Patents Examined by Kari Schmidt
  • Patent number: 8654974
    Abstract: A system for securing information. The system includes a first tracking device associated with an object or an individual. In one embodiment, the first tracking device generates independently a synchronous secret key and a server generates independently the synchronous secret key. Over an insecure communication channel, the server communicates an asynchronous vector pair encrypted with the synchronous secret key with the tracking device. To securely communicate information, messages are encrypted and decrypted using the asynchronous vector pair between the tracking device and the server. To further secure message information, a set of random numbers may be further utilized with the asynchronous vector pair to further encrypt and decrypt the messages communicated between the tracking device and the server.
    Type: Grant
    Filed: October 18, 2007
    Date of Patent: February 18, 2014
    Assignee: Location Based Technologies, Inc.
    Inventors: Roger B. Anderson, Jennifer B. Anderson
  • Patent number: 8650640
    Abstract: Provided are a computer program product, system, and method for using a declaration of security requirements to determine whether to permit application operations. A declaration of security requirements indicates actions the application designates to perform with respect to resources in a computer system, wherein a plurality of the indicated actions are indicated for at least two operation modes of the application. A detection is made of whether the application is requesting to perform a requested action with respect to a requested resource in the computer system. A determination is made of a current operation mode of the application comprising one of the at least two operation modes in response to detecting that the application is requesting the requested action. A determination is made as to whether the declaration of security requirements indicates the requested action with the current operation mode.
    Type: Grant
    Filed: February 24, 2011
    Date of Patent: February 11, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey A. Calcaterra, John R. Hind
  • Patent number: 8645697
    Abstract: In some embodiments, a technique for authorizing a subsequent message comprises receiving a request to authorize a subsequent message, determining whether the request is valid, and authorizing the subsequent message, if it is determined that the request is valid.
    Type: Grant
    Filed: August 9, 2004
    Date of Patent: February 4, 2014
    Assignee: Radix Holdings, LLC
    Inventors: Aaron T. Emigh, James A. Roskind
  • Patent number: 8646025
    Abstract: A system, method and computer program product are provided for automatically generating a rule exception. An event is identified that at least potentially violates a rule. Thereafter, an exception to the rule is automatically generated.
    Type: Grant
    Filed: December 21, 2005
    Date of Patent: February 4, 2014
    Assignee: McAfee, Inc.
    Inventors: Gregory William Dalcher, Hemang Satish Nadkarni
  • Patent number: 8646061
    Abstract: A method and apparatus for transmitting rights object information between a device and a portable storage are provided. The method includes transmitting a predetermined request from the device to the portable storage, generating a current permission status format including information of a rights object designated by the request, using the portable storage, and transmitting the current permission status format from the portable storage to the device. According to the method and apparatus, overhead is reduced and information transmission speed is increased when the rights object information is transmitted between the device and the portable storage.
    Type: Grant
    Filed: May 31, 2005
    Date of Patent: February 4, 2014
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Yun-sang Oh, Tae-sung Kim, Kyung-im Jung, Shin-han Kim
  • Patent number: 8639933
    Abstract: An image reading apparatus which reads an original document and generates a digitized scanned document, and which includes a document storage section that stores the scanned document, a document bundling section that identifies one or more scanned documents stored by the document storage section, and bundles the identified documents into one document, and a time stamp affixing section that creates a digital signature of the document bundled by the document bundling section, and affixes a time stamp.
    Type: Grant
    Filed: June 12, 2006
    Date of Patent: January 28, 2014
    Assignee: Fuji Xeroc Co., Ltd.
    Inventor: Takanori Masui
  • Patent number: 8640193
    Abstract: An image processing apparatus for providing at least a service to a service requester receives a service execution request and authentication information of a service requester from the service requester and issues a request for authenticating the service requester to an authentication service. Also, the image processing apparatus executes the requested service based on an authentication result transmitted from the authentication service. Further, the image processing apparatus manages an execution state of the executed service and an authentication state of the service requestor by associating the execution state with the authentication state.
    Type: Grant
    Filed: December 20, 2005
    Date of Patent: January 28, 2014
    Assignee: Canon Kabushiki Kaisha
    Inventor: Nobuyuki Shigeeda
  • Patent number: 8639940
    Abstract: An embodiment relates generally to a method of assigning roles to a token. The method includes determining a first role for a first participant on a token and providing exclusive access to a first section of the token for the first participant base on the first role. The method also includes determining a second role for a second participant on the token and providing exclusive access to a second section of the token for the second participant based on the second role.
