Patents Examined by Lisa Lewis
-
Patent number: 9479530Abstract: A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more executable objects on the electronic device with the one or more open network connections of the electronic device, determining the address of a first network destination that is connected to the open network connections of the electronic device, receiving an evaluation of the first network destination, and identifying one or more of the executable objects as malware executable objects. The evaluation includes an indication that the first network destination is associated with malware. The malware executable objects includes the executable objects that are associated with the open network connections that are connected to the first network destination.Type: GrantFiled: August 25, 2014Date of Patent: October 25, 2016Assignee: McAfee, Inc.Inventor: Ahmed Said Sallam
-
Patent number: 9472235Abstract: A system and a computer program product are disclosed for eliminating access to data on removable storage media of a removable storage media cartridge. The system comprises a computer configured to send to a data storage drive a command to eliminate access to data on a removable storage media cartridge, and send to the data storage drive a command to shred at least one key in response to the command, where shredding the at least one key eliminates access to the data on the removable storage media cartridge. A determination to eliminate access to the data on the removable storage media cartridge is based on a number of read and/or write errors encountered for the removable storage media cartridge.Type: GrantFiled: July 22, 2015Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventors: Brian G. Goodman, Paul M. Greco, Glen A. Jaquette
-
Patent number: 9465870Abstract: Disclosed are systems, methods, and computer readable media for retrieving digital images. The method embodiment includes converting a descriptive audio stream of a digital video that is provided for the visually impaired to text and then aligning that text to the appropriate segment of the digital video. The system then indexes the converted text from the descriptive audio stream with the text's relationship to the digital video. The system enables queries using action words describing a desired scene from a digital video.Type: GrantFiled: September 10, 2015Date of Patent: October 11, 2016Assignee: AT&T Intellectual Property I, L.P.Inventor: Srinivas Bangalore
-
Patent number: 9460280Abstract: An interception-proof authentication and encryption system and method is provided that utilizes passcodes with individual pins that are made up of symbols from a set of symbols, and tokens that contain at least two symbols from the set of symbols used for the passcode. Multiple tokens (a “token set”) are presented to a user, with some or all of a user's pre-selected pins (symbols) randomly inserted into some or all of the tokens. The user selects a token from the token set for each pin position in the passcode. The user is authenticated based on the selected tokens. Because each selected token may or may not contain one of the pre-selected pins in the user's passcode, and also contains other randomly generated symbols that are not one of the pre-selected pins in the user's passcode, someone that observes which tokens the user has chosen cannot determine what the user's actual passcode is.Type: GrantFiled: November 3, 2015Date of Patent: October 4, 2016Inventor: Min Ni
-
Patent number: 9462019Abstract: A system comprising a broadcast facility, one or more players, and an analytic service center. The broadcast facility may be configured to provide a plurality of streams. The one or more players may be configured to receive at least one of the plurality of streams and provide feedback on a user experience. The analytic service center may be configured to receive the feedback from the one or more players.Type: GrantFiled: May 9, 2012Date of Patent: October 4, 2016Assignee: Amazon Technologies, Inc.Inventor: Jesse J. Rosenzweig
-
Patent number: 9456051Abstract: Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device.Type: GrantFiled: April 8, 2015Date of Patent: September 27, 2016Assignee: AT&T Intellectual Property I, L.P.Inventor: Jeffrey A. Aaron
-
Patent number: 9450933Abstract: Embodiments relate to systems and methods for authenticating devices and securing data. In embodiments, a session key for securing data between two devices can be derived as a byproduct of a challenge-response protocol for authenticating one or both of the devices.Type: GrantFiled: January 10, 2014Date of Patent: September 20, 2016Assignee: Infineon Technologies AGInventors: Cheow Guan Lim, Stephan Schaecher, Wieland Fischer, Bernd Meyer
-
Patent number: 9442667Abstract: An apparatus and a method for protection of data stored in a data storage unit that comprises a plurality of storage areas. A data interface connects to a computer system and transfer of a data signal from the computer system to the apparatus requests access to the data storage unit. A main control unit is configured to receive the data signal and is connected to the data storage unit. A user control unit is connected to the main control unit and is arranged to be set in different modes and generates a mode selection signal indicating the selected mode. The main control unit is configured to receive the mode selection signal, and depending on the selected mode, control connection of the apparatus to a plurality of networks, and direct the request to a storage area of the plurality of storage areas of the data storage unit.Type: GrantFiled: August 6, 2013Date of Patent: September 13, 2016Inventor: Klaus Drosch
