Patents Examined by Lawrence Cosby
  • Patent number: 9471598
    Abstract: A system and method for storing data representing a multidimensional entity using corresponding dimensions for the data, storing a further dimension for the data, the further dimension being a modification timestamp indicating a time when the data was modified, receiving a request for the data representing the multi-dimensional entity, the request including a request timestamp indicating a further time when a previous request for the data representing the multi-dimensional entity was received and transmitting the data only when the modification timestamp is later than the request timestamp.
    Type: Grant
    Filed: May 8, 2014
    Date of Patent: October 18, 2016
    Assignee: AT & T Intellectual Property II, L.P.
    Inventor: Michael L. Asher
  • Patent number: 9330255
    Abstract: In one embodiment, a method for monitoring a computer system that includes activating and controlling a target processor by way of an electromagnetic signal. The method also includes generating a key for a computer security method via processor readable instructions stored on a first memory device; transmitting the key to the target processor via an electromagnetic signal; and requesting the target processor to perform the computer security method on a target memory device via an electromagnetic signal, where the computer security method uses the key as a seed.
    Type: Grant
    Filed: May 3, 2012
    Date of Patent: May 3, 2016
    Assignee: Cisco Technology, Inc.
    Inventors: Chirag Shroff, Larus Maxwell, Anthony Grieco
  • Patent number: 9323827
    Abstract: Key terms for similar passages from a large corpus are identified and used to enhance searching and browsing the corpus. The corpus contains multiple documents such as the text of books. Browsing by concept is supported by identifying a set of similar passages or quotations in documents stored in the corpus and assigning key terms to passages which links conceptually related passages together. The context of each passage instance is identified and can include, for example, the text surrounding the passage. The contexts of all similar passage instances are analyzed in order to identify key terms for the similar passage. The related key terms are analyzed to identify relationships among the key terms from different similar passage sets. The key terms can be used as a basis for navigating the documents in the corpus. The key terms enable browsing the documents in the corpus by concepts referenced in the documents.
    Type: Grant
    Filed: January 30, 2008
    Date of Patent: April 26, 2016
    Assignee: Google Inc.
    Inventors: William N. Schilit, Okan Kolak
  • Patent number: 9282146
    Abstract: Targeted content may be provided to a designated set of one or more interconnected resources. Programmatic operations are executed using resources that are private to the one or more interconnected devices. The operations, when executed, cause or result in (i) monitoring activities of one or more users of the designated set; (ii) developing profile information of the one or more users, where the profile information is based at least partially on information determined from monitoring activities of the one or more users; (iii) generating, from the profile information, a set of coded data that represent selection criteria; and (iv) communicating the set of coded data to a programmatic source external to the system, where the represented selection criteria enables programmatic selection of content resources from a content library for the system.
    Type: Grant
    Filed: April 16, 2014
    Date of Patent: March 8, 2016
    Assignee: QUALCOMM ATHEROS, INC.
    Inventors: Luc E. Julia, James Behrens, Yohan Le Nerriec
  • Patent number: 9280659
    Abstract: A data processing system supports remeasurement of a virtual machine monitor (VMM). In one example process, the VMM may obtain a secret value from a trusted platform module (TPM) of the processing system. The VMM may provide the secret value from the VMM to a measurement agent executing in system management mode (SMM) of the processing system. The measurement agent may be a system management interrupt (SMI) transfer monitor (STM) that can create virtual machines to execute in SMM, for example. However, the VMM may verify the measurement agent before providing the secret value to the measurement agent. The measurement agent may generate a remeasurement value for the VMM, use the secret value that was obtained from the TPM to certify the remeasurement value, and communicate the remeasurement value to a requesting program, via the VMM. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: March 8, 2016
    Assignee: Intel Corporation
    Inventors: Carlos V. Rozas, Vincent R. Scarlata
  • Patent number: 9237086
    Abstract: In one embodiment, a method includes receiving a routing distribution profile associated with a set of network resources disposed between a source endpoint and a destination endpoint. The set of network resources is within a session over Internet Protocol (SoIP) network. A distribution function is defined based on the routing distribution profile and based on a range of random number values. The distribution function is used to route via a network resource from the set of network resources a request to establish a session between the source endpoint and the destination endpoint.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: January 12, 2016
    Assignee: GENBAND US LLC
    Inventor: Rakendu Devdhar
  • Patent number: 9225609
    Abstract: A system and method for controlling communications networks. Network performance information is gathered from a first communications network using performance information packet data packets. A network operator of the first communications network is controlled from a secondary communications network using the performance information packet data packets. Changes to the network operator are implemented based on instructions included in the performance information packet data packets.
