Patents Examined by Jeffrey D. Popham
  • Patent number: 8370955
    Abstract: Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second device in proximity, ideally using existing radio capabilities such as Bluetooth (IEEE802.15.1-2002) or Wi-Fi (IEEE802.11). The detected identifier, being associated with the device, is also associated with an entity. Rather than directly exchanging application data flow between the two devices using the short range wireless capability, a second wireless capability allows for one or more of the devices to communicate with a central server via the internet, and perform the exchange of application data flow. By using a central server to draw on stored information and content associated with the entities the server can broker the exchange of information between the entities and the devices.
    Type: Grant
    Filed: January 27, 2011
    Date of Patent: February 5, 2013
    Assignee: Proxicom Wireless, LLC
    Inventors: James Arthur Proctor, Jr., James Arthur Proctor, III
  • Patent number: 8364950
    Abstract: An auditable cryptographic protected communication system for connecting an enterprise server to a plurality of industrial devices using messaging protocols for each industrial device enabling the industrial devices to receive commands and transmit status and measurement data using the individual device messaging protocols over a network.
    Type: Grant
    Filed: July 18, 2012
    Date of Patent: January 29, 2013
    Assignee: DJ Inventions, LLC
    Inventor: Douglas C. Osburn, III
  • Patent number: 8363658
    Abstract: A system is provided comprising a computer system, a configuration database, and a dynamic network interfaces application that receives a message from a network access component containing a request to authenticate a client device accessing a network service, determines that a policy requires the client device to be associated with a virtual local area network to access the network service, and authenticates the client device for association with the virtual local area network. The dynamic network interfaces application also searches the configuration database for configuration information to provision the virtual local area network, assigns the configuration information to the client device, the network access component, and a firewall component, and sends a reply containing the configuration information to the network access component and the firewall component in response to the request, wherein the configuration information comprises settings to provision the virtual local area network.
    Type: Grant
    Filed: November 13, 2008
    Date of Patent: January 29, 2013
    Assignee: Sprint Communications Company L.P.
    Inventors: Jason R. Delker, John M. Everson, James W. Norris, Carol A. Ross, Jason K. Whitney
  • Patent number: 8365288
    Abstract: An efficient virus detection, malware detection, and packet filtering system in a mobile device by providing optimized hash functions from a server to a mobile device that reduce hash collisions during the virus detection, malware detection, and packet filtering in a system-on-chip configuration.
    Type: Grant
    Filed: June 21, 2011
    Date of Patent: January 29, 2013
    Assignee: Samsung SDS Co., Ltd.
    Inventor: InSeon Yoo
  • Patent number: 8355506
    Abstract: A method for producing scrambled content (FIG. 6A), the method including providing content (600) to be scrambled, identifying a first portion of the content (620), identifying a second portion of the content (630), computing a disguising function of at least part of the first portion (620) of the content and producing a result, and scrambling the second portion (630) of the content, the scrambling being based in part, on the result. Related apparatus and methods are also described.
    Type: Grant
    Filed: November 17, 2005
    Date of Patent: January 15, 2013
    Assignee: NDS Limited
    Inventor: Perry Smith
  • Patent number: 8352734
    Abstract: A method for updating the firmware of a security module allowing it to “jump” towards a dedicated separate patch message stream thanks to a trigger messages stream broadcasted in a main stream of management messages. The trigger messages comprise version information allowing establishing whether the security module is up-to-date, and an identifier indicating to the security module the suitable patch stream. If the current version of the firmware of the security module is inferior to the patch version, the security module is directed towards the stream of patch messages designated by the identifier included in the trigger messages. Once the update of the firmware is complete, the security module is again directed towards the main stream. This return can be carried out automatically, namely with a switch message comprising an identifier of the first stream.
    Type: Grant
    Filed: January 23, 2007
    Date of Patent: January 8, 2013
    Assignee: Nagravision S.A.
    Inventors: Xavier Carrel, Olivier Brique, Henri Kudelski, Nicolas Fisher
  • Patent number: 8347352
    Abstract: A method and system for securing hosting web pages from malicious third party modules. The method includes uploading a third party module to a hosting web page; validating a proxy API call received from the third party module, wherein the proxy API call includes at least a payload parameter provided by the third party module; generating an engine API call including at least the payload parameter; validating the engine API call; and executing the payload parameter if the engine API call is validated.
    Type: Grant
    Filed: November 2, 2009
    Date of Patent: January 1, 2013
    Assignee: Mediamind Technologies Ltd.
    Inventor: Efraeim Cohen
  • Patent number: 8340287
    Abstract: Techniques for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions are provided. A first one of multiple factors is stored. All of the factors are under the control of a user and all are required to generate a first private portion of the split private key. The first private portion not stored in a persistent state. A second private portion of the split private key under control of an entity other than the user is also stored. The first private portion and the second private portion are combinable to form a complete private portion.
    Type: Grant
    Filed: March 23, 2010
    Date of Patent: December 25, 2012
    Assignee: VMware, Inc.
