantFiled: October 9, 2013Date of Patent: August 4, 2015Assignee: Kaspersky Lab, ZAOInventor: Alexander Ledenev
-
Patent number: 9098592Abstract: A method, system and computer program product for session completion through co-browsing is claimed. The method can include establishing a content browsing session between a first computing device and a content server serving access to content to the first computing device and maintaining state data for the content browsing session. A co-browsing arrangement of the content can be created as between the first computing device and a second computing device and at least a subset of the state data can be cloned for use by the second computing device during co-browsing of the content. Thereafter, a modified form of the subset of the state data can be received from the second computing device resulting from the co-browsing of the content by the second computing device and the modified form of the subset of the state data can be provided to the first computing device for use during the content browsing session.Type: GrantFiled: December 14, 2011Date of Patent: August 4, 2015Assignee: International Business Machines CorporationInventors: Andrew J. Ivory, Todd E. Kaplinger, Barry J. Pellas, Matthew T. Pellas
-
Patent number: 9081959Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.Type: GrantFiled: November 30, 2012Date of Patent: July 14, 2015Assignee: Invincea, Inc.Inventors: Anup Ghosh, Scott Cosby, Alan Keister, Benjamin Bryant, Stephen Taylor
-
Patent number: 9077692Abstract: Techniques are described for blocking unidentified encrypted communication sessions. In one embodiment, a device includes an interface to receive a packet, an application identification module to attempt to identify an application associated with the packet, an encryption detection module to determine whether the packet is encrypted when the application identification module is unable to identify an application associated with the packet, and an attack detection module to determine whether the packet is associated with a network attack, to forward the packet when the packet is not associated with a network attack, and to take a response when the packet is associated with a network attack, wherein the encryption detection module sends a message to the attack detection module that indicates whether the packet is encrypted, wherein when the message indicates that packet is encrypted, the attack detection module determines that the packet is associated with a network attack.Type: GrantFiled: December 20, 2012Date of Patent: July 7, 2015Assignee: Juniper Networks, Inc.Inventors: Bryan Burns, Vladimir Sukhanov
-
Patent number: 9077687Abstract: Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment, the method includes storing policy information for machine to machine communications in a global DNS registry database server. The method further includes communicating the policy information for machine to machine communications from the global DNS registry database server to a machine DNS registry server located in an Internet service provider (ISP) network, wherein a control signaling gateway located in the ISP network is configured to utilize the policy information for machine to machine communications to allow only registered controllers associated with a machine to communicate with the machine.Type: GrantFiled: December 21, 2012Date of Patent: July 7, 2015Assignee: CenturyLink Intellectual Property LLCInventor: Michael K. Bugenhagen
-
Patent number: 9077538Abstract: A computer-implemented method for verifying user identities may include (1) identifying a request to ascertain whether a user account corresponds to a physical person, and, in response to the request, (2) identifying a password vault configured to store login information for at least one third-party Internet site for the user account, the third-party Internet site requiring a physical validation factor to log in to the third-party Internet site, (3) determining, based at least in part on the login information for the third-party Internet site, that the user account corresponds to the physical person, and (4) responding to the request with an indicator that the user account corresponds to the physical person. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 15, 2011Date of Patent: July 7, 2015Assignee: Symantec CorporationInventors: Shaun Cooley, Paul Agbabian
-
Patent number: 9043886Abstract: A framework is provided for integrating Internet identities in enterprise identity and access management (IAM) infrastructures. A framework is provided for open authorization. A framework is also provided for relying party functionality. A mapping repository can be configured to store a mapping between applications and identity providers. The mapping associates each application of a plurality of applications with one or more identity providers. Identity management logic can be configured to use the mapping to determine that one or more identity providers of a first plurality of identity providers can be used to perform authentication activities on behalf of the first application in response to receiving a first request associated with a first application.Type: GrantFiled: May 4, 2012Date of Patent: May 26, 2015Assignee: Oracle International CorporationInventors: Venkataraman Uppili Srinivasan, Rajeev Angal, Ajay Sondhi, Shivaram Bhat
