Patents Examined by Hee Song
  • Patent number: 9100245
    Abstract: A user can have media files associated with a user account in a shared resource environment, enabling the user to access those files from multiple devices and locations. Instead of uploading each file, a process can scan the files to determine corresponding copies already stored to the shared resource environment, which can be associated with the user account without uploading another copy. In cases where encryption or other protection prevents the content of a file from being verified, a fingerprint of unencrypted records of the file can be generated and compared against an index of fingerprints for previously encountered files. If the fingerprint matches information stored for a media file, and the fingerprint meets at least one validity criterion, a copy of the media file can be associated with the user account even though the user's copy cannot be read, or potentially even played, by a component of the environment.
    Type: Grant
    Filed: May 16, 2012
    Date of Patent: August 4, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Colin Andrews, Aleksey Sergeyevich Perfilov
  • Patent number: 9098704
    Abstract: A system and method for capturing and re-calling an application function. The method of function re-call during anti-virus check includes the following steps: function intercept (capture); anti-virus analysis of the parameters used to call the function; preparing of an application stack for function re-call (when the analysis did not detect any malicious functionality); and calling the function again. The exemplary method can be used with browsers and other applications.
    Type: Grant
    Filed: October 9, 2013
    Date of Patent: August 4, 2015
    Assignee: Kaspersky Lab, ZAO
    Inventor: Alexander Ledenev
  • Patent number: 9098592
    Abstract: A method, system and computer program product for session completion through co-browsing is claimed. The method can include establishing a content browsing session between a first computing device and a content server serving access to content to the first computing device and maintaining state data for the content browsing session. A co-browsing arrangement of the content can be created as between the first computing device and a second computing device and at least a subset of the state data can be cloned for use by the second computing device during co-browsing of the content. Thereafter, a modified form of the subset of the state data can be received from the second computing device resulting from the co-browsing of the content by the second computing device and the modified form of the subset of the state data can be provided to the first computing device for use during the content browsing session.
    Type: Grant
    Filed: December 14, 2011
    Date of Patent: August 4, 2015
    Assignee: International Business Machines Corporation
    Inventors: Andrew J. Ivory, Todd E. Kaplinger, Barry J. Pellas, Matthew T. Pellas
  • Patent number: 9081959
    Abstract: A non-transitory processor-readable medium storing code representing instructions to cause a processor to perform a process includes code to cause the processor to receive a set of indications of allowed behavior associated with an application. The processor is also caused to initiate an instance of the application within a sandbox environment. The processor is further caused to receive, from a monitor module associated with the sandbox environment, a set of indications of actual behavior of the instance of the application in response to initiating the instance of the application within the sandbox environment. The processor is also caused to send an indication associated with an anomalous behavior if at least one indication from the set of indications of actual behavior does not correspond to an indication from the set of indications of allowed behavior.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: July 14, 2015
    Assignee: Invincea, Inc.
    Inventors: Anup Ghosh, Scott Cosby, Alan Keister, Benjamin Bryant, Stephen Taylor
  • Patent number: 9077692
    Abstract: Techniques are described for blocking unidentified encrypted communication sessions. In one embodiment, a device includes an interface to receive a packet, an application identification module to attempt to identify an application associated with the packet, an encryption detection module to determine whether the packet is encrypted when the application identification module is unable to identify an application associated with the packet, and an attack detection module to determine whether the packet is associated with a network attack, to forward the packet when the packet is not associated with a network attack, and to take a response when the packet is associated with a network attack, wherein the encryption detection module sends a message to the attack detection module that indicates whether the packet is encrypted, wherein when the message indicates that packet is encrypted, the attack detection module determines that the packet is associated with a network attack.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: July 7, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Bryan Burns, Vladimir Sukhanov
  • Patent number: 9077687
    Abstract: Embodiments of the present invention include a method for providing a secure domain name system (DNS) for machine to machine communications. In one embodiment, the method includes storing policy information for machine to machine communications in a global DNS registry database server. The method further includes communicating the policy information for machine to machine communications from the global DNS registry database server to a machine DNS registry server located in an Internet service provider (ISP) network, wherein a control signaling gateway located in the ISP network is configured to utilize the policy information for machine to machine communications to allow only registered controllers associated with a machine to communicate with the machine.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: July 7, 2015
    Assignee: CenturyLink Intellectual Property LLC
    Inventor: Michael K. Bugenhagen
  • Patent number: 9077538
    Abstract: A computer-implemented method for verifying user identities may include (1) identifying a request to ascertain whether a user account corresponds to a physical person, and, in response to the request, (2) identifying a password vault configured to store login information for at least one third-party Internet site for the user account, the third-party Internet site requiring a physical validation factor to log in to the third-party Internet site, (3) determining, based at least in part on the login information for the third-party Internet site, that the user account corresponds to the physical person, and (4) responding to the request with an indicator that the user account corresponds to the physical person. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 15, 2011
    Date of Patent: July 7, 2015
    Assignee: Symantec Corporation
    Inventors: Shaun Cooley, Paul Agbabian
  • Patent number: 9043886
    Abstract: A framework is provided for integrating Internet identities in enterprise identity and access management (IAM) infrastructures. A framework is provided for open authorization. A framework is also provided for relying party functionality. A mapping repository can be configured to store a mapping between applications and identity providers. The mapping associates each application of a plurality of applications with one or more identity providers. Identity management logic can be configured to use the mapping to determine that one or more identity providers of a first plurality of identity providers can be used to perform authentication activities on behalf of the first application in response to receiving a first request associated with a first application.