    Inventors: Ravinderpal Singh Sandhu, Brett Jason Schoppert, Ravi Ganesan, Mihir Bellare, Colin Joseph deSa
  • Patent number: 8341701
    Abstract: The conventional data transmitting/receiving system has problems: that a correct measurement cannot be performed because a measurement result is an addition of a verification processing time and a transmission time; that an authentication processing which is necessary for a transmission time measurement processing needs to be separately required; and that an unnecessary key exchange processing is executed.
    Type: Grant
    Filed: September 6, 2005
    Date of Patent: December 25, 2012
    Assignee: Panasonic Corporation
    Inventors: Yasushi Ayaki, Hiroyuki Iitsuka, Naoshi Usuki
  • Patent number: 8341409
    Abstract: A content server apparatus (10) includes: a unique information holding unit (103) which holds unique information of an on-vehicle player apparatus (20), a content obtaining unit (101) which obtains a content from outside, an encrypting unit (104) which encrypts the obtained content, prior to a transmission request from the on-vehicle player apparatus (20), onto an encrypted content using the unique information, a storing unit (105) which stores the encrypted content, and a transmitting unit (107) which transmits the stored encrypted content in response to the transmission request from the on-vehicle player apparatus (20). The on-vehicle player apparatus includes a storage medium (208) which stores the received encrypted content, and a decrypting unit (209) which decrypts the stored encrypted content in response to a reproduction request given from outside.
    Type: Grant
    Filed: June 20, 2006
    Date of Patent: December 25, 2012
    Assignee: Panasonic Corporation
    Inventors: Satoru Itani, Yuji Mizuguchi
  • Patent number: 8341425
    Abstract: Provided is a storage device which partitions data from a host into multiple partitioned data and distributes, encrypts and stores them together with a parity to and in multiple memory mediums. This storage device executes processing of restoring the partitioned data or the parity stored in a memory medium to be subject to encryption re-key based on decrypted data of the partitioned data or the parity stored in each memory medium other than the memory medium to be subject to encryption re-key among the multiple memory mediums, storing the restored partitioned data or the parity in a backup memory medium while encrypting the restored partitioned data or the parity with a new encryption key, and thereafter interchanging the backup memory medium and the memory medium to be subject to encryption re-key so that the backup memory medium will be a memory medium configuring the parity group and the memory medium to be subject to encryption re-key will be the backup memory medium.
    Type: Grant
    Filed: May 25, 2009
    Date of Patent: December 25, 2012
    Assignee: Hitachi, Ltd.
    Inventors: Hirotaka Nakagawa, Masayasu Asano, Takeki Okamoto, Nobuyuki Osaki
  • Patent number: 8335426
    Abstract: To allow AV data created after the start of recording until the end of recoding to be easily continuously recorded and reproduced for a long time as a file. A stream of which AV data have been multiplexed is recorded to a file in the unit of a packet. When the file size exceeds 2 GB with the next packet that is recorded, record control is performed such that the time of the last end of audio data of the current file matches the time of the beginning of audio data of the next file to which the stream is recorded, the current file is closed, and seamless connection that denotes that the closed file and the next file to which the stream is recorded are connected such that audio data do not overlap is set. A file is newly created and the stream is continuously recorded thereto. The recording of the file is stopped according to a stop operation. When the recording is performed for a long time, a file is automatically divided.
    Type: Grant
    Filed: July 25, 2007
    Date of Patent: December 18, 2012
    Assignee: Sony Corporation
    Inventors: Yukio Isobe, Kenichiro Aridome, Naoki Morimoto, Atsushi Mae, Tetsuhiro Maeda
  • Patent number: 8332922
    Abstract: In a web-based service environment, third party providers need to have varying degrees of access to user data for their complementary services. To prevent third party providers from having broader access than necessary or not adequate levels of access, transferable restricted security tickets are employed to determine an appropriate level of access for third parties. Tickets with expiration and restriction roles define a duration and level of access for a third party. The restrictions are determined through an intersection of the authorizing user's security role and restriction roles defined in the system.
    Type: Grant
    Filed: August 31, 2007
    Date of Patent: December 11, 2012
    Assignee: Microsoft Corporation
    Inventors: Richard L. Dickinson, Edward A. Martinez, Dominic J. Pouzin, Jasjit S. Grewal, Michael J. Ott
  • Patent number: 8332627
    Abstract: Mutual authentication systems and methods are described that comprise an authenticating server that is available across a network and capable of authenticating a user based on credentials provided by the user. An embeddable object provided by the authenticating server and containing a passphrase that identifies the server to the user. A credentials entry mechanism identifies the user to the authenticating server. A user device displays an Outer Page that can request authentication. The authenticating server verifies the source of the request and provides the passphrase to the user device. The display of the passphrase confirms the identity of the authenticating server to the user. The source of the request can be verified using a secure cookie. The embeddable object can be provided in a second page and can prevent display of the passphrase if user input is not directed to the second page.
