Patents Examined by Jenise Jackson
  • Patent number: 9876820
    Abstract: An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server. To provide the forward secrecy for this particular leg, the edge server selects an ephemeral value, and applies a cryptographic hash the value to compute a server random value, which is then transmitted back to the requesting client. That server random value is later re-generated at the cryptographic server to enable the cryptographic server to compute a master secret. The forward secrecy is enabled by ensuring that the ephemeral value does not travel on the wire.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: January 23, 2018
    Assignee: Akamai Technologies, Inc.
    Inventors: Charles E. Gero, Philip A. Lisiecki
  • Patent number: 9866546
    Abstract: Disclosed are various examples of selectively enabling multi-factor authentication for applications on managed devices. An identity provider receives an authentication request for a first client application executed in a managed client device. The authentication request includes a first authentication factor corresponding to a management credential. The identity provider then determines whether one or more second authentication factors should be requested. If so, the identity provider then requests the second authentication factor(s) from a second client application. The identity provider receives the second authentication factor(s) from the second client application. The identity provider then authenticates the first client application in response to verifying the first authentication factor and the second authentication factor(s).
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: January 9, 2018
    Assignee: AirWatch LLC
    Inventor: Jonathan Blake Brannon
  • Patent number: 9852315
    Abstract: Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two stages of operation; a configuration stage and a user mode stage. To prevent tampering and/or reverse engineering of a programmable device, various anti-tampering techniques may be employed during either stage of operation to disable the device and/or erase sensitive information stored on the device once tampering is suspected. One type of tampering involves bombarding the device with a number of false configuration attempts in order to decipher encrypted data. By utilizing a dirty bit and a sticky error counter, the device can keep track of the number of failed configuration attempts that have occurred and initiate anti-tampering operations when tampering is suspected while the device is still in the configuration stage of operation.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: December 26, 2017
    Assignee: Altera Corporation
    Inventor: Bruce B. Pedersen
  • Patent number: 9848013
    Abstract: Provided are methods and systems for detecting a DoS attack when initiating a secure session. A method for detecting a DoS attack may commence with receiving, from a client, a request to initiate a secure session between the client and a server. The method may continue with sending a pre-generated key to the client. The method may further include establishing that the request from the client is suspected of the DoS attack. The establishment may be performed based on further actions associated with the client.
    Type: Grant
    Filed: February 5, 2015
    Date of Patent: December 19, 2017
    Assignee: A10 NETWORKS, INC.
    Inventors: Yang Yang, Ali Golshan
  • Patent number: 9838423
    Abstract: Provided are methods and systems for mitigating a DoS attack. A method for mitigating a DoS attack may commence with receiving, from a client, a request to initiate a secure session between the client and a server. The method may continue with determining whether the client is on a whitelist. Based on a determination that client is absent from the whitelist, a pre-generated key may be sent to the client. The method may include determining validity of the established secure session. The determination may be performed based on further actions associated with the client. Based on the determination that the secure session is valid, a renegotiation of the secure session may be forced. The method may further include generating a new key using a method for securely exchanging cryptographic keys over a public channel. The new key is then sent to the client.
    Type: Grant
    Filed: January 27, 2017
    Date of Patent: December 5, 2017
    Assignee: A10 NETWORKS, INC.
    Inventors: Yang Yang, Ali Golshan
  • Patent number: 9830481
    Abstract: A transponder (1) comprises at least one memory (MEM1, MEM2) for storing encrypted information (E_k(EPC, PI)) that has been encrypted by use of a key (k) and for storing the key (k) associated with the encrypted information (E_k(EPC, PI)). The transponder (1) is adapted to send the key (k) slower response than the encrypted information (E_k(EPC, PI)) in response to queries of a reading device (2), which is preferably done by delaying the transmission of the key (k) or by limiting the response rate at which the key (k) is transmitted. In particular the invention is related to RFID systems.
    Type: Grant
    Filed: June 14, 2006
    Date of Patent: November 28, 2017
    Assignee: NXP B.V.