    Type: Grant
    Filed: May 4, 2012
    Date of Patent: May 26, 2015
    Assignee: Oracle International Corporation
    Inventors: Venkataraman Uppili Srinivasan, Rajeev Angal, Ajay Sondhi, Shivaram Bhat
  • Patent number: 9038190
    Abstract: A communication apparatus may include a reception portion, a decision portion, and a transmission portion. The reception portion may receive a first data request transmitted through a first security level communication, and a second data request transmitted through a second security level communication, the second security level being more secure than the first security level. The decision portion may decide whether a specific data request is the first data request or the second data request. The transmission portion may transmit a specific data to an apparatus that is a transmission source of the specific data request if the specific data request is the second data request, and may transmit different data to the apparatus if the specific data request is the first data request. The different data contains display information for causing the apparatus to retransmit the specific data request through the second security level communication.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: May 19, 2015
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventors: Munehisa Matsuda, Yohei Maekawa, Takeshi Miyake, Yuki Yada
  • Patent number: 9037853
    Abstract: The invention relates to a P2P communication method for multi-subscriber networks, which is protected from deception, eavesdropping and hacking, and wherein the communication carried out in an interval is predominantly carried out in separate rooms, allocated to the P2P communication, and with separate reference data allocated to the P2P communication. At least part of the separate random reference data and/or random data is generated in at least one unit that participates in the P2P communication and is exchanged within the P2P communication in the form of relative data. The separate P2P communication is initiated with respect to at least one global random reference date valid for the time of the P2P communication, the random reference date being valid for a randomly determined time range and being stored in all units that carry out the P2P communications in a secret and non-deceivable manner.
    Type: Grant
    Filed: November 17, 2008
    Date of Patent: May 19, 2015
    Assignee: Fachhochschule Schmalkalden
    Inventors: Werner Rozek, Thomas Rozek, Jan Rozek
  • Patent number: 9032525
    Abstract: A system for protecting an electronic system against malware includes an operating system configured to execute on the electronic device, a driver coupled to the operating system, and a below-operating-system security agent. The below-operating-system security agent is configured to identify one or more resources for changing filters of the driver, trap an attempted access of the one or more resources that originates from the operational level of the operating system, access one or more security rules to determine whether the attempted access is indicative of malware, and operate at a level below all of the operating systems of the electronic system accessing the one or more resources for changing filters of the driver.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: May 12, 2015
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9032496
    Abstract: Systems and methods that provide secure single sign-on are described herein. When a user provides credentials to a client device, the credentials may be intercepted and cached at a secure location, such as within a trusted environment. When a client process, such as a remote desktop program running on the client device, requests the credentials for single sign-on to a server providing remote desktop services, the credentials may be secured, such as within an opaque container that may be accessed only components running in trusted environments, and provided to the client process. The client process may be running in an untrusted environment, such as an operating system session. The client device may forward the secured credentials to a trusted environment in the server, effectuating single sign-on.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: May 12, 2015
    Assignee: Citrix Systems, Inc.
    Inventor: Virgiliu Mocanu
  • Patent number: 9032543
    Abstract: Methods and systems for providing access to content are disclosed. The method is performed at least in part at a client computer system having a processor and memory. The method includes executing a host application associated with a first party. In some implementations, the host application is a media player. The method further includes initiating a secure communication channel between the host application and a server associated with the first party. The method further includes executing a supplemental application associated with a second party. The method further includes accessing, with the supplemental application, content licensed to the first party, wherein the licensed content is accessible to the supplemental application via the secure communication channel subject to terms of a licensing agreement. In some implementations, the content is media content, such as music, movies, and the like.