    Type: Grant
    Filed: February 8, 2007
    Date of Patent: December 11, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Brian L. Matthews, Cayce M. Ullman, Schuyler Ullman, Scott Olechowski, Ashish Warty
  • Patent number: 8332951
    Abstract: The present invention discloses a method, a computer program product, a system, and a device for securing content of a surface-based computing device. In the invention, a delineated region of a surface of a surface-based computing device referred to as a section can be identified. The section can be a computing space owned by at least one user referred to as a section owner. Other regions of the surface exist that are computing spaces distinct from the section. A set of section specific settings can be established that are configurable by the section owner. An attempt to convey at least one software object across a section boundary separating the section from one of the other regions can be identified. The section specific settings can be applied to the attempt. Appropriate programmatic actions can be taken based upon the section specific settings.
    Type: Grant
    Filed: February 12, 2008
    Date of Patent: December 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Al Chakra, Monica S. Harris, Ruthie D. Lyle
  • Patent number: 8327418
    Abstract: A presentation apparatus includes: a communication connection establishing unit establishing a communication connection with a plurality of receiving terminals and a source terminal, the source terminal having a token corresponding to an authority of controlling a presentation; a presentation data relay unit receiving presentation data from the source terminal, broadcasting a presentation image to the plurality of receiving terminals to display the presentation image of the received presentation data on each screen of the plurality of receiving terminals, and broadcasting voice information to the source terminal and the plurality of receiving terminals to output, from each terminal, the voice information being inputted from any one of the source terminal and the plurality of receiving terminals; and a presentation control unit controlling a transmission/reception of the presentation image and the voice information, and controlling a receiving terminal requesting the token to obtain the token.
    Type: Grant
    Filed: March 19, 2007
    Date of Patent: December 4, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jin Wook Lee, Su Myeon Kim, Hun Lim, Won Keun Kong
  • Patent number: 8321953
    Abstract: A system to authorize access to secured data storage can comprise a user interface configured to receive a user code offline from a user to allow access to stored data, circuitry configured to authorize access to the stored data based, at least in part, on the user code and provide access to the stored data, and a storage system configured to store the stored data.
    Type: Grant
    Filed: July 14, 2006
    Date of Patent: November 27, 2012
    Assignee: Imation Corp.
    Inventor: David Alexander Jevans
  • Patent number: 8315391
    Abstract: In an information access system, a reader/writer device encrypts, with a first encryption key, an information request and a second encryption key to thereby generate first encrypted data, and encrypts the information request with the second encryption key to thereby generate second encrypted data, and transmits cyclically an information request signal that alternately carries the first encrypted data and the second encrypted data. An active contactless information storage device receives the information request signal and decrypts the encrypted data carried by the information request signal with one encryption key stored in its memory. When the second encryption key different from the one encryption key is contained in the decrypted data, the information storage device rewrites the one encryption key with the second encryption key.
    Type: Grant
    Filed: April 27, 2007
    Date of Patent: November 20, 2012
    Assignee: Fujitsu Limited
    Inventors: Satoshi Inano, Isamu Yamada, Shinichi Shiotsu, Akira Itasaki
  • Patent number: 8315386
    Abstract: A method for performing an encrypted voice call between a first terminal and a second terminal supporting a Voice over Internet Protocol (VoIP)-based voice call. In the method, the first and second terminals generate and store a bio key using biographical (bio) information of a user in advance before performing a voice call, the first terminal sends a request for a voice call to the second terminal and establishing a session, the first and second terminals exchange and store a bio key stored in each terminal, and the first and second terminals generate a session shared key using the exchanged bio key and starting a Secure Real-time Transport Protocol (SRTP) session, and a restored bio key by acquiring bio information from received data. User authentication is then performed by comparing the bio key with the restored bio key.
    Type: Grant
    Filed: July 7, 2009
    Date of Patent: November 20, 2012
    Assignee: Samsung Electronics Co., LTD
    Inventors: Jae-Sung Park, Tae-Sung Park, Jae-Hoon Kwon, Do-Young Joung, Sung-Kee Kim, Yong-Gyoo Kim, Ji-Wan Song
  • Patent number: 8312546
    Abstract: Various embodiments, including a method comprising creating a first fuzzy fingerprint of a known malware file, the first fuzzy fingerprint including a first set of calculated complexity approximations and weightings for each of a plurality of blocks within the known malware file, creating a second fuzzy fingerprint of a file to be checked, the second fuzzy fingerprint including a second set of calculated complexity approximations and weightings for each of a plurality of blocks within the file to be checked, comparing the second fuzzy fingerprint to the first fuzzy fingerprint, calculating a similarity probability for each of the block-wise comparisons, the calculation including a respective weightings for each of the plurality of blocks within the known malware file and for each of the plurality of blocks within the file to be checked, and the calculation including a distance between the compared blocks; and calculating an overall similarity probability for the plurality of blocks compared.
    Type: Grant
    Filed: April 23, 2007
    Date of Patent: November 13, 2012
    Assignee: McAfee, Inc.
    Inventor: Christoph Alme