-
Patent number: 9445112Abstract: A secure transcoder assembly features a secure data path where the related crypting and coding functions are secured in the secure data path. More specifically, during transcoding the ingress (received) encrypted video data is decrypted and copied from application memory (that is accessible to the application processor) to secure memory (that is inaccessible to the application processor) by security processor(s). Once in the secured memory, this video data is transcoded. The video data, now in its transcoded form, is re-encrypted by the security processor(s) during the transfer back to application memory for egress (continued transmission). The mode for the re-encrypting may be managed by the application processor via a crypto API, and the application processor may further feature an opaque handle on the data when it is passed to the secure region.Type: GrantFiled: December 6, 2012Date of Patent: September 13, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Mario Vera Culebro, Pradip Fatehpuria, Douglas Steedman, Senthil Kumar Gnanasambandam, Toby Steele, Hemant Malhotra
-
Patent number: 9436270Abstract: Embodiments of the invention provide for a sensor system with enhanced low-power features. Embodiments can include transmission of sensor data from a transmitter unit to a receiver unit. The sensor data can flag the sensor data with a particular header ID, enabling the receiver unit to route the sensor data to a low-power processing unit within the receiver unit without using the receiver unit's higher-power application processer. Embodiments can also utilize a proprietary encryption engine to provide a supplementary encryption layer to any encryption utilized in the wireless protocol. The transmitter unit can also compress and batch the sensor data for sending, to further increase power savings.Type: GrantFiled: February 12, 2014Date of Patent: September 6, 2016Assignee: QUALCOMM INCORPORATEDInventors: Radu Pitigoi-Aron, Justin Patrick McGloin
-
Patent number: 9438414Abstract: A computational engine may comprise a working memory configured to receive a first input message and a second input message, a context memory coupled with the working memory, wherein the context memory is configured to simultaneously store a first context corresponding to the first input message and a second context corresponding to the second input message, and a set of computational elements coupled with the working memory and coupled with the context memory, wherein the set of computational elements is configured to finish generating a first output digest based on the first input message and a first context after starting generation of a second output digest based the second input message and a second context and before finishing the generation of the second output digest.Type: GrantFiled: October 18, 2013Date of Patent: September 6, 2016Assignee: Advanced Micro Devices, Inc.Inventor: Winthrop J Wu
-
Patent number: 9432400Abstract: A method and system for protecting against unknown malicious activities by detecting a heap spray attack on a electronic device are disclosed. A script is received at an electronic device from a remote device via a network and a loop operation is detected in the script that contains a write operation operable to write data to a memory of the electronic device. The amount of the data operable to be written to the memory by the write operation is determined and the data is prevented from being written to the memory if the amount of the data is greater than or equal to a threshold.Type: GrantFiled: April 3, 2015Date of Patent: August 30, 2016Assignee: McAfee, Inc.Inventors: J. McEnroe Samuel Navaraj, Rahul C. Kashyap
-
Patent number: 9432188Abstract: A secret sharing system transforms computational secret shares to homomorphic secret shares. On a data distribution apparatus, a key selector selects K??1 keys. A pseudorandom number generator generates pseudorandom numbers from the keys. An encryption part generates a ciphertext from information using the pseudorandom numbers. A key division part divides the keys into N shares fg(n) using an arbitrary sharing. A ciphertext division part divides the ciphertext into N shares fc(n) using an arbitrary sharing. When K shares fsj(i) are input into distributed data transform apparatuses, a reconstruction part generates a reconstructed value Uj by reconstructing shares fsj(i) using the secret sharing, and when K shares fc(i) are input, generates the reconstructed value Uj by reconstructing shares fc(i) using the arbitrary sharing. A redivision part divides reconstructed value Uj into N shares fUj(n) using a homomorphic secret sharing. A transformer generates share ga(i) of the information from K? shares fUj.Type: GrantFiled: July 4, 2013Date of Patent: August 30, 2016Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Koji Chida, Dai Ikarashi, Koki Hamada, Ryo Kikuchi
-
