Patents Examined by James J Wilcox
  • Patent number: 9876749
    Abstract: In one embodiment, an apparatus comprises a first interface arrangement that obtains information from at least one data source. The information is associated with the presence of an entity at a location. The apparatus also comprises a processing arrangement that automatically updates a dynamic distribution list that is associated with the location based on the information.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: January 23, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Jim M. Kerr, Alan D. Gatzke, Cary A. Bran
  • Patent number: 9858213
    Abstract: An apparatus and method are described for implementing efficient communication between a microcontroller and a communication module.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: January 2, 2018
    Assignee: AFERO, INC.
    Inventors: Joe Britt, Scott Zimmerman
  • Patent number: 9853942
    Abstract: A method for balancing load among firewall security devices (FSDs) is provided. According to one embodiment, imminent shutdown of a first cluster unit of an HA cluster of FSDs is gracefully handled by a switching device. A load balancing (LB) table, forming associations between hash values output by the LB function and corresponding ports of the switching device to which the cluster units are coupled, is maintained. The first cluster unit is coupled to a first port. Responsive to imminent shutdown of the first cluster unit: (i) a second cluster unit, coupled to a second port, is selected to perform security services on traffic sessions handled by the first cluster unit; and (ii) the LB table is updated by replacing reference(s) to the first port with reference(s) to the second port. Security services for subsequently received network traffic associated with the traffic sessions is performed by the second cluster unit.
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: December 26, 2017
    Assignee: Fortinet, Inc.
    Inventors: Edward Lopez, Joe Mihelich, Matthew F. Hepburn
  • Patent number: 9825912
    Abstract: A method for balancing load among firewall security devices (FSDs) is provided. According to one embodiment, a switching device performs adaptive load balancing among cluster units of an HA cluster of firewall security devices. A load balancing (LB) function implemented by the switching device is configured based on information received from a network administrator. A LB table is maintained that forms associations between hash values output by the LB function and corresponding ports of the switching device to which the cluster units are coupled. Network traffic received by the switching device is directed to appropriate cluster units based on the LB function and the LB table. A traffic load on each of the cluster units is monitored. Responsive to a deviation from a predefined ideal traffic distribution, an attempt is made to improve performance of the HA cluster by dynamically adjusting the LB balancing table to address the deviation.
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: November 21, 2017
    Assignee: Fortinet, Inc.
    Inventors: Edward Lopez, Joe Mihelich, Matthew F. Hepburn
  • Patent number: 9785783
    Abstract: A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a process invoking the privileged function. The method includes communicating, to a computer process, access information of the privileged function, to allow the computer process to invoke the privileged function. The method includes executing the privileged function for the computer process. Executing the privileged function includes setting a processor that is being used by the computer process to use the first privilege level associated with the privileged function, executing the privileged function with that processor at the first privilege level, then restoring that processor to a previous privilege level, and returning control of that processor to the computer process.
    Type: Grant
    Filed: July 23, 2015
    Date of Patent: October 10, 2017
    Assignee: CA, Inc.
    Inventors: Howard Israel Nayberg, Frederic Duminy
  • Patent number: 9742876
    Abstract: This document describes techniques for transporting at least a portion of the data for a remote presentation session via datagrams. In particular, a span-out model is described whereby a remote presentation session can be associated with multiple channels and each channel can be routed through a different gateway computer system. As such, a connectionless oriented channel for a client may be routed through a first gateway computer system and a connection oriented channel for the client may be routed through a second gateway computer system. In addition to the foregoing, other techniques are described in the claims, the attached drawings, and the description.
    Type: Grant
    Filed: February 8, 2016
    Date of Patent: August 22, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Archan Das, Gopikrishna Kannan, Ravi K. Balachandran, Vikash Bucha
  • Patent number: 9686676
    Abstract: In an example embodiment, a method includes receiving, by an apparatus, from a remote server, a message including information about at least one device, the message including a second encryption key of the at least one device and an encrypted object encrypted with a first encryption key of the at least one device; transmitting, by the apparatus, an encrypted message that includes the encrypted object, encrypted with the second encryption key of the at least one device; and receiving, by the apparatus, from the at least one device, a message identifying or describing the at least one device, only if the at least one device has determined that the message transmitted by the apparatus is valid.