    Type: Grant
    Filed: February 28, 2007
    Date of Patent: January 28, 2014
    Assignee: Red Hat, Inc.
    Inventors: Robert Lord, Steven W. Parkinson, Robert Relyea
  • Patent number: 8631227
    Abstract: Electronic document processing logic coupled to a computer and to a quarantine is operable to identify an encrypted electronic document received at the computer; determine whether the key server stores particular decryption data, or credentials to access decryption data, that can decrypt the encrypted electronic document; in response to determining that the key server does not store particular decryption data that can decrypt the encrypted electronic document: store the electronic document in the quarantine; notify one of the users; receive from the one of the users the particular decryption data; decrypt the electronic document; scan the electronic document to identify specified content in the electronic document; and perform one or more responsive actions based on the specified content. As a result, encrypted content in documents or e-mail can be decrypted, scanned for viruses, malware, or prohibited content, and re-encrypted or delivered.
    Type: Grant
    Filed: October 15, 2007
    Date of Patent: January 14, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Scott Olechowski, Shawn Eldridge, Cayce Ullman
  • Patent number: 8601283
    Abstract: In some applications, it may be more convenient to the user to be able to log in the memory system using one application, and then be able to use different applications to access protected content without having to log in again. In such event, all of the content that the user wishes to access in this manner may be associated with a first account, so that all such content can be accessed via different applications (e.g. music player, email, cellular communication etc.) without having to log in multiple times. Then a different set of authentication information may then be used for logging in to access protected content that is in an account different from the first account, even where the different accounts are for the same user or entity.
    Type: Grant
    Filed: December 20, 2005
    Date of Patent: December 3, 2013
    Assignee: SanDisk Technologies Inc.
    Inventors: Fabrice Jogand-Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai
  • Patent number: 8595795
    Abstract: An administration of telephony applications conventionally using domain controller-based access authorization methods is provided such to eliminate the need for these methods. In a network where terminal devices are connected to time division multiplexed or packet-oriented network components, a terminal device establishes a communication link to a terminal device-specific adaptation for telephony applications via an interface for telephony applications, and the authorization for importing data is verified. Data is imported via the communication link to affected applications or affected services of the network. Any terminal device can be used to import the data and that no special authorizations are required for access as the proprietary/license keys that are exchanged between the terminal device and the exchange and the domain controller provide protection from unauthorized access to the exchange and to the local network connected thereto.
    Type: Grant
    Filed: February 15, 2006
    Date of Patent: November 26, 2013
    Assignee: Siemens Enterprise Communications GmbH & Co. KG
    Inventor: Gregor Scholl
  • Patent number: 8590013
    Abstract: In one embodiment, a system processes access decisions for individuals where the system includes a portable handheld housing for the processor, display, internal memory, and card reader of the system.
    Type: Grant
    Filed: June 26, 2010
    Date of Patent: November 19, 2013
    Inventor: C. S. Lee Crawford
  • Patent number: 8588418
    Abstract: A communication session is established, via a wireless communication link, with a mobile communication device that is connected to a computer system. The mobile communication device is enumerated by the computer system as a locally attached mass storage device. An authentication executable file is sent to the mobile communication device. A response generated by the computer system executing the authentication executable file is received from the mobile communication device. Based on the response generated by the computer system executing the authentication executable file, access to a data file that is stored by a mass storage system via a network is granted.
    Type: Grant
    Filed: September 22, 2008
    Date of Patent: November 19, 2013
    Assignee: Sprint Communications Company L.P.
    Inventors: Jeffrey R. Contino, Warren B. Cope, Douglas Alan Olding
  • Patent number: 8588426
    Abstract: Methods and apparatus to secure communications in a mobile network are disclosed. An example method disclosed herein comprises randomizing a first set of bits associated with information to be communicated over a slow associated control channel by applying a scrambling factor to generate a set of scrambled bits equal in length to the first set of bits. Another example method disclosed herein comprises concatenating a set of error detection bits with a set of information bits associated with information to be transmitted over a slow associated control channel to generate a set of coded bits, and shuffling the set of coded bits to generate a set of shuffled bits.