Patent number: 9430653Abstract: A method of converting an original application into a cloud-hosted application includes splitting the original application into a plurality of application components along security relevant boundaries, mapping the application components to hosting infrastructure boundaries, and using a mechanism to enforce a privacy policy of a user. The mapping may include assigning each application component to a distinct virtual machine, which acts as a container for its assigned component.Type: GrantFiled: April 14, 2015Date of Patent: August 30, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mihai Christodorescu, Dimitrios Pendarakis, Kapil K. Singh
-
Patent number: 9430652Abstract: Use rules are included within tokenized data either before or after tokenization. The use rules can be appended to the data before or after tokenization, can be used to modify the data before or after tokenization, and can be used to select or generate token tables for use in tokenizing the data. The use rules limit how, where, and when the tokenized data can be used, who can use the tokenized data, and the like. In addition, data can be tokenized such that the tokenized data can be identified as tokenized based on the tokenized data failing a validation test. The data is tokenized using one or more token tables, and the validation test is applied to the tokenized data. If the tokenized data passes the validation test, the data is modified with formatting rules or re-tokenized with additional token tables until the tokenized data fails the validation test.Type: GrantFiled: January 28, 2013Date of Patent: August 30, 2016Assignee: Protegrity CorporationInventors: Ulf Mattsson, Yigal Rozenberg
-
Patent number: 9418210Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: GrantFiled: December 15, 2014Date of Patent: August 16, 2016Assignee: Intertrust Technologies CorporationInventors: David P. Maher, James M. Rudd, Eric J. Swenson, Richard A. Landsman
-
Patent number: 9419980Abstract: A location-dependent security method and system for a portable electronic device is disclosed. Without requiring that the user enter any location information, the system determines one or more familiar areas for the device based on locations where the device has received at least a threshold amount of successful user authentication entries. Thereafter, when a user attempts to access the device or an application of the device, the device will implement a first authentication process if the device is in one of the familiar areas, or a different authentication process if the device is not in one of the familiar areas.Type: GrantFiled: November 3, 2014Date of Patent: August 16, 2016Assignee: GOOGLE INC.Inventor: Phil Hewinson
-
Patent number: 9407962Abstract: A device is configured to perform a method that detects a trigger marker for an action corresponding to a segment of a multimedia signal. A fingerprint is generated based on the segment of the multimedia signal at a trigger time point. The generated fingerprint is stored in a database and communicated to the device. During playback of the multimedia signal, fingerprints of segments of the multimedia signal are generated and matched against fingerprints in the database. When a match is found, one or more associated actions for the segment are retrieved by the device. The trigger time point may be determined as a time point near or at the segment of the multimedia signal with the matched fingerprint. In this way, trigger markers for actions may be enabled without modifying the multimedia signal.Type: GrantFiled: March 16, 2015Date of Patent: August 2, 2016Assignee: Gracenote, Inc.Inventors: Job Cornelis Oostveen, Warner Rudolph Theophile Ten Kate, Adrianus Johannes Maria Denissen, David K. Roberts
-
Patent number: 9407729Abstract: A cache server for providing content includes a processor configured to receive a first datagram from a client system sent to an anycast address, send a response datagram to the client system in response to the first datagram, receive a request datagram from the client system sent to the anycast address, and send a batch of content datagrams to the client system. The first datagram includes a universal resource locator corresponding to the content. The response datagram includes a content identifier for the content. The request datagram includes the content identifier, an offset, and a bandwidth indicator. The batch of content datagrams includes a portion of the content starting at the offset.Type: GrantFiled: June 25, 2015Date of Patent: August 2, 2016Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Oliver Spatscheck, Seungjoon Lee, Michael Rabinovich, Jacobus E. Van der Merwe
-
Patent number: 9407579Abstract: A software defined networking (SDN) computer network includes an SDN controller and an SDN switch. The SDN controller inserts flow rules in a flow table of the SDN switch to create an SDN pipe between a sender component and a security component. A broadcast function of the SDN switch to the ports that form the SDN pipe may be disabled. The SDN pipe allows outgoing packets sent by the sender component to be received by the security component. The security component inspects the outgoing packets for compliance with security policies and allows the outgoing packets to be forwarded to their destination when the outgoing packets pass inspection. The SDN controller may also insert a flow rule in the flow table of the SDN switch to bypass inspection of specified packets.Type: GrantFiled: January 7, 2016Date of Patent: August 2, 2016Assignee: Trend Micro IncorporatedInventors: Chuan-Hung Lin, Ching-Yi Li, Po-Cheng Liang