    Type: Grant
    Filed: January 16, 2015
    Date of Patent: June 20, 2017
    Assignee: Nokia Technologies Oy
    Inventors: Arto Palin, Jukka Reunamaki, Niko Kiukkonen, Teemu Savolainen
  • Patent number: 9646159
    Abstract: A device may identify a plurality of files for a multi-file malware analysis. The device may execute the plurality of files in a malware testing environment. The device may monitor the malware testing environment for behavior indicative of malware. The device may detect the behavior indicative of malware. The device may perform a first multi-file malware analysis or a second multi-file malware analysis based on detecting the behavior indicative of malware. The first multi-file malware analysis may include a partitioning technique that partitions the plurality of files into two or more segments of files to identify a file, included in the plurality of files, that includes malware. The second multi-file malware analysis may include a scoring technique that modifies a plurality of malware scores, corresponding to the plurality of files, to identify the file, included in the plurality of files, that includes malware.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: May 9, 2017
    Assignee: Juniper Networks, Inc.
    Inventors: Jacob Asher Langton, Daniel J. Quinlan, Kyle Adams, Declan Conlon
  • Patent number: 9648010
    Abstract: A relay device communicates with a server and a client device and includes a storage and a controller. The controller is configured to: receive, from the server, service use information which is to be used for the client device to use a service; transmit the received service use information to the client device; receive, from the client device, transmission instructing information containing key information which identifies CA certificate data stored in the storage and used for the client device to verify server certificate data; and transmit, to the client device, the CA certificate data identified by the key information contained in the received transmission instructing information. The CA certificate data is stored in the storage.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: May 9, 2017
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Satoshi Watanabe
  • Patent number: 9635552
    Abstract: A mobile terminal allocates data to a first wireless interface using a first communication network and a second wireless interface using a second communication network and executes wireless communication. The mobile terminal executes Web access to a server using the first wireless interface and acquires an authentication screen from the server. The mobile terminal executes Web access to a predetermined Web page, which is confirmed not to exist in advance, using the first wireless interface after the Web access is executed performed, and suppresses the allocation of the data to the second wireless interface when the Web access succeeds.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: April 25, 2017
    Assignee: FUJITSU LIMITED
    Inventors: Yoshiaki Hata, Eiji Iimori, Makoto Uchino
  • Patent number: 9635018
    Abstract: A user verification method and system, a password protection apparatus and a storage medium are disclosed, and the method includes: receiving an operation request containing a user identity of a user sent by the user via a user terminal; generating identity verification information according to the user identity; sending the identity verification information to an NFC terminal through near field communication with the NFC terminal, so that the NFC terminal prompts the user to provide identity acknowledgement; receiving identity acknowledgement information from the NFC terminal, if the identity acknowledgement is provided by the user, where the identity acknowledgement information contains an identifier of the NFC terminal; determining whether the user identity matches the identifier of the NFC terminal according to the identity acknowledgement information; and sending operation response information to the user terminal of the user if the user identity matches the identifier of the NFC terminal.
    Type: Grant
    Filed: April 27, 2016
    Date of Patent: April 25, 2017
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Jiwei Guo, Xin Yu, Luyi Lin, Shan Lu
  • Patent number: 9628470
    Abstract: A client device communicates with a server and a relay device and includes a controller and a storage.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: April 18, 2017
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Takafumi Mori
  • Patent number: 9628482
    Abstract: Systems and methods for mobile-based login via wireless credential transfer are disclosed. In some implementations, a proxy server receives a registration request for a receiver device for accessing a secure resource. The proxy server registers the receiver device in response to the registration request. The proxy server receives, from a transmitter device, information identifying the transmitter device along with authentication credentials for authenticating the receiver device to access the secure resource. The proxy server identifies the receiver device based on the information identifying the transmitter device. The proxy server forwards, to the receiver device, the authentication credentials for authenticating access of the receiver device to the secure resource.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: April 18, 2017
    Assignee: Cellco Partnership
    Inventors: Paul Berman, Mohammad Raheel Khalid, Ji Hoon Kim, Cory Michael Bruno, Mauricio Pati Caldeira de Andrada, Samir Vaidya
  • Patent number: 9626497
    Abstract: A system for sharing a USB Key by multiple virtual machines located at different hosts including at least two virtual machine managers, each virtual machine manager including a virtual machine transceiver module which is configured to receive a request for accessing a USB Key from a virtual machine within its host; a storage module which is configured to store an association relationship between a USB Key and the virtual machine authenticated by the USB Key; a verification module which is configured to, in response to judging that the virtual machine of the received request can access the USB Key, transmit the request for accessing the USB Key to a USB Key transceiver module of a virtual machine manager of the host where the USB Key is located; and a USB Key transceiver module which is configured to receive a request for accessing a USB Key, and to transmit an access request to a connected USB Key.