    Inventors: Pim Tuyls, Geert Jan Schrijen, Stefan Maubach, Boris Skoric, Antoon Marie Henrie Tombeur
  • Patent number: 9832024
    Abstract: Methods, systems, and devices are provided for authenticating API messages using PKI-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an API message using the private key of the private/public key pair and a PKI-based cryptographic algorithm, before sending the signed API message to a server system. The server system (e.g., operated by a service provider) can authenticate the incoming signed API message using a proxy authenticator located in less trusted zone (e.g., a perimeter network) of the server system. In particular, the proxy authenticator can be configured to verify the signature of the signed API message using the public key corresponding to the private key and the same cryptographic algorithm. The authenticated API message can then be forwarded to a more trusted zone (e.g., an internal network) of the server system for further processing.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: November 28, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Minghua Xu, Jose Rios Trevino, Ying Hao
  • Patent number: 9817958
    Abstract: The disclosed computer-implemented method for authenticating users may include (1) identifying at least one digital device with which a user interacts, (2) gathering information about how the user interacts with the digital device, (3) generating, based on the gathered information, an authentication protocol for authenticating the user, and (4) using the authentication protocol to authenticate the user. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 25, 2015
    Date of Patent: November 14, 2017
    Assignee: Symantec Corporation
    Inventor: Bruce McCorkendale
  • Patent number: 9813412
    Abstract: A computer analyzes a message attachment protected by a password. The message is intercepted from a sender before the message reaches the recipient. The computer cannot open, decrypt, unpack or decompress the attachment because the computer cannot parse the password. The message is modified to render the attachment unusable by the recipient and a URL is added. After the modified message is sent to the recipient, the computer receives the correct password from the recipient allowing the computer to open the attachment and perform anti-malware scanning. If malicious, the attachment is quarantined, deleted or blocked. If not malicious, the attachment (password-protected or not) is downloaded to the recipient, sent by e-mail or text message, or made available on a Web site. The recipient may be a mobile device or computer. Software may be part of an e-mail server, part of a mail transfer agent, or part of a separate computer.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: November 7, 2017
    Assignee: TREND MICRO INC.
    Inventors: Guangxiang Yang, Zhichao Ding
  • Patent number: 9813447
    Abstract: A function is provided in a network system for adjusting network policies associated with the operation of network infrastructure devices of the network system. Network policies are established on network devices including packet forwarding devices. The network has a capability to identify computer applications associated with traffic running on the network. A network policy controller of the network is arranged to change one or more policies of one or more network devices based on computer application information acquired. The policies changed may be network policies as well as mirroring policies. An example policy to change is direct a network device to mirror traffic to an application identification appliance for the purpose of identifying applications running on the network through a plurality of mechanisms. The function may be provided in one or more devices of the network.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: November 7, 2017
    Assignee: Extreme Networks, Inc.
    Inventors: Michael Rash, Markus Nispel, Jamie Woodhead, Richard Graham
  • Patent number: 9807079
    Abstract: Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a particular embodiment, a method provides receiving an authentication request from a user system directed to a SSO service and determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service. Upon determining that the authentication request satisfies the at least one criterion, the method provides forwarding the authentication request to the SSO service.
    Type: Grant
    Filed: October 23, 2015
    Date of Patent: October 31, 2017
    Assignee: Palo Alto Network, Inc.
    Inventor: Nishant Doshi
  • Patent number: 9794071
    Abstract: A file is created in which digital data and a certificate are integrated and content authentication for the digital data and the certificate are performed simultaneously.
    Type: Grant
    Filed: February 2, 2011
    Date of Patent: October 17, 2017
    Assignee: GENIUS NOTE CO., LTD.
    Inventor: Hikaru Deguchi
  • Patent number: 9794265
    Abstract: Provided is authentication and authorization without the use of supplicants. Authentication and authorization includes generating a profile for a device based on at least one characteristic observed during a successful attempt by the device to access an 802.1X network infrastructure. Expected characteristics for a next attempt to access the infrastructure by the device are determined. A characteristic of the next access attempt is matched to the expected characteristic and access to the network is selectively controlled as a result of the matching. This is achieved without a supplicant being installed on the device.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: October 17, 2017
    Assignee: WELLS FARGO BANK, N.A.
    Inventors: Ryan B. Benskin, Lawrence T. Belton, Jr., Christopher Houser, Peter A. Makohon, Timothy Morris, Omar Bracey
  • Patent number: 9774581
    Abstract: A user equipment (UE) may perform functions locally, such as on a trusted module that resides within the UE. For example, a UE may perform functions associated with a single sign-on protocol, such as OpenID Connect for example, via a local identity provider function. For example, a UE may generate identity tokens and access tokens that can be used by a service provider to retrieve user information, such as identity information and/or user attributes. User attributes may be retrieved via a user information endpoint that may reside locally on the UE or on a network entity. A service provider may grant a user access to a service based on the information that it retrieves using the tokens.