    Type: Grant
    Filed: February 21, 2011
    Date of Patent: November 19, 2013
    Assignee: BlackBerry Limited
    Inventors: Yan Xin, Shouxing Qu
  • Patent number: 8589702
    Abstract: A client hosted virtualization system (CHVS) includes a processor to execute code, a component, and a non-volatile memory. The non volatile memory includes BIOS code and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, launch a virtual machine on the CHVS, and assign the component to the virtual machine, such that the virtual machine has control of the component. The CHVS is configurable to execute the BIOS and not the virtualization manager, or to execute the virtualization manager and not the BIOS.
    Type: Grant
    Filed: May 10, 2011
    Date of Patent: November 19, 2013
    Assignee: Dell Products, LP
    Inventors: Yuan-Chang Lo, Shree Dandekar
  • Patent number: 8572386
    Abstract: The present invention is designed to enable a secure device to authenticate a terminal application that operates on an information processing terminal and that accesses the secure device. An application issue request transmitter (301) of the information processing terminal (30) sends a request for issue of a terminal application to an application issuer (101). The application issuer (101) of an secure device (10) reads a terminal application (31) from an application storage (105) and embeds authentication information in the terminal application (31), associates an ID and the authentication information of the terminal application (31) and save them in an issue information storage (106), and sends the terminal application (31) to an application receiver (302) of the information processing terminal through an application transmitter (102). The application receiver (302) starts the terminal application (31).
    Type: Grant
    Filed: August 4, 2004
    Date of Patent: October 29, 2013
    Assignee: Panasonic Corporation
    Inventors: Hiroshi Takekawa, Hisashi Takayama, Ken Naka
  • Patent number: 8572754
    Abstract: Systems and methods for facilitating unlocking a device connected locally to a client, utilizing a server located remotely from the client and the device, are provided in accordance with various aspects of the subject technology. In one aspect, a system includes a proxy configured to receive, at the client, at least one string descriptor request from the server over a network, where the at least one string descriptor request is associated with switching an interface of the device from a first interface type to a second interface type. The system further includes a stub driver configured to receive the at least one string descriptor request from the proxy, and to direct the at least one string descriptor request to the device.
    Type: Grant
    Filed: February 25, 2011
    Date of Patent: October 29, 2013
    Assignee: Wyse Technology Inc.
    Inventors: SriramKumar Raju, Puneet Kaushik
  • Patent number: 8572389
    Abstract: A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data communications between computing devices. In one example embodiment, there is provided a method in which a copy of a master transport encryption key is generated and stored in a volatile store of a first computing device (e.g. a mobile device). This copy of the master transport encryption key can be used to facilitate the decryption of data received at the first computing device from a second computing device (e.g. a data server), even while the first computing device is locked. The method also comprises encrypting the master transport encryption key, with a content protection key for example, and storing the encrypted master transport encryption key in a non-volatile store of the first computing device.
    Type: Grant
    Filed: December 22, 2005
    Date of Patent: October 29, 2013
    Assignee: Blackberry Limited
    Inventor: Herbert A. Little
  • Patent number: 8572408
    Abstract: According to one embodiment, an apparatus involves the descrambling of scrambled digital content using a one-time programmable key and digital rights management. The apparatus comprises a processor and a descrambler. The processor is adapted to execute a Digital Rights Management (DRM) function in order to determine whether each entitlement needed to access the digital content is pre-stored. The descrambler is adapted to decrypt encrypted information using a Unique Key stored within the one-time programmable memory. After determining that each entitlement needed to access the digital content is pre-stored, the decrypted information is used to generate a key, which is used to decrypt at least one service key for descrambling the scrambled digital content.
    Type: Grant
    Filed: October 11, 2004
    Date of Patent: October 29, 2013
    Assignees: Sony Corporation, Sony Electronics Inc.
    Inventor: Brant L. Candelore
  • Patent number: 8566578
    Abstract: A method and system for ensuring compliance in public clouds using fine-grained encryption based on data ownership that includes a process for ensuring compliance in public clouds using fine-grained encryption based on data ownership that is implemented, at least in part, at a gateway computing system through which data passes from the enterprise, and/or one or more end users, prior to being sent to the public cloud. In one embodiment, the data is classified, the ownership of the data is determined, the associated encryption keys are obtained, and the data is encrypted, automatically at the gateway computing system before the data is transferred to the public cloud, and in a manner that is transparent to end-users.
    Type: Grant
    Filed: February 17, 2011
    Date of Patent: October 22, 2013
    Assignee: Symantec Corporation
    Inventor: Deb Banerjee