    Type: Grant
    Filed: July 21, 2014
    Date of Patent: May 12, 2015
    Assignee: Spotify AB
    Inventors: Mattias Robert Arrelid, Mikael Gustav Olenfalk
  • Patent number: 9027124
    Abstract: A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path.
    Type: Grant
    Filed: May 14, 2012
    Date of Patent: May 5, 2015
    Assignee: Broadcom Corporation
    Inventors: Jacob Mendel, Alexander Potievsky
  • Patent number: 9021579
    Abstract: A Smartphone data backup and restoration system on a physical layer is connected to a Smartphone through a data transmission line, and the data backup and restoration system and the Smartphone are identified and paired by a datalink layer and a network layer, and then a transport layer transmits an identification program to the Smartphone, and a session layer completes a trusted connection according to a TCP communication and transmission protocol such as USBMUXD, ADB, MTP, and PTP, so that the Smartphone is capable of performing a data transmission operation including data backup and restoration at a presentation layer and an application layer to improve the convenience of operation and use.
    Type: Grant
    Filed: May 13, 2014
    Date of Patent: April 28, 2015
    Inventor: Sheng-Yuan Shih
  • Patent number: 9015470
    Abstract: A streaming video server includes a virtual file system that stores playlist data corresponding to a plurality of video programs available from at least one video source and that stores at least one initial video program segment for each of the plurality of video segments. The streaming video server receives a request for a selected one of the plurality of video programs from a client device. The selected one of the plurality of video programs is retrieved from the at least one video source in response to the request. A plurality of encoded segments are generated from the selected one of the plurality of video programs, based on rate data. A multiplexer generates a plurality of output segments from the at least one initial video program segment corresponding to the selected one of the plurality of video programs and the plurality of encoded video program segments.
    Type: Grant
    Filed: January 2, 2013
    Date of Patent: April 21, 2015
    Assignee: Morega Systems, Inc
    Inventors: Eugene Losev, Thomas Walter Maxwell, Michael Podolsky, Ashraf Tahir, King Chiu Tam
  • Patent number: 9003515
    Abstract: (EN) The invention relates to an authentication device (TK) set to identify itself to a computer (PC) as a native human interface device. It also relates to a system comprising an authentication device (TK) and a computer (PC), as well as to a method to have a computer (PC) recognize an authentication device (TK).
    Type: Grant
    Filed: December 20, 2010
    Date of Patent: April 7, 2015
    Assignee: Gemalto SA
    Inventor: Hervé Ganem
  • Patent number: 8996887
    Abstract: Methods, systems, and apparatus, including a method for providing data. The method comprises receiving a first request from a first virtual machine (VM) to store data, obtaining the data and an access control list (ACL) of authorized users, obtaining a data key that has a data key identifier, encrypting the data key and the ACL using a wrapping key to generate a wrapped blob, encrypting the data, storing the wrapped blob and the encrypted data, and providing the data key identifier to users on the ACL. The method further comprises receiving a second request from a second VM to obtain a data snapshot, obtaining an unwrapped blob, obtaining the data key and the ACL from the unwrapped blob, authenticating a user associated with the second request, authorizing the user against the ACL, decrypting the data using the data key, and providing a snapshot of the data to the second VM.
    Type: Grant
    Filed: February 24, 2012
    Date of Patent: March 31, 2015
    Assignee: Google Inc.
    Inventors: Andrew Kadatch, Michael A. Halcrow
  • Patent number: 8989377
    Abstract: An apparatus comprising a processor configured to perform at least one transcoding operation on a first encrypted video frame to generate a second encrypted video frame. Also, a method comprising performing at least one transcoding operation on a first encrypted video frame to generate a second encrypted video frame. Also, an apparatus comprising a processor configured to retrieve a first encrypted video frame, wherein the first encrypted video frame is generated by encrypting an original video frame using an encryption key, and perform a transcoding operation on the encrypted video frame without revealing content of the original video frame.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: March 24, 2015
    Assignee: Futurewei Technologies, Inc.
    Inventors: Xin Wang, Xingze He, Xinwen Zhang
  • Patent number: 8978148
    Abstract: A communication apparatus may include a reception portion, a decision portion, and a transmission portion. The reception portion may receive a first data request transmitted through a first security level communication, and a second data request transmitted through a second security level communication, the second security level being more secure than the first security level. The decision portion may decide whether a specific data request is the first data request or the second data request. The transmission portion may transmit a specific data to an apparatus that is a transmission source of the specific data request if the specific data request is the second data request, and may transmit different data to the apparatus if the specific data request is the first data request. The different data contains display information for causing the apparatus to retransmit the specific data request through the second security level communication.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: March 10, 2015
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventors: Munehisa Matsuda, Yohei Maekawa, Takeshi Miyake, Yuki Yada