    Type: Grant
    Filed: January 18, 2013
    Date of Patent: September 26, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Andreas Leicher, Yogendra C. Shah, Vinod K. Choyi
  • Patent number: 9762548
    Abstract: A method, system, and apparatus are provided for controlling encrypted data stored on a remote device. In particular, a remote device includes a storage controller device that can receive a “secure hide” command from an administrator device via a cloud server. If the storage controller device determines the “secure hide” command is validly signed, then the storage controller device executes the secure command by erasing the end user's public decryption key from the storage controller device. At that point, end user access to the encrypted data on the remote device is highly improbable.
    Type: Grant
    Filed: March 13, 2015
    Date of Patent: September 12, 2017
    Assignee: WESTERN DIGITAL TECHNOLOGIES, INC.
    Inventors: Thomas Cocotis, Zvonimir Bandic
  • Patent number: 9723018
    Abstract: Computer-implemented methods and systems for categorizing a uniform resource locator (URL) based on web content associated with the URL are disclosed. In one aspect, a method includes identifying a first URL using a first URL collection method, assigning, using an electronic processor, a first categorization priority to the first URL based on the first URL being identified using the first URL collection method, categorizing, the first URL based on the first categorization priority, identifying a second URL using a second URL collection method, assigning, using an electronic processor, a second categorization priority different than the first categorization priority based on the second URL having been identified using the second URL collection method; and categorizing, using an electronic processor, the second URL based on the second categorization priority.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: August 1, 2017
    Assignee: Websense, LLC
    Inventors: Dan Hubbard, Nicholas Joseph Verenini, Victor Louie Baddour
  • Patent number: 9716585
    Abstract: An aspect of cipher text translation includes a memory configured to store predetermined conditions for performing an encryption operation, and a processor communicatively coupled to the memory. The processor is configured to execute computer readable instructions. The computer readable instructions include determining through analysis of an inbound key and an outbound key of the encryption operation that the encryption operation includes a translation from a first class of encryption to a second class of encryption. The second class of encryption is determined to be weaker than the first class of encryption. The instructions also include applying the predetermined conditions to the input key and the output key and authorizing the translation via the processor, based on the applying, when aspects of the predetermined conditions are satisfied.
    Type: Grant
    Filed: April 12, 2016
    Date of Patent: July 25, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Mark D. Marik
  • Patent number: 9699150
    Abstract: In a method for secure cloud computing, a virtual machine (VM) associated with a client is executed at a computer within a trusted computing cloud. An image including state information of the VM is obtained; storage of the image is arranged; a freshness hash of the image is determined; and the freshness hash is sent to the client. Subsequently, at the same computer or at a different computer within the trusted computing cloud, the stored image may be retrieved; a freshness hash of the retrieved image may be determined; the freshness hash of the retrieved image may be sent to the client; and an indication may be received from the client verifying the integrity of the freshness hash of the stored image.
    Type: Grant
    Filed: June 5, 2015
    Date of Patent: July 4, 2017
    Assignee: Virtustream IP Holding Company LLC
    Inventors: David Lie, Reuven Cohen, Richard Reiner
  • Patent number: 9699155
    Abstract: A virtual file system is described that is implemented in a virtualization platform as a stackable file system layer that intercepts file operations between a hypervisor and a physical file system. The virtual file system encrypts (at least in part) VM files to be stored, organizes the encrypted VM files into VM sets, and then maps and stores the encrypted VM sets into storage pools. Storage and access to files within the VM sets is controlled through the use of administrator-determined policies governing storage, security, access control, authentication, and auditing. The system and method described herein allow a seamless integration between a data center (e.g., a private cloud) and computing resources served across the internet and supported by cloud service providers (e.g., public clouds) while ensuring that the security needs of customers and cloud service providers are met.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: July 4, 2017
    Assignee: HYTRUST, INC.
    Inventors: Stephen D. Pate, Tushar Y. Tambay, Kelvin J. Pryse, Lynn F. Kerby, Blaine T. Cuykendall, Thomas J. Satterlee
  • Patent number: 9692736
    Abstract: An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server. To provide the forward secrecy for this particular leg, the edge server selects an ephemeral value, and applies a cryptographic hash the value to compute a server random value, which is then transmitted back to the requesting client. That server random value is later re-generated at the cryptographic server to enable the cryptographic server to compute a master secret. The forward secrecy is enabled by ensuring that the ephemeral value does not travel on the wire.
    Type: Grant
    Filed: December 26, 2016
    Date of Patent: June 27, 2017
    Assignee: Akamai Technologies, Inc.
    Inventors: Charles E. Gero, Philip A. Lisiecki