    Type: Grant
    Filed: April 5, 2016
    Date of Patent: April 18, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lijun Wei, Binqi Zhang, Qian Zhang, Qing Hong Zhuang
  • Patent number: 9589125
    Abstract: A 3D graphical password authentication method displays a 3D grid upon a user's request to access a restricted resource. The 3D graphical password authentication method requires the user to enter his or her access password by touching one or more intersections, namely touching the corresponding sensitive areas, on the 3D grid with an input device. A password is then produced as a sequence of the coordinates of the intersections touched along with penup values.
    Type: Grant
    Filed: December 31, 2014
    Date of Patent: March 7, 2017
    Inventor: Hai Tao
  • Patent number: 9584492
    Abstract: A cryptographic proxy service may be provided. Upon determining that data associated with a network destination comprises at least some sensitive data, a cryptographic service may provide a security certificate associated with the network destination. The plurality of data may be encrypted according to the security certificate associated with the network destination and provided to the cryptographic service for re-encryption and transmission to the network destination.
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: February 28, 2017
    Assignee: VMware, Inc.
    Inventor: Erich Stuntebeck
  • Patent number: 9569598
    Abstract: An approach for managing licenses for software installations on virtual machine (VM) instances in a networked computing environment (e.g., a cloud computing environment) is provided. Specifically, in one example, data (e.g., real-time and/or historical) pertaining to usage of a set of software installations on a set of (VM) instances in the networked computing environment is collected. When a request is received (e.g., from a requester) for a license for a particular software installation of the set of software installations, it is determined whether the license is available. If not, it is then determined whether the license is obtainable based on the collected data and a current configuration of the networked computing environment. Then, responsive to the license being obtainable, the requested license may be allocated.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: February 14, 2017
    Assignee: International Business Machines Corporation
    Inventors: Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang
  • Patent number: 9563747
    Abstract: Provided is an electronic device. The electronic device includes at least one processor for executing a plurality of operating systems; and a mobile high-definition link (MHL) module. The operating systems include a normal operating system for controlling a content service and a secure operating system for receiving information for controlling digital rights management (DRM) content from the MHL module and controlling a DRM service.
    Type: Grant
    Filed: May 9, 2014
    Date of Patent: February 7, 2017
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: One-Gun Lee, Hong-Seok Jeong, Hyun-Ho Park, Ju-Pyo Hong
  • Patent number: 9565022
    Abstract: A cryptographically-enabled RFID tag stores a primary secret key and derives secondary keys from the primary key. A secondary key may be derived by combining the primary key with one or more other parameters using one or more algorithms. The tag uses a derived secondary key to encrypt or electronically sign a tag response sent to a verifying entity. The verifying entity does not know the derived secondary key, but knows the tag primary key and the parameters and algorithms used to derive the secondary key and can derive all of the potential secondary keys. The verifying entity can then attempt to authenticate the tag or tag response by trying potential secondary keys.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: February 7, 2017
    Assignee: Impinj, Inc.
    Inventors: Matthew Robshaw, Alberto Pesavento, Christopher Diorio
  • Patent number: 9548965
    Abstract: Some embodiments use proxies on host devices to suppress broadcast traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some of these embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. The proxy monitors the VM's traffic, and intercepts broadcast packets when it knows how to deal with them. The proxy connects to a set of one or more controllers that provides a directory service that collects and maintains global information of the network. By connecting to the controller cluster, the proxy can obtain information that it can use to resolve broadcast requests. In some embodiments, the connection between the proxy and the controller cluster is encrypted and authenticated, to enhance the security.
    Type: Grant
    Filed: November 1, 2013
    Date of Patent: January 17, 2017
    Assignee: NICIRA, INC.
    Inventors: Hua Wang, Jianjun Shen, Donghai Han, Caixia Jiang, Wei Lu, Rahul Korivi Subramaniyam