    Type: Grant
    Filed: October 9, 2012
    Date of Patent: December 29, 2015
    Assignee: CenturyLink Intellectual Property LLC
    Inventors: James L. McNaughton, John M. Heinz, Michael K. Bugenhagen, William L. Wiley
  • Patent number: 9207968
    Abstract: A method of providing normal security services and high security services with a single operating system in a computing system is disclosed. A secure thread is only accessible while the computing system is in a high security environment, and relates to one of the high security services. A pseudo normal thread is to be executed while the computing system in a normal security environment, and it works as a temporary of the secure thread, and is forwarded to a thread ordering service to gain access to resources of the computing system. When the pseudo normal thread gains access to the computing system resources, the computing system is changed to the high security environment to execute the secure thread.
    Type: Grant
    Filed: November 3, 2009
    Date of Patent: December 8, 2015
    Assignee: MEDIATEK INC.
    Inventors: Hsien-Chun Yen, Jing-Kuang Huang
  • Patent number: 9210173
    Abstract: An originator of an appliance can independently secure the appliance for instantiation in the cloud, separate from the security level of the cloud. The originator can secure the appliance utilizing a secure rights application. The secure rights application can be configured to “wrap” an appliance in a security container. The security container can limit access to the applications and operating systems contained in the appliance, but allow the appliance to operate normally once instantiated in the cloud. The secure rights application can be configured to cryptographically secure the appliance in order limit the ability of unauthorized parties from accessing the components of the appliance while maintaining the functionality of the appliance.
    Type: Grant
    Filed: November 26, 2008
    Date of Patent: December 8, 2015
    Assignee: Red Hat, Inc.
    Inventor: James Michael Ferris
  • Patent number: 9137248
    Abstract: A method for discovering emulated clients. A verifier sends a cryptographic challenge C to a client and preferably starts a timer. The client uses a deterministic key search algorithm to find the correct key and returns the result as a number of tries needed. The verifier then stops the timer if this was started and verifies that the result is correct and preferably that the response was timely. Also provided is a verifier.
    Type: Grant
    Filed: June 1, 2007
    Date of Patent: September 15, 2015
    Assignee: THOMSON LICENSING
    Inventors: Olivier Heen, Eric Diehl, Alain Durand, Mohamed Karroumi, Nicolas Prigent
  • Patent number: 9135406
    Abstract: A user terminal device specifies presence or absence of additional recording in issuing a content request, and in the case of additional recording, the device transmits medium information and encrypted information of pre-recorded contents to a delivery center. When receiving a content additional recording request from the device, the delivery center decrypts once encrypted contents to be additionally recorded with the corresponding-content keys. The encrypted key information is decrypted by the medium information from the device to decrypt content keys of the pre-recorded contents and re-encrypts encrypted contents to be additionally recorded to deliver the re-encrypted contents to the device. When receiving contents for additional recording, the device records the received contents so as to be related to the pre-recorded contents, on a recording medium.
    Type: Grant
    Filed: February 6, 2008
    Date of Patent: September 15, 2015
    Assignee: KABUSHIKI KAISHA TOSHIBA
    Inventor: Shinichi Kurihara
  • Patent number: 9124544
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to distribution list management for a collaborative object and provide a method, system and computer program product for detecting exceptions for collaborative object addressing in a collaborative computing environment. In an embodiment of the invention, a method for detecting exceptions for collaborative object addressing in a collaborative computing environment can be provided. The method can include retrieving a distribution list for a collaborative object in a collaborative computing environment, comparing addressees in the distribution list to addressees in a list of previously applied addressees, and providing a notification where an addressee in the distribution list does not appear as an addressee in the list of previously applied addresses.
    Type: Grant
    Filed: December 31, 2007
    Date of Patent: September 1, 2015
    Assignee: International Business Machines Corporation
    Inventors: Michael Muller, Andrew L. Schirmer
  • Patent number: 9037694
    Abstract: Described herein are a method and a system to assign geographic locations to network blocks.
    Type: Grant
    Filed: November 6, 2007
    Date of Patent: May 19, 2015
    Assignee: Neustar IP Intelligence, Inc.
    Inventor: Adam Winkler
  • Patent number: 9037686
    Abstract: A portable, e.g. handheld, device that would assist in the discovery of hardware ‘in the box’, and non-connected resources in general, by using detection methods such as scanning a barcode, manually entering a UPC, or detecting an RFID tag on the asset or resource, and then recommending the physical location, cabling and other setup information based on datacenter needs and real-time load information and displaying the instructions on the portable device. The above-mentioned portable device may also include a GPS receiver to locate various resources, i.e. pieces of hardware, based on their location in a large datacenter.