-
Patent number: 9038190Abstract: A communication apparatus may include a reception portion, a decision portion, and a transmission portion. The reception portion may receive a first data request transmitted through a first security level communication, and a second data request transmitted through a second security level communication, the second security level being more secure than the first security level. The decision portion may decide whether a specific data request is the first data request or the second data request. The transmission portion may transmit a specific data to an apparatus that is a transmission source of the specific data request if the specific data request is the second data request, and may transmit different data to the apparatus if the specific data request is the first data request. The different data contains display information for causing the apparatus to retransmit the specific data request through the second security level communication.Type: GrantFiled: March 1, 2012Date of Patent: May 19, 2015Assignee: Brother Kogyo Kabushiki KaishaInventors: Munehisa Matsuda, Yohei Maekawa, Takeshi Miyake, Yuki Yada
-
Patent number: 9037853Abstract: The invention relates to a P2P communication method for multi-subscriber networks, which is protected from deception, eavesdropping and hacking, and wherein the communication carried out in an interval is predominantly carried out in separate rooms, allocated to the P2P communication, and with separate reference data allocated to the P2P communication. At least part of the separate random reference data and/or random data is generated in at least one unit that participates in the P2P communication and is exchanged within the P2P communication in the form of relative data. The separate P2P communication is initiated with respect to at least one global random reference date valid for the time of the P2P communication, the random reference date being valid for a randomly determined time range and being stored in all units that carry out the P2P communications in a secret and non-deceivable manner.Type: GrantFiled: November 17, 2008Date of Patent: May 19, 2015Assignee: Fachhochschule SchmalkaldenInventors: Werner Rozek, Thomas Rozek, Jan Rozek
-
Patent number: 9032525Abstract: A system for protecting an electronic system against malware includes an operating system configured to execute on the electronic device, a driver coupled to the operating system, and a below-operating-system security agent. The below-operating-system security agent is configured to identify one or more resources for changing filters of the driver, trap an attempted access of the one or more resources that originates from the operational level of the operating system, access one or more security rules to determine whether the attempted access is indicative of malware, and operate at a level below all of the operating systems of the electronic system accessing the one or more resources for changing filters of the driver.Type: GrantFiled: March 29, 2011Date of Patent: May 12, 2015Assignee: McAfee, Inc.Inventor: Ahmed Said Sallam
-
Patent number: 9032496Abstract: Systems and methods that provide secure single sign-on are described herein. When a user provides credentials to a client device, the credentials may be intercepted and cached at a secure location, such as within a trusted environment. When a client process, such as a remote desktop program running on the client device, requests the credentials for single sign-on to a server providing remote desktop services, the credentials may be secured, such as within an opaque container that may be accessed only components running in trusted environments, and provided to the client process. The client process may be running in an untrusted environment, such as an operating system session. The client device may forward the secured credentials to a trusted environment in the server, effectuating single sign-on.Type: GrantFiled: February 28, 2012Date of Patent: May 12, 2015Assignee: Citrix Systems, Inc.Inventor: Virgiliu Mocanu
-
Patent number: 9032543Abstract: Methods and systems for providing access to content are disclosed. The method is performed at least in part at a client computer system having a processor and memory. The method includes executing a host application associated with a first party. In some implementations, the host application is a media player. The method further includes initiating a secure communication channel between the host application and a server associated with the first party. The method further includes executing a supplemental application associated with a second party. The method further includes accessing, with the supplemental application, content licensed to the first party, wherein the licensed content is accessible to the supplemental application via the secure communication channel subject to terms of a licensing agreement. In some implementations, the content is media content, such as music, movies, and the like.Type: GrantFiled: July 21, 2014Date of Patent: May 12, 2015Assignee: Spotify ABInventors: Mattias Robert Arrelid, Mikael Gustav Olenfalk
-
Patent number: 9027124Abstract: A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path.Type: GrantFiled: May 14, 2012Date of Patent: May 5, 2015Assignee: Broadcom CorporationInventors: Jacob Mendel, Alexander Potievsky
-
