Patents Examined by Kevin Schubert
  • Patent number: 7266844
    Abstract: Computer programs are analysed for the occurrence of redundant program instructions of program instruction using uninitialised variables. If the number of such instructions exceeds a threshold level, then the computer program is treated as containing a computer virus. This technique is useful in identifying new and polymorphic viruses.
    Type: Grant
    Filed: September 27, 2001
    Date of Patent: September 4, 2007
    Assignee: McAfee, Inc.
    Inventors: Ivan Teblyashkin, Igor Muttik, Viatcheslav Peternev
  • Patent number: 7203839
    Abstract: A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
    Type: Grant
    Filed: February 21, 2006
    Date of Patent: April 10, 2007
    Assignee: International Business Machines Corporation
    Inventors: Patrick James Richards, Jr., Matthew Bunkley Trevathan
  • Patent number: 7162736
    Abstract: An apparatus to unblock a security device issued to an end user includes an unblocking service for establishing a secure gateway. A client-side applet securely transfers information among the unblocking service, the end user, and the security device. An agent-side applet securely transfers information between the unblocking service and a security agent. An Unblock Authorization Code (UAC) is securely transferred from the agent-side applet and the client-side applet to the unblocking service. An Unblock Code (UBC) is securely transferred from the unblocking service to the client-side applet. The client-side applet is set to check at a configurable frequency for determining that the UAC is generated. The client-side applet uses the UBC to unblock the security device.
    Type: Grant
    Filed: August 20, 2001
    Date of Patent: January 9, 2007
    Assignee: Schlumberger Omnes, Inc.
    Inventors: Martin J. Koistinen, Johann O. Bazzali
  • Patent number: 7137010
    Abstract: Method of acquiring solution of an optimization problem, whereby information of problem and its solution is not delivered to solving system when requesting solving system to solve, and it is also made unnecessary to send ciphering key. Problem and ciphering key are input to client. Client generates nonsingular matrix P and permutation matrix Q by using ciphering key in conversion matrix generation routine, enciphers problem by using matrices P and Q in problem conversion routine, outputs enciphered problem from problem conversion routine to problem output interface, and sends enciphered problem from output interface to server via network. Server receives enciphered problem, finds solution in solving routine, outputs solution to solution output interface, and sends solution from solution output interface to client via network. Client receives solution in solution input interface, deciphers solution by using matrices P and Q in reverse conversion routine, and thereby obtains solution of original problem.
    Type: Grant
    Filed: August 1, 2001
    Date of Patent: November 14, 2006
    Assignee: Hitachi, Ltd.
    Inventors: Yusaku Yamamoto, Ken Naono, Satoshi Ito
  • Patent number: 7120252
    Abstract: A system and method for automatically protecting private video content using cryptographic security for legacy systems is disclosed. A substantially continuous video signal representing video content in the process of being recorded on a transportable storage medium is intercepted. The intercepted substantially continuous video signal is divided into individual frames. Each frame stores a fixed amount of data in digital form. Each individual frame is encrypted into encrypted video content using an encryption cryptographic key and is stored. The encrypted frames are retrieved and decrypted using a decryption cryptographic key. The decrypted frames are combined into a substantially continuous video signal and output as video content in the process of being played from the transportable storage medium. In a further embodiment, private video content automatically authenticated using embedded cryptographic security, either alone or in conjunction with the encryption of video content.
    Type: Grant
    Filed: August 16, 2001
    Date of Patent: October 10, 2006
    Assignee: McAfee, Inc.
    Inventors: William L. Jones, Walter J. Schon
  • Patent number: 7082539
    Abstract: Since a conventional information processing apparatus includes a plurality of semiconductor devices, there is a problem that sensitive information may reside on a system bus in the apparatus or a semiconductor memory device serving as main memory therein. To obviate this problem, each information processing apparatus has a CPU which includes a microprocessor, a cryptographic processing algorithm ROM, a cryptographic processing hardware circuit, a RAM, a key custody area, and an external bus controller, which are all integrated on a single semiconductor chip. Thus, encryption/decryption processing is carried out only in the CPU, and internal operations of the CPU are made non-analyzable from an external signal of the CPU.
    Type: Grant
    Filed: March 6, 2000
    Date of Patent: July 25, 2006
    Assignee: Hitachi, Ltd.
    Inventors: Jun Kitahara, Takeshi Asahi, Toru Owada
  • Patent number: 7062656
    Abstract: A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
    Type: Grant
    Filed: February 22, 2002
    Date of Patent: June 13, 2006
    Assignee: International Busness Machines Corporation
    Inventors: Patrick James Richards, Jr., Matthew Bunkley Trevathan
  • Patent number: 7046802
    Abstract: A block-cipher based encryption scheme providing both privacy and authenticity that encrypts an arbitrary-length message into a minimal-length ciphertext. In one embodiment, “OCB”, a message is encrypted using a nonce by partitioning it into 128-bit message blocks and a possibly shorter message fragment. A sequence of offsets is computed from the nonce and block cipher using shifts and conditional xors. Each message block is xored with an offset, enciphered, and xored with the offset, yielding a ciphertext block. The length of the message fragment is encoded, xored with an offset, enciphered to give a pad, truncated, and xored with the message fragment to give a ciphertext fragment. A checksum is formed by xoring the message blocks, the padded ciphertext fragment, and the pad. It is xored with an offset and enciphered to yield a tag. The ciphertext is the ciphertext blocks, the ciphertext fragment, and the tag.
    Type: Grant
    Filed: July 30, 2001
    Date of Patent: May 16, 2006
    Inventor: Phillip W. Rogaway
  • Patent number: 7000250
    Abstract: A system, method and computer program product are provided for protecting a computer in an opened share mode. Initially, a computer is run on a network in an opened share mode. In operation, attempts to access the computer by applications are monitored. Further, it is determined whether the applications attempt to modify the computer. A security event is then executed in response to any attempt to modify the computer.
    Type: Grant
    Filed: July 26, 2001
    Date of Patent: February 14, 2006
    Assignee: McAfee, Inc.
    Inventors: Chengi Jimmy Kuo, Igor G. Muttik, Dmitry O. Gryaznov