    Type: Grant
    Filed: June 24, 2008
    Date of Patent: May 19, 2015
    Assignee: International Business Machines Corporation
    Inventor: Jacob Kugel
  • Patent number: 8996723
    Abstract: An Internet Service Provider (ISP)-aware peer-to-peer (P2P) content exchange system and method for exchanging content over a P2P network using the Internet. The system and method accounts for the type of relationship between peers and classifies and groups each peer according to these relationships. A peer overlay is constructed such that peers within a peer's neighborhood are favored over those peers outside of the neighborhood. Peer scheduling is utilized to exchange information about the availability of blocks of content. This block availability information can be exchanged differently and its frequency changed depending on a peer's classification. Peers are selected for block exchange based on their classification. A peer selection proportion may be defined that dynamically changes depending on contents of a peer's download buffer. The blocks to be exchanged then are selected based on the block availability information, such that the rarest blocks are exchanged before the more common blocks.
    Type: Grant
    Filed: June 4, 2007
    Date of Patent: March 31, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jin Li, Cheng Huang
  • Patent number: 8990285
    Abstract: According to an embodiment of the invention, an agent scans a storage server, and collects information about files stored on the storage server. The agent then summarizes the information into a summary, and stores the summary on a database server. The summaries can be accessed by a system administrator using a graphical user interface (GUI). The summaries contain information about the use of the storage server, and highlight potential problem areas. By having an agent, rather than a multi-appliance management application (MMA) scan the storage server and create the summary, the MMA is able to perform other tasks.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: March 24, 2015
    Assignee: NetApp, Inc.
    Inventors: Vijay Deshmukh, Benjamin Swartzlander
  • Patent number: 8990912
    Abstract: Methods and apparatus are provided for authenticating communications between a user computer and a server via a data communications network. A security device has memory containing security data, and security logic to use the security data to generate an authentication response to an authentication message received from the server in use. An interface device communicates with the security device. The interface device has a receiver for receiving from the user computer an authentication output containing the authentication message sent by the server to the user computer in use, and interface logic adapted to extract the authentication message from the authentication output and to send the authentication message to the security device. Includes a communications interface for connecting to the server via a communications channel bypassing the user computer. Either the security device or interface device sends the authentication response to the server via the communications channel bypassing the user computer.
    Type: Grant
    Filed: April 17, 2009
    Date of Patent: March 24, 2015
    Assignee: International Business Machines Corporation
    Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Thorsten Kramp, Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
  • Patent number: 8977692
    Abstract: Automated handling of a notification from a federal court is provided in which its disposition is determined responsively to data contained in the notification, or to data that relates to a matter referred to in the notification. In an illustrative example, an email application identifies an email as a bankruptcy notification. An automated notification handling system enhances the data in the notification email by supplementing the notification email data with related data that is matched from a case management system database, and further follows links in the notification email to download documents that are filed with the court. The documents are copied to storage or appended to the enhanced notification email data. The disposition of the notification is determined by invoking rules responsively to the enhanced notification email data which is then sent, using rules-based routing, to an appropriate destination to be handled, stored or deleted as required.
    Type: Grant
    Filed: July 21, 2006
    Date of Patent: March 10, 2015
    Assignee: 4 S Technologies, LLC
    Inventors: Michael S. Ackerman, Harold Shanske, Richard Baylor, James J. Polera, Nathan Brenner, Frances Bell, Daniela Sellinger, Kathleen M. Barnum, W. C. Taylor, III
  • Patent number: 8971536
    Abstract: A method of generating a number includes asynchronously updating a plurality of linear feedback shift registers, selecting a mixing function using a balanced entropy value, and determining the number from bit values selected from the plurality of linear feedback shift registers based on the selected mixing function.
    Type: Grant
    Filed: July 21, 2011
    Date of Patent: March 3, 2015
    Assignee: Vixs Systems, Inc.
    Inventor: Norman Stewart
  • Patent number: 8949610
    Abstract: A method for embedding a secret message into a PNG image comprises steps: converting a secret message into a plurality of secret codes; converting the secret codes into a plurality of secret shares; using a mapping process to modify values of the secret shares to approach a full-transparent value of an alpha channel of a PNG image, and sequentially embedding the mapped secret shares into the alpha channel. As the secret shares with high-transparent values, they leave the RGB channels untouched. Thus, embedding the secret shares into the PNG image does not make difference in the appearances between the secret-carrying image and the original PNG image. Therefore, the present invention can transmit secret message securely and realize covert communication.
    Type: Grant
    Filed: February 23, 2011
    Date of Patent: February 3, 2015
    Assignee: National Chiao Tung University
    Inventors: Che Wei Lee, Wen-Hsiang Tsai