Patent number: 9021579Abstract: A Smartphone data backup and restoration system on a physical layer is connected to a Smartphone through a data transmission line, and the data backup and restoration system and the Smartphone are identified and paired by a datalink layer and a network layer, and then a transport layer transmits an identification program to the Smartphone, and a session layer completes a trusted connection according to a TCP communication and transmission protocol such as USBMUXD, ADB, MTP, and PTP, so that the Smartphone is capable of performing a data transmission operation including data backup and restoration at a presentation layer and an application layer to improve the convenience of operation and use.Type: GrantFiled: May 13, 2014Date of Patent: April 28, 2015Inventor: Sheng-Yuan Shih
-
Patent number: 9015470Abstract: A streaming video server includes a virtual file system that stores playlist data corresponding to a plurality of video programs available from at least one video source and that stores at least one initial video program segment for each of the plurality of video segments. The streaming video server receives a request for a selected one of the plurality of video programs from a client device. The selected one of the plurality of video programs is retrieved from the at least one video source in response to the request. A plurality of encoded segments are generated from the selected one of the plurality of video programs, based on rate data. A multiplexer generates a plurality of output segments from the at least one initial video program segment corresponding to the selected one of the plurality of video programs and the plurality of encoded video program segments.Type: GrantFiled: January 2, 2013Date of Patent: April 21, 2015Assignee: Morega Systems, IncInventors: Eugene Losev, Thomas Walter Maxwell, Michael Podolsky, Ashraf Tahir, King Chiu Tam
-
Patent number: 9003515Abstract: (EN) The invention relates to an authentication device (TK) set to identify itself to a computer (PC) as a native human interface device. It also relates to a system comprising an authentication device (TK) and a computer (PC), as well as to a method to have a computer (PC) recognize an authentication device (TK).Type: GrantFiled: December 20, 2010Date of Patent: April 7, 2015Assignee: Gemalto SAInventor: Hervé Ganem
-
Patent number: 8996887Abstract: Methods, systems, and apparatus, including a method for providing data. The method comprises receiving a first request from a first virtual machine (VM) to store data, obtaining the data and an access control list (ACL) of authorized users, obtaining a data key that has a data key identifier, encrypting the data key and the ACL using a wrapping key to generate a wrapped blob, encrypting the data, storing the wrapped blob and the encrypted data, and providing the data key identifier to users on the ACL. The method further comprises receiving a second request from a second VM to obtain a data snapshot, obtaining an unwrapped blob, obtaining the data key and the ACL from the unwrapped blob, authenticating a user associated with the second request, authorizing the user against the ACL, decrypting the data using the data key, and providing a snapshot of the data to the second VM.Type: GrantFiled: February 24, 2012Date of Patent: March 31, 2015Assignee: Google Inc.Inventors: Andrew Kadatch, Michael A. Halcrow
-
Patent number: 8989377Abstract: An apparatus comprising a processor configured to perform at least one transcoding operation on a first encrypted video frame to generate a second encrypted video frame. Also, a method comprising performing at least one transcoding operation on a first encrypted video frame to generate a second encrypted video frame. Also, an apparatus comprising a processor configured to retrieve a first encrypted video frame, wherein the first encrypted video frame is generated by encrypting an original video frame using an encryption key, and perform a transcoding operation on the encrypted video frame without revealing content of the original video frame.Type: GrantFiled: December 31, 2012Date of Patent: March 24, 2015Assignee: Futurewei Technologies, Inc.Inventors: Xin Wang, Xingze He, Xinwen Zhang
-
Patent number: 8978148Abstract: A communication apparatus may include a reception portion, a decision portion, and a transmission portion. The reception portion may receive a first data request transmitted through a first security level communication, and a second data request transmitted through a second security level communication, the second security level being more secure than the first security level. The decision portion may decide whether a specific data request is the first data request or the second data request. The transmission portion may transmit a specific data to an apparatus that is a transmission source of the specific data request if the specific data request is the second data request, and may transmit different data to the apparatus if the specific data request is the first data request. The different data contains display information for causing the apparatus to retransmit the specific data request through the second security level communication.Type: GrantFiled: March 1, 2012Date of Patent: March 10, 2015Assignee: Brother Kogyo Kabushiki KaishaInventors: Munehisa Matsuda, Yohei Maekawa, Takeshi Miyake